You might attend one of the large cyber security trade shows or a national conference on defeating hackers and keeping your company's data safe, and emerge thinking "hackers don't have a chance of getting in". And then you see yet another headline on yet another big data breach, and reality kicks in. We're far from winning you think. But wait, there's a new technology in town, which has the ability to start levelling the playing field.
If a set of technologies clearly don’t work well, should you blindly keep on using them? That’s the question we asked ourselves several years ago when looking at today’s inadequate authentication systems and products. We could see that all of them suffered from major flaws. Perhaps the biggest is that they all require users to give up something valuable - like a mobile number or fingerprint (to name just two) - which can ALL be stolen.That’s worth repeating. Virtually all current authentication systems depend on user secrets or objects which can be stolen, rendering them weak and vulnerable. So we set out a number of years ago (around 2005) to create something where the user’s all-important “secret” could not be stolen, is never exposed, only resides in the user’s head, and does not depend on users having to carry extra bits of plastic (including phones) to prove who they are. Shayype technology we believe is the first real advance in cyber security for decades. Now users can enjoy the convenience of passwords, with the strength of 2FA - without the clutter and cost of having to use extra devices. Not even phones! Shayype displays a different code (a one-time passcode or OTP) on the user’s screen, meaning it’s far more secure than say vulnerable “two-step” authentication systems where users are sent codes by text. These can so easily be diverted to hackers’ own phones simply by taking over a user’s mobile account. We also hope to save the world from the burden of having to use longer and “stronger” passwords, which just get harder to remember – so end up being written down or stored en masse. All that’s now inthe past. The future now looks more secure for all of us, as at last cyber security can (pardon the pun) Shayype up.
Jon is Technical Director of ShayypeLtd. and has been working in the field of systems and software engineeringsince 1989. After graduating from De Montfort University (Leicester) with aBEng (Hons) in electronic engineering, he joined Philips Communications andSecurity in Cambridge as a systems design engineer, creating large securitysystems for clients such as Manchester Airport (Terminal 2) and the Bank ofEngland. Since leaving Philips in 1996, Jon has undertaken software developmentroles for BT, Nokia, EDS, IBM and T-Mobile, specialising in softwaredevelopment using open source platforms and cutting-edge multi-media webapplications.
Jonathan is the founder of Shayype having pioneered pattern-based authentication in Europe as long ago as 2005. His background is in communications, media (both as print and broadcast journalist), public relations and conference organisation. In 2008 a company he set up to begin exploring the potential of device-less OTP authentication was awarded “Cool Vendor”status by Gartner, and in 2009 the same company won UKTI’s Franco-British Award for Innovation. Now as part of the Shayype team he hopes to save the world from the burden of passwords, replacing them with what is arguably the first new knowledge-based “factor” for use in human authentication in decades.
Patrick is responsible for marketing at Shayype and loves building and delivering world-class solutions for clients. He has spent over 10 years working in the tech transformation space, delivering solutions for some of the largest public and private sector organisations in the UK. Working in this space has enabled him to see a need for change in the way we authenticate ourselves and secure our data and finances. Being a key member of the Shayype team allows him to help clients do just this. Outside of work he is a happy family man who enjoys spending time with his loved ones. He is looking forward to changing the world.
Paul is responsible for commercial development at Shayype.He is an experienced corporate business builder, having led Companies acrossEMEA, including playing a key role at FedEx, where he created a newdivision to focus on e-commerce activity to address the new needs of thedigital age. For the past 10 years he has been a hands-on Investor,helping early stage tech businesses across multiple sectors start and scaletheir operations. Three companies he has supported have featured in the SundayTimes Fast Track 100 – and his goal is to add Shayype to that list, based onthe value the company will create for its customers.
Tor is responsible for techdevelopment at Shayype. His vast experience includes working in strategy, programme management, transformation and delivery of large-scale IT systems in banking, financial services, regulation, insurance and government. Tor believes successful IT operations and change programmes stem from a clearly-defined IT strategy, and that an holistic approach is needed to ensure any IT organisation delivers added value and business benefits through rationalisation and consolidation across the IT estate.
HOW CAN WE HELP?
If there’s a risk of you being overlooked or recorded, there are two additional versions of Shayype (‘Evade’ and ‘Swipe’) designed to defeat such threats. Talk to us directly about those.
No – it’s very different – for several reasons. Shayype allows users to extract or ‘generate’ one-time codes (passcodes) which can either be input or used for other purposes (securely reading a one-time login code over the phone, or giving a credit/debit card one-time ‘PIN’ to a carer or shop-assistant being two examples. Also the Android swipe can be shoulder-surfed, isn’t very variable, and may even leave a greasy mark (with Shayype the user never touches the screen).
You’ll be able to re-set your pattern securely. (Talk to us directly to find out how user security is maintained.)
No. That would betray your secret pattern. You just read off the numbers and input them on a separate keypad (on the device or using a stand-alone one on-screen). One of the strengths of Shayype is that it’s practically impossible for someone watching you to work what your pattern is – as there are at least seven of each digit. Which ‘5’ did you use, which ‘4’ etc.
We’d say it’s far easier to remember a pattern. Our brains are hard-wired to recognise shapes like faces - far more so than horrendous hard-to-recall sets of characters. One of the brilliant things about Shayype is that it allows users to set up something extremely complex – a secret that’s really hard to guess – extremely easily!
Absolutely. Users of Shayype combined with most of the state-of-the-art IAM packages on the market allow users to authenticate just once rather than having to do it again each time they want to use individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users – which hugely raises security (as there are no longer multiple places where possibly ‘shared’ passwords are stored). Once logged-in to an IAM via Shayype, users won't have to log in again to access a different application.
Yes. In fact, we want to build a system which will allow things like Google password and phone-based two-factor to be replaced by Shayype. Google Authenticator with its QR codes and phone-based OTPs clearly isn’t the answer most people want. The system has been around for approaching a decade, yet a year or so back one of the Google security engineers revealed that less than 10% of users have it. So, we’re aiming to build an alternative: whenever you need to authenticate, a Shayype matrix will pop up and you’ll just read off and input a securely delivered OTP to prove it’s you. We’re going to welcome support from people like you in exchange for getting hold of early versions. Watch this space.
Yes. Shayype Keycloak provides single sign-out, which means users only have to log out once to be logged-out of all applications that use Shayype Keycloak.
Shayype is the ideal answer. Users will be armed with something that’s as simple (some would say simpler!) as passwords – a mentally-held pattern or shape – which has all the effect and strength of two-factor as it ‘generates’ one-time passcodes. And all without having to carry any additional hardware, even a phone.
Instead of vulnerable fixed strings of characters, users are armed with secret patterns or shapes, which when applied to small grids containing numbers (typically 5X7) populated with random (frequently repeated) single digits, neatly and elegantly provide users with new ‘one-time’ codes for each transaction, while resisting threats such as shoulder-surfing.