Online Demo | GATECyberTech.com | Details | Software & Training | FAQ | Contact Us |
An Interception-resistant Authentication And Encryption System And Method
US Patent : 9,460,280 |
Videos : |
★ |
★ ★ |
★ ★ ★ |
☜ ^_^ ! |
GATE is a revolutionary password entry process that retains account security even in situations where potential intruders witness the entries being made. |
Based on user password choice, server renders password entry buttons on a screen, rendering multiple characters per button. When button selection is made by a user there is no way for an observer to know the actual password due to the multiple characters per button. Each subsequent rendering of buttons by the server will be unique, based on the GATE algorithm, ensuring button selection cannot simply be repeated based on button location in order to infiltrate an account. |
Due to the rendering process required in order to present password buttons to a user, a server has to already know the password of the user in order to render an appropriate array of buttons. Therefore bogus or malicious servers will not be able to render an appropriate array of buttons to a user, which allows the user to recognize whether or not the screen he is looking at is being controlled by the appropriate body. |
The GATE System Defeats Peeking, Keylogging, Wiretapping, Phishing & Dictionary Attack Without The Restrictions Of Lowercase, Uppercase, Numbers & Special Characters ! |
In traditional password system, server authenticates user, yet with GATE, user also authenticates server, because the server has to know the user passcode in order to mix some user pins with other symbols and generate tokens for the user to select, since phishing sites don't know user passcodes, they can't generate valid tokens, therefore phishing won't work on the GATE system ! |
Now you can try the GATE system free at the online demo site. |
|
|
|
|||||
GATE won "Innovation Award In Cyber Security" at IET on 14 November 2018, in Brewery, London |
GATE won "Global Excellence Awards" at 2020 Info Security Products Guide |
GATE has been selected to the top 100, among more than 2800 technologies collected from all over the world at 2021 ZGC International Technology Trade Conference. |
Traditional Password vs. GATE Passcode System | |
Traditional Password System | GATE Passcode System |
How To Enter GATE Passcode | |
[1] If All User Pins Are In The Table | [2] If Some User Pins Are Not In The Table |
After user entered User_Id, the server retrieves user passcode.
There are 3 x 3 = 9 tokens generated by the server in the above table.
User followed the order of his pins [ Ⓘ ♥ 2 ✉ ] in the passcode and entered the
The GATE system hides user pins among other symbols to obscure passcode.
But if all the user pins always appear in the tokens tables above, then the hacker
Therefore, GATE introduced a missing pin concept, see example on the right side.
|
After user entered User_Id, the server retrieves user passcode.
The tokens table can have 3 x 3 = 9 or 4 x 4 = 16 tokens generated by the server.
User follows the order of his pins [ Ⓘ ♥ 2 ✉ ] in the passcode to enter the tokens.
In this example, "Ⓘ" and "2" are in the tokens table, but "♥" and "✉" are missing
The wildcard/random token can be any of the 9 tokens in the tokens table. This is
The system can set the min. number of user pins to appear in the tokens table, but
When a user pin is in the table, user must select the token that has that user pin.
|
How To Register GATE Passcode | |
The Symbols That Form User Passcode In GATE Are Customizable | |
Benefits Of The GATE System And Method : Defeat Peeking, Wiretapping, Keylogging, Phishing & Dictionary Attack | ||
Threats / Difficulties | Traditional Password | GATE Passcode |
Phishing scams over the network | ☹✗ Users can easily fall prey to phishing scams as most users don't know which is real and which is fake. | ☺✓ Won't happen, because in order to get a user to select tokens to enter passcode, the source needs to generate the tokens first according to that user's passcode, and without that knowledge, the tokens can't be generated to start with. |
Camcorder recording the login session | ☹✗ Easily done at a far distance or with hidden cameras and users may never notice. | ☺✓ Won't disclose passcode even after repeated recording because the passcode pins are hidden among the symbols in the selected tokens and some of the pins may never show up. |
Wiretapping / Keylogging to intercept the communication | ☹✗ Can be intercepted and seen. | ☺✓ Interception resistant. Because even when intercepted the passcode is among the symbols in the selected tokens and no clear passcode is shown. Besides, the intercepted tokens may not even contain some of the pins in the passcode. |
Peeking over the shoulder | ☹✗ Can be seen and stolen. | ☺✓ Peek resistant, can even be seen multiple times, the passcode is not clearly shown. |
Restrictions of lowercase, uppercase, numbers and special characters | ☹✗ Hard to remember. | ☺✓ Using Unicode symbols already in the operating system, easily select and remember meaningful symbols. |
Dictionary Attack | ☹✗ Vulnerable. | ☺✓ Won't happen, because the symbols in the GATE system are beyond dictionary. |
Bye-bye "Open Sesame", hello "GATE" ! Be a few steps ahead of the hackers. ^_^
You can also download and try the demo desktop software absolutely free ! |
You Can Start In Just 2 Simple Steps :
|
Commission Based Marketing & Sales Agents Welcome ^_^ !
Licensing, sample software, and comprehensive training available, contact for details. |
Online Demo | GATECyberTech.com | Details | Software & Training | FAQ | Contact Us |