Pain points

In the IoT era, Machine-to-Machine communication technology is the key to establishing an industrial automation environment through information exchange between various devices such as sensors and gateways. Therefore, maintaining a strong authentication network is the first step for a smart factory infrastructure.

- Replay attack

In the process of verifying that the user is correct, the server system exchanges encrypted data such as electronic signatures between users. In the meantime, a third-party hacker tries to impersonate a legitimate user by copying the data that is in transit on the network and then transmitting it to the server as it is. For example, if an industrial robot that performs a service based on recorded data is subjected to a replay attack, it may not be able to perform normal tasks and may endanger workers nearby.

- Impersonation attack

In a modern factory system, numerous machines are paired and operated for efficient production. An impersonation attack is tricked into being a device connected to each other using a persistent encryption key or a long-term key used when multiple devices are first paired. Since the mutual authentication process is no longer required, the attacker controls the devices as the master.

Solutions

SSenStone helps manufacturing companies in the industry 4.0 era complete a successful digital transformation by providing a more secure authentication process to each device and user that make up the manufacturing system.

  • Provide unidirectional code generated by the client without communication with the server
  • Generate a dynamic code that is changed every time and is safe from hacking and leakage
  • Block attacks in advance with one-time code that does not allow cloning and spoofing attacks
  • Protect devices by issuing a unique code that never overlaps with other connected devices


- OTAC in M2M

Machine to Machine (M2M) Authentication

  • Existing

    dia-2 (3)
  • SSenStone

    SSenStone

AI 스피커 로그인 및 결제

매번 변경되는 센스톤의 일회성 인증 코드를 본인의 고유 음성으로 읽는 것만으로 AI 스피커를 활성화시킬 수 있습니다. 진공 청소기, TV, 냉장고, 쇼핑 등 IoT 기기와의 페어링부터 결제까지 안전한 인증을 바탕 으로 AI 스피커 기술과 생태계를 확장할 수 있습니다.

- IFF OTAC

OTAC는 통신 네트워크가 없는 상황에서도 IFF가 고유한 다이내믹 코드를 생성하고, 생성값을 인증하여, 단방향으로 간편하게 타깃을 식별할 수 있도록 하는 혁신적인 인증 기술입니다. OTAC 기술을 활용하여 생성된 단방향 다이내믹 코드는 아군 식별 및 적의 신호 도용 방지에 적용됩니다.

Machine

SSenStone’s core algorithm allows secure authentication of a user in a single ended flow, greatly reducing the number of round trips in M2M communication. However, it can also be adapted to authorise a role: to determine what an authenticated user is allowed to do. When a user authenticates using OTAC, the authentication server can return a second OTAC containing information about that user’s role and a digital signature authorizing that user to access permitted resources.

The user’s OTAC and the authorisation OTAC can then be combined into a passport OTAC, which can be used by a service requiring access to another service’s resources as a dynamic guarantee of authorisation. This second service can then interpret the passport OTAC, only granting access where the original user’s role authorises it. All the information the called service needs is encapsulated securely and dynamically in the passport OTAC, assuring trust without the need for an external service.

Only SSenStone’s proprietary technology can support this form of distributed authorisation, giving our customers a world-beating, performance-oriented solution to the vital problem of trust. We consider this distributed authorisation the future of trust in large service networks!

Why OTAC

OTAC, developed by SSenStone, is the original technology that provides all of the following features at the same time.

Main Image

    OTAC is a dynamic code, which means the code keeps changing. As a result, you don’t need to worry about any leak of your personal information, such as your card details, because the codes must have already been changed when others try to use them.

    The network connection is NOT necessary at all for generating OTAC.

    Reducing an authentication stage that requires the network connection directly means there are fewer gateways for the hackers to access our personal information.

    Moreover, this feature enables users to authenticate even when they are in networkless environments, such as on the plane, underground, rural or foreign areas.

    swIDch can guarantee that the code never duplicates with anyone at any given moment.

    There is NO chance of someone else having the same code.

    The users or their devices can be identified with the code alone.

    Once OTAC has been generated, providing OTAC alone is already fully sufficient to identify the user as the code is unique.

    It means, you can forget about the bundles of static information including IDs and passwords.

University of surrey

The University of Surrey, one of the leading global cyber security companies in the UK, conducted OTAC algorithm analysis and academic verification of SSenStone. For the full text of the thesis, please visit the University of Surrey website and download the report.

Contact Us

Improve your authentication environment and
make your service reliable with SSenStone!

Inquire now.

5F, 329, Cheonho-daero Dongdaemun-gu, Seoul, Republic of Korea

Contact below if you have an urgent inquiry.

Korea Office (SSenStone)

5F, 329, Cheonho-daero Dongdaemun-gu, Seoul, Republic of Korea (02622)

Tel : 02-569-9668  |  Fax : 02-6455-9668

im@ssenstone.com

UK Office (swIDch)

swIDch Ltd Office 176, 1st Floor, 3 More London Riverside, London SE1 2RE

Tel : 020-3283-4081

info@swidch.com