A Better Infrastructure

Starts with two simple ideas

  1. Never store a complete dataset in one place
  2. Use two keys to assemble and unlock the data

Two ideas combined into a powerfull security strategy

WWPass provides a unique key to every user (UserID) and another unique key for the Vendor (we call this key a SPID - Service Provider ID). The SPID is used for every vendor specific application, or public organization that must authenticate its users.

WWPass creates a separate Data Container which corresponds to each user registration at a particular Service Provider's website or application (i.e. for each UserID/SPID pair). To open this box, two keys are needed: first the user’s key (containing the UserID) and second, the Service Providers key (containing the SPID). In the reality the Data Container address is calculated as a one-way function of SPID and UserID. Another one-way function is used to cypher the Data Container content. Finally, the Data Container is dispersed over WWPass storage nodes using Reed-Solomon transformation.

Our 3 Steps to Data Security

  1. User Key: The user can either use a physical token (for maximum security) or a smartphone token.
  2. Service Provider Key: Each individual service provider (such as a website, application or enterprise) has a unique identified called a SPID.
  3. When the two keys are combined, a data miner opens a Data Container which is assembled from 12 fragmented, encrypted and globally-dispersed datacenters. This data container can hold everything from something as simple as a username and password, to something more complex like a sensitive set of files or documents.

Limitless Data Segregation

Every combination of a users' ID and a Service provider ID unlocks a unique data container. This allows for no intersection between datasets, greatly reducing and fragmenting attack surfaces across the network. For an even greater level of security, users can be asked to provide a password in addition to their key (utilizing two-factor authentication).

  1. Container 1 is unique to the user's relationship with Service Provider 1. It does not share a virtual location with any other datasets.
  2. Container 2 is unique to the user's relationship with Service Provider 2.

A Smarter Key

  1. USB connector for easy plug and play
  2. Ultra-thin design for easy carrying and storage
  3. Advanced cryptographic processing chip
  4. Near Field Communication (NFC) allows for touch-and-go authentication
  5. Loop for easy attachment to your keychain

A Smartphone Option

A mobile soft-token can be used on mobile devices. With a reduced level of protection, it offers the convenience and flexibility of using something that every employee already has in their pocket: their smartphone.

Get it on Google Play Get it on App Store