Online Demo GATECyberTech.com Details Software & Training FAQ Contact Us


GATE [ Graphic Access Tabular Entry ]

An Interception-resistant Authentication And Encryption System And Method

US Patent : 9,460,280

Videos   :
 


★ ★

★ ★ ★

  ^_^ !

GATE is a revolutionary password entry process that retains account security even in situations where potential intruders witness the entries being made.
Based on user password choice, server renders password entry buttons on a screen, rendering multiple characters per button.
When button selection is made by a user there is no way for an observer to know the actual password due to the multiple characters per button.
Each subsequent rendering of buttons by the server will be unique, based on the GATE algorithm, ensuring button selection cannot simply be repeated based on button location in order to infiltrate an account.
Due to the rendering process required in order to present password buttons to a user, a server has to already know the password of the user in order to render an appropriate array of buttons.
Therefore bogus or malicious servers will not be able to render an appropriate array of buttons to a user, which allows the user to recognize whether or not the screen he is looking at is being controlled by the appropriate body.

  The GATE System Defeats Peeking, Keylogging, Wiretapping, Phishing & Dictionary Attack Without The Restrictions Of Lowercase, Uppercase, Numbers & Special Characters !  
  In traditional password system, server authenticates user, yet with GATE, user also authenticates server, because the server has to know the user passcode in order to mix some user pins with other symbols and generate tokens for the user to select, since phishing sites don't know user passcodes, they can't generate valid tokens, therefore phishing won't work on the GATE system !  


Now you can try the GATE system free at the online demo site.


GATE won "Cybersecurity
Innovation Award" at 2017
International Cyber Security and
Intelligence Conference [ ICSIC ]
on November 7th - 8th, 2017 in
Toronto, Canada.
2017 Silicon Valley Best
Cyber Security Vendor Achievement
Silver Winner : GATE Cyber Technology LLC
Bronze Winner : Startup of the Year
GATE won "Global
Excellence Awards" at
2018 Info Security
Products Guide on
April 16, 2018 in San
Francisco
Frank Ni won "Cyber
Excellence Award" at 2018
National Cyber Summit on
June 7, 2018 in Huntsville
AL


2018_IET_Award
2020_ISPG_s.PNG
2021_ZGC_Top_100
GATE won "Innovation
Award In Cyber Security"
at IET on 14 November
2018, in Brewery, London
GATE won "Global
Excellence Awards" at
2020 Info Security
Products Guide

GATE has been selected to the top 100,
among more than 2800 technologies collected
from all over the world at 2021 ZGC
International Technology Trade Conference.


Traditional Password vs. GATE Passcode System
Traditional Password SystemGATE Passcode System

How To Enter GATE Passcode
[1] If All User Pins Are In The Table [2] If Some User Pins Are Not In The Table

After user entered User_Id, the server retrieves user passcode.
In the example above, user passcode is : Ⓘ ♥ 2 ✉

There are 3 x 3 = 9 tokens generated by the server in the above table.
Each token is a button that contains 4 symbols, user can click on any part of the
token/button to select and enter that token.

User followed the order of his pins [ Ⓘ ♥ 2 ✉ ] in the passcode and entered the
tokens that contain his pins.

The GATE system hides user pins among other symbols to obscure passcode.
The advantage of the GATE system is : even if the communication is intercepted
by a hacker, user pins are not obviously exposed.

But if all the user pins always appear in the tokens tables above, then the hacker
will eventually figure out what the user pins are, because "Ⓘ" always show up in
the first token user enter, "♥" always show up in the 2nd token user enter, "2"
always appear in the 3rd token, and so on.

Therefore, GATE introduced a missing pin concept, see example on the right side.

After user entered User_Id, the server retrieves user passcode.
In the example above, user passcode is still : Ⓘ ♥ 2 ✉

The tokens table can have 3 x 3 = 9 or 4 x 4 = 16 tokens generated by the server.
Table size is adjustable on the server.

User follows the order of his pins [ Ⓘ ♥ 2 ✉ ] in the passcode to enter the tokens.

In this example, "Ⓘ" and "2" are in the tokens table, but "♥" and "✉" are missing
from the tokens table above. In this case, when a pin is missing from the table,
user can and must enter a wilecard/random token in place of that missing pin.

The wildcard/random token can be any of the 9 tokens in the tokens table. This is
a safety feature, so even if the traffic is intercepted by a hacker, it's very hard to
figure out which symbol is a user pin, which is not a user pin.

The system can set the min. number of user pins to appear in the tokens table, but
at least one user pin will definitely appear, sometimes all user pins may be in the
tokens table.

When a user pin is in the table, user must select the token that has that user pin.

How To Register GATE Passcode

The Symbols That Form User Passcode In GATE Are Customizable

Benefits Of The GATE System And Method : Defeat Peeking, Wiretapping, Keylogging, Phishing & Dictionary Attack
Threats / DifficultiesTraditional PasswordGATE Passcode
Phishing scams over the network   Users can easily fall prey to phishing scams as most users don't know which is real and which is fake.   Won't happen, because in order to get a user to select tokens to enter passcode, the source needs to generate the tokens first according to that user's passcode, and without that knowledge, the tokens can't be generated to start with.
Camcorder recording the login session   Easily done at a far distance or with hidden cameras and users may never notice.   Won't disclose passcode even after repeated recording because the passcode pins are hidden among the symbols in the selected tokens and some of the pins may never show up.
Wiretapping / Keylogging to intercept the communication   Can be intercepted and seen.   Interception resistant. Because even when intercepted the passcode is among the symbols in the selected tokens and no clear passcode is shown. Besides, the intercepted tokens may not even contain some of the pins in the passcode.
Peeking over the shoulder   Can be seen and stolen.   Peek resistant, can even be seen multiple times, the passcode is not clearly shown.
Restrictions of lowercase, uppercase, numbers and special characters   Hard to remember.   Using Unicode symbols already in the operating system, easily select and remember meaningful symbols.
Dictionary Attack   Vulnerable.   Won't happen, because the symbols in the GATE system are beyond dictionary.


Bye-bye "Open Sesame", hello "GATE" !   Be a few steps ahead of the hackers. ^_^


You can also download and try the demo desktop software absolutely free !


You Can Start In Just 2 Simple Steps :

<1>Fill out a form and contact us
<2>Register for a training session and learn the GATE system


 Commission Based Marketing & Sales Agents Welcome   ^_^   ! 

  Licensing, sample software, and comprehensive training available, contact for details.  

Donate For Cybersecurity !


Online Demo GATECyberTech.com Details Software & Training FAQ Contact Us

View Min [ Frank ] Ni's profile on LinkedIn