Seamless & Secure Access for All Identities
Authentication Factors

Device
Fingerprints

PKI Signature with a Split Private Key

Time Management

Biometrics Provided by the Device

Geo-location

Proximity

Risk Engine

Geo-One Time Password (OTP)

Sign What you See

Multi-Layer Management
How Keypasco Works
The solution consists of
- The Keypasco server – Borgen
- One or several end-user’s devices
- A dual-channel structure
- The Risk Engine
- Personal NFC device or NFC card for secure activation & recovery
- The Device Fingerprint properties on the end-user’s device are scanned and stored in the Keypasco server. Any personal device may be registered as part of the digital identity.
The first channel is for communication between the end-user’s
device and the service provider, mostly via a standard web browser (a potential risk factor if used solely).
The second channel is for communication between the end-user’s
device and the Keypasco server, where all data are encrypted.


Safeguarding Against Phishing:
Our system ensures that logins or transactions only function on confirmed devices in specific locations, tying each user’s Device Fingerprint to their geographical context.
Defense Against MitM and MitB Attacks:
Keypasco’s dual-channel structure and secure out-of-band notifications (Sign what you see) provide protection against these common threats, ensuring secure transactions even in compromised environments.
Battling Malicious Viruses:
Through secure out-of-band notifications (Sign what you see), Keypasco thwarts attempts by viruses and Trojans to compromise or replicate user devices, maintaining control and integrity over user accounts.
Protecting Against Device Theft:
With Keypasco’s proximity feature, user accounts remain secure even in the event of device theft or robbery, enhancing overall security and peace of mind for users.”
Device Fingerprints
Empower users with the flexibility to set their preferred login days and times on a weekly basis. Any unauthorized login attempts outside the designated time range will prompt warning messages, ensuring heightened security and user control.
To further secure our site, we use dynamic device fingerprinting and accumulated authentication data.
This multi-layered, constantly changing login profile makes it nearly impossible for hackers to breach.


Time Management
Empower users with the flexibility to set their preferred login days and times on a weekly basis. Any unauthorized login attempts outside the designated time range will prompt warning messages, ensuring heightened security and user control.
Sign What you See
Through device authentication, the user-specific verification details are presented to the user. If the user does not agree or declines, the authentication login will not be successful.


Proximity
Experience versatile authentication with the option of Bluetooth devices connected to your computer or NFC cards for mobile phone detection. Users can customize their preferred authentication factors for a secure login experience.
PKI Signature with a Split Private Key
Ensure heightened security with our patented decentralized private key storage design. We prioritize the protection of your private key by eliminating full storage on the user’s device, mitigating concerns about potential theft. Your device eigenvalues, PIN, and KeyPair are distributed and are not stored in their entirety in any single location, reinforcing the robust security of your authentication process.


Risk Engine
Powered by smart data mining of device properties by gathering and measuring sources: device, user, behavior, system, etc. This provides the rule engine with data: time, location, behavior, etc.
Keep track of devices from being jailbroken/ rooted etc.
Keep track of devices being jailbroken/rooted, etc. Create a blacklist of users and devices not compliant with the set rules.
Maintain a blacklist of users and devices not compliant with set rules. Set customizable rules and decision-making according to your needs.
Geo-location
Enhance transaction security with location-based authorization. The user’s current location is dynamically updated to ensure authentication success, enabling transactions exclusively through authorized devices at the user’s present location. This stringent measure adds an extra layer of protection to every transaction.


Geo-One Time Password (OTP)
Our system generates a new verification code every 60 seconds by combining geographical location, device features, and Oath standards for offline authentication, which ensures robust security
Biometrics Provided by the Device
Biometric authentication verifies identity using physical or behavioral traits such as fingerprints, facial features, voice patterns, and behavioral characteristics. By using these modalities, Keypasco offers enhanced security and convenience by eliminating the need for passwords or physical tokens.


Multi-Layer Management
Multilayer management oversees various security measures and authentication factors in a MFA system, including different authentication methods such as SMS, email, and biometrics. Keypasco ensures the right security level is applied based on data sensitivity, with flexibility for adjusting authentication requirements.