Problems Solved

/Problems Solved
Problems Solved 2018-05-02T03:32:59+00:00

Passwordless Secure Login

Passwords are inherently inconvenient and insecure. Users typically use weak passwords or re-use the same passwords across different sites. The centralized list of passwords at these sites are high-value hacking targets and even the largest sites on the internet have proven to be vulnerable, leaking millions of passwords. While 2-Factor-Authentication (2FA) improves security, it is still not widely used and SMS-based 2FA is vulnerable to attacks such as SIM-card cloning. What is needed is a new authentication solution that is easy to use, much more secure and that works across both mobile apps and web sites.

Trusted Key’s multi-factor authentication meets all these requirements and also eliminates the need for a centralized repository of passwords.

Developer Documentation

Authenticated Identity KYC

A growing number of scenarios, from banking and healthcare to shared-economy transportation and accommodation services, require the user to verify their real-world identity online. These KYC systems must at the same time be secure enough to prevent fraudsters from impersonating others, while having low enough friction to minimize customer drop-offs. This is an even more difficult challenge in a world in which most service providers will primarily interact with their customers online, through a mobile device, and never meet them face-to-face. Current knowledge-based authentication systems, which depend on the user correctly answering a set of personal questions, are cumbersome for the user while being unreliable for institutions as it is easy for hackers to obtain answers to those questions on the dark web.

Trusted Key provides a frictionless, secure, reusable, and privacy-preserving way for users to bring online their real-world government issued identity documents (such as driver’s license or passport), and use them to easily and securely verify their identity to any app or service provider.


Transaction Authorization

As chip based credit and debit cards have rolled out across the retail landscape, point-of-sale fraud has gone down significantly. However, the overall rate of credit card fraud is actually increasing, much of it driven by fraudulent Card Not Present (CNP) transactions. According to Javelin Strategy & Reseach, CNP fraud increased 15% last year.[1] This is driven by the fact that CNP transactions only require the knowledge of credit-card numbers and associated user information, all of which can be acquired in bulk on the dark web. Trusted Key allows financial institutions to provision users with cryptographic credentials that they can use to reliably authenticate themselves and verify that CNP transactions are indeed initiated by the card-holder.

[1] Wall Street Journal – February 1, 2017

Developer Documentation

Document Signing

Current digital signing solutions rely upon the delivery of a link (typically via email) to a signatory which provides them the ability to view and sign the document. The only item required to electronically sign the document is access to that link.  This means that these systems are vulnerable to hacking and spoofing of the intended recipient. When a digitally signed document is returned to the requestor, it is very difficult to prove who actually “signed” the document. For this reason, “wet signatures” are still required in important scenarios such as when executing a mortgage or real-estate transaction.

Trusted Key improves the effectiveness of digital signature solutions by providing users with a strong cryptographic identity based on their verified government-issued identity documents. This cryptographic identity can then be used to digitally sign documents and embed that identity into the document itself. This improves the security and effectiveness of digital signature solutions, and makes it applicable to more scenarios than previously possible.

Developer Documentation