Who needs TextKey™?
Small and medium-sized businesses (SMBs), enterprises, financial institutions, medical facilities or others that want to protect intellectual property, sensitive records, transactions or other important information from theft or illegal access.
Don’t companies already protect their websites?
Most websites are only protected by the standard user ID and password process simply because more effective protection has been too difficult, cumbersome or expensive for the average business to implement. The established and industry-accepted best practice for protecting a website from intruders that goes beyond ID/password protection is a “two-factor authentication” system.
What is Two-Factor Authentication system?
Two-factor authentication is a security process in which the user provides two means of identification. The first factor usually consists of a login name and password and the second consists of something the user has like a phone. In the case of TextKey™, our multi-factor authentication enhances the security of the user’s online accounts by using their phone and only their phone to verify their identity. This prevents anyone but the user from accessing their accounts, even if they know the user’s login name and password.
If it’s better why don’t all web sites use Two-Factor Authentication?
Two-factor authentication systems can be complex, difficult to install, constant work to maintain and are typically very costly. Only companies with significant information technology resources have been able to implement these systems in the past.
What makes TextKey™ multi-factor authentication different?
TextKey™ is a next-generation authentication system. It replaces complex, costly and high-maintenance systems with a simple approach that leverages the power of advanced messaging technologies and a cellular phone’s “fingerprint”. Many companies that have a need for security haven’t taken the appropriate steps to secure their environments because of the complications and expense. TextKey™ offers a way for companies of any size to implement multi-factor authentication quickly and inexpensively.
Why is TextKey™ more secure than other authentication systems?
Every cellular phone ever manufactured contains a unique device identifier (a “UDID”) that serves as the “fingerprint” of that device. While hacking or spoofing may work on common two-factor authentication systems because they receive, not send, text messages, the TextKey™ system eliminates this hacking by using the fingerprint of the phone to verify that the message is being sent by a legitimately authorized phone and not a “spoofed” number. A text message cannot be sent into the TextKey™ system without the cell phone carrying the correct UDID.
Furthermore, two-factor authentication systems rely on information being input into a browser by a user. Typically someone using a cell phone receives a text message containing an authorization code and then must enter the code that appears on the token or cell phone’s screen into a field on the web page. By definition this opens the process to “man-in-the-middle” (MITM) or “man-in-the-browser” (MITB) hacks that compromise the security of the entire process. TextKey™ uses a patented process that completely eliminates any information being entered into, or shared through, the browser. All communication occurs on a secure server-to-server connection outside of the browser environment and thus excludes, by definition, any possibility of MITM or MITB attacks.
Is TextKey™ difficult to set up on my website?
If your web site already uses a simple user ID and password system, more than 90% of the work is done.
How long does it take to implement it?
Compared to other 2FA systems that takes days or weeks to implement, TextKey™ can be installed on a typical website in a few hours. TextKey™ is designed so that our infrastructure does the heavy lifting; the majority of the code and processing occur on our system, not yours. TextKey™ doesn’t require any hardware or software that might interfere with your regular operations. Implementations may vary based on the complexity of your application, desired features, etc., but the only thing that is required for TextKey™ to work is to have a cellular phone number associated with each user ID and to have that information registered on our system.