Old School |
|
Central stores of credentials |
Decentralized, one-to-one encrypted relationships with no stored PII |
|
|
|
So easy users won’t try to get around the security controls
FRAUD PREVENTION
Decentralized
and entangled.
The most common sources of fraud are stolen secrets like usernames, passwords, tokens, keys, and more. Building higher walls and deeper moats around these repositories isn’t working. Every “improvement” to prevent fraud has made users’ lives worse with each extra step and encouraged worse security habits with attempts to circumvent controls.
Instead of relying on centralized stores of secrets that can be stolen, phished, keylogged, observed, recorded, brute forced, etc., ThinOps Cypher moves the authentication process from a centralized server to a user’s mobile phone.
This decentralized platform verifies every transaction in a bidirectional entanglement, preventing fraud losses from account takeover, credential theft, internal threats, and more.
COMPARISON
Verify every
transaction.
Each time a user enrolls to use ThinOps Cypher on a new system, a new set of public/private keys is created for that specific system on the user’s mobile phone. Both sides of this relationship are verified on every transaction using PKI Entanglement.
In a transaction, each side of that entanglement reaches out to the other to ensure that set of public/private keys that are contained only between the two parties are the correct ones.
By creating this bidirectional, one-to-one relationship, there are no secrets to phish (no usernames or passwords) and every transaction behind cypher is protected by single-use, cryptographically controlled identity proofs. Even better? Users don’t even notice.
Step |
|
ThinOps Cypher fraud prevention
|
Asks user to provide credentials to log into the service, requiring known and stored secrets such as usernames and passwords. |
Offers correct level of challenge based on type of transaction (notification, approve button, biometric, or cognitive keyboard)
|
|
|
|
|
|
|
|
|
Time taken |
|
|
|
|
Only when you realize how much time you’ve wasted on ineffective login/fraud prevention tools |
ACCESSIBILITY
Customized keyboards for more fraud protection.
For high-risk or high-value actions, ThinOps Cypher offers another layer of interaction with our patented OneTiCK cognitive keyboard so you can not only prove that you're present, but you are actively participating in the interaction.
This doesn’t require a long, complex password. It also prevents phishing, shoulder-surfing, keyloggers, and more. These keyboards can be customized to any icon, sound, or more.
