The Security Industry’s Coveted Excellence Award Winners and Finalists from all over the world were
We naturally have an SMS product for those users who choose not to use our free mobile application. The PINsafe protocol makes SMS a stronger and more flexible proposition. Our SMS solution is therefore far superior to others in the market.
Our SMS solution can be used as a traditional one-time-password (OTP) solution or for added security with PINsafe, our patented one-time -code extraction protol. Invoking the PINsafe protocol ensures access is not comprised should a phone be lost or stolen.
Our SMS option can be implemented in a number of ways:
The user will be asked for an authentication code (usually via a button on an authentication form). They will then request a security string to be sent to them. The security string is only valid for a finite period.
The user is sent a new security string after every authentication attempt, ensuring that the user always has the next security string in their inbox ready to use for their next authentication.
This is a variation of the automatic option, where a user is sent a number of security strings in each SMS message – each string is used in turn. When they have used the last string, a new message with the next set of strings is sent to them. This has the benefit of reducing SMS costs and also means the user can have a number of security strings available to them even when they are out of GPRS coverage.
- Fast to deploy – Nothing to distribute/reclaim – reduces overhead/implementation costs
- Nothing to buy
- SMS is a globally used communication tool and requires no IT literacy
- Facilitates mobility and business enablement
SMS Based Authentication Data Sheet
A key, and unique feature, of our authentication platform is our patented one-time-code extraction protocol PINsafe. PINsafe combines the use of registered PINs with random 10 digit security strings that are sent to you either by browser, mobile app, SMS and telephone either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. Learn More