1 / 11

Cypak core technology

Cypak core technology. Combat fraud and keep your customer happy. New convenient security solutions for online gaming. Fraud is now seriously affecting eGaming. Phishing - User is cheated to reveal password/username to alien Bots Automated software that plays instead of real person

ford
Télécharger la présentation

Cypak core technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cypak core technology Combat fraud and keep your customer happy New convenient security solutions for online gaming

  2. Fraud is now seriously affecting eGaming... • Phishing- User is cheated to reveal password/username to alien • BotsAutomated software that plays instead of real person • Money theft- through stolen credit cards • Non-repudiation- User denies game/transaction • Multiple identities- One user plays simultaneously with multiple identities and accounts • Money laundry

  3. …but security solutions are awkward • Static username/password is fast and cheap – But not secure! • Secure authentication devices used for eBanking, corporate login, etc are often regarded as:- Awkward- Time consuming, slows down the process- Costly

  4. Combining security with convenience Cypak eSecurity- New Internet access tokens combining convenience with security End-user advantages- Loyalty, convenience and security Merchant benefits - Less fraud/bad debt, reinforced brand Cypak Cards and Key

  5. System components The end-user Key or Card + readerconnected to the USB port of a PC or Mac The merchantAuthentication Software running on server

  6. How it works • The user is connected to web-sitePlaces the Card on reader or the Key in The USB port • The user is authenticatedEnters a 4 digit PIN on Card/Key • Username and password is sentThe card automatically sends the username and a one-time password to the server Using Card + reader Using Key

  7. Marketing benefits • Brand reinforcement - Enabling visual branding logo, corporate profile and text or Card/Key, daily exposed in physical wallet or keychain • Enhanced credit limits and bonuses - Bonus program integrated in physical token- Stronger authentication enables higher credit limits • Increased trust - For the merchant and between users/players. Any colour and text on Card and Key

  8. Security benefits • No sensitive data stored in or entered on computer • Eliminates phishing- No static username/password - New time sensitive pass code every time • Fights non-repudiation issues- Stronger authentication ties user to performed action • Prevents bots - A physical human action can be asked for during game • Prevents stolen credit cards- Strong two factor authentication • More than one identity per computer is not practical

  9. Convenience benefits • Faster than username/password- Automatic navigation to web-site- Only 4 digits required • No software hassles- No client software, works on all platforms • No redesign of current web- Seamless integration with legacy username/passwords • The end-user chooses her own PIN- Can be changed anytime • One card/key can be used to mutiple sites • Card can be combined with withdrawal functionality

  10. Technical data • Size of Card: Standard ISO 7810 credit card • Size of card reader: 100 x 53 x 7 mm, or as OEM component for customized reader design (in mouse pad, computer terminal, etc.) • Card/card reader communication: Low cost contactless, robust, no wear and tear • Card reader connection: USB • Size of USB-Key: 70 x 16 x 7 mm • ID in token: Unique 64 bit, factory programmed, unalterable • Pass code generated by token: One-time, 128 bit, 22 alphanumeric characters, patented time variant • Encryption: 128 bit AES, superior security

  11. References • Built on Cypak PIN-on-Card technology awarded the EU IST Grand Prize 2005 “for representing the best of European IT-innovation”, prize money 200 000 Euro • Card technology successfully validated in references installations in Scandinavia • Verified by leading Internet security experts • Projects initiated with gaming industry For more information:www.cypak.com/esecurity or e-mail: esecurity@cypak.com

More Related