Two-Factor Authentication Token
SecureOTP AS
SecureOTP Event
SecureOTP Time
SecureOTP CR
SecureOTP Mobile
PASSWORD SECURITY ASSESSMENT
ADVANCED MULTI-FACTORS AUTHENTICATION
Fast ID Online Token

Other Products And Services

PKI Solution
Multi Factor Authentication
FIDO Token
Software Protection Dongle
Digital Signature Solutions
Mobile Application Security
Certification Authority System
Password Security Assessment
Cryptography Customization
Cryto As A Services
Smart Card Reader

SecureOTP Mobile

OTPmobile

Modern Solution for Modern Living

Developments in mobile communication technology have revolutionized the way that people interact and access information. Mobile devices are constantly evolving to serve a host of complex functions and services which are increasingly focused on sensitive matters such as commerce, business and personal information. Mobile OTP is a convenient and easy to use application that enables users to harness the power of two-factor authentication (2FA) for secure network log-in and key based challenge response protocol from their favorite mobile devices.

Powerful Access Restrictions Manage Risk from Loss or Theft
The strong authentication capabilities of Mobile Token are secured by the user’s ability to change the access password as well as the number of acceptable trials and the time period that a password maintains it validity. Secured in a password protected application the powerful token features are limited exclusively to the rightful token proprietor.

Compatible with Time (TOTP), Event (HOTP) One Time Password (OTP) Protocols
HOTP utilizes a dynamic event based algorithm, creating a unique password in the form of a number sequence, regenerated for each new log-in. Once the user has confirmed themselves in the application, access is granted to the one time password which is retrieved on demand- with the push of a button.

TOTP requires no user input to facilitate the change of log-in credentials, it is based on an algorithm that generates a new password to correspond to the passing of time and eliminates the possibility of passwords which can stagnate without user input for an indeterminate period of time.

Use in conjunction with OATH Challenge Response Algorithm (OCRA)
This enables the user to access the broad base of functions available with challenge and response technology. These features include the secure digital signing of transactions and sensitive data; once the digital signature is affixed to a file, its content can not be altered by so much as one character without causing a revocation of the secure sign. The unique response sequence generated by a specific user challenge (as well as the reverse process) can be utilized to cross validate servers and websites making certain that the intended destination is not being misrepresented; a user can validate the system before logging in and entering sensitive data and likewise the system can validate the user to be assured that they are who they claim to be.

FOAS and Mobile Token: Working Together
The Mobile Token solution can be delivered as part of a more complete package whereby when used in tandem with the OATH Authentication Server (FOAS) back end token management system. Adopting Mobile Token in conjunction with FOAS helps institutions mitigate the scope of their IT infrastructure from overhead expenses to administration.

Downloads

SecureOTP Brochure

what is the ideal solution that can provide STRONG AUTHENTICATION to protect your valuable business information?

DOWNLOAD

Related Two Factor Authentication Products And Services

SecureOTP Event

Two Factor Authentication

SecureMetric offers Open Authentication Technique (OATH) compliance dynamic password system, which consists of SecureOTP Authentication Server with SecureOTP series of hardware and mobile tokens. This solution can effectively address the weakness of User Name and Password with additional layer of security on the hand of the end users. So far, SecureMetric already implemented more than 20 2FA projects to banks and enterprises across Southeast Asia.

LEARN MORE

SecureOTP Event

SecureOTP AS

SecureOTP Authentication Server playing the role as a powerful Two-factor authentication (2FA) backend and the console of the SecureOTP implementation. It serves as a dynamic password and transaction verification platform with mutual authentication mechanisms that can achieve the objective to verify the authenticity of the user application system and the identity of the logged in user.

LEARN MORE

SecureOTP Event

SecureOTP Event

SecureOTP Event offers strong hardware based dynamic password for one time use Two-Factor Authentication through Event synchronous One-Time-Password technique or Event based One-Time-Password. This hardware token is designed based on OATH standards and can be seamlessly integrated into any OATH compliance backend system. The user just need to press the button on the token and a set of password will be dynamically generated.

LEARN MORE

SecureOTP Time

SecureOTP Time

SecureOTP Time is another form of hardware based dynamic password system based on real time clocks reside inside the hardware token and the backend authentication server. Usually Time synchronous One-Time-Password technique is more secure than Event based One-Time-Password. This hardware token is designed based on OATH standards with built-in real time clock and can be seamlessly integrated into any OATH compliance backend system.

LEARN MORE

SecureOTP CR

SecureOTP CR

SecureOTP CR is built based on OATH Challenge Response Algorithms (OCRA) which enables a real-time Two-Factor Authentication that can effectively establish mutual authentication to be taken place. It will require the user to enter the given numbers from the application as Challenges, where the user needs to key in that Challenge and eventually key in the generated number as the Response, back to the application. SecureOTP CR can prevent common threat from Man-In-The-Middle Attacks.

LEARN MORE

Get in touch with us

For more information regarding our services and solutions contact one of SecureMetric’s sales representatives. We have agents worldwide that are available to help with your digital security needs. Fill out our contact form and one of our representatives will be in touch to discuss how SecureMetric can assist you.