Change had to come

You might attend one of the large cyber security trade shows or a national conference on defeating hackers and keeping your company's data safe, and emerge thinking "hackers don't have a chance of getting in". And then you see yet another headline on yet another big data breach, and reality kicks in. We're far from winning you think. But wait, there's a new technology in town, which has the ability to start levelling the playing field.

Our story

The Shayype of things to come

If a set of technologies clearly don’t work well, should you blindly keep on using them? That’s the question we asked ourselves several years ago when looking at today’s inadequate authentication systems and products. We could see that all of them suffered from major flaws. Perhaps the biggest is that they all require users to give up something valuable - like a mobile number or fingerprint (to name just two) - which can ALL be stolen.That’s worth repeating. Virtually all current authentication systems depend on user secrets or objects which can be stolen, rendering them weak and vulnerable. So we set out a number of years ago (around 2005) to create something where the user’s all-important  “secret” could not be stolen, is never exposed, only resides in the user’s head, and does not depend on users having to carry extra bits of plastic (including phones) to prove who they are. Shayype technology we believe is the first real advance in cyber security for decades. Now users can enjoy the convenience of passwords, with the strength of 2FA - without the clutter and cost of having to use extra devices. Not even phones! Shayype displays a different code (a one-time passcode or OTP) on the user’s screen, meaning it’s far more secure than say vulnerable “two-step” authentication systems where users are sent codes by text. These can so easily be diverted to hackers’ own phones simply by taking over a user’s mobile account. We also hope to save the world from the burden of having to use longer and “stronger” passwords, which just get harder to remember – so end up being written down or stored en masse. All that’s now inthe past. The future now looks more secure for all of us, as at last cyber security can (pardon the pun) Shayype up.

Meet our team.

Jackson is a CTO with 18 years’ experience in software and app development. He has successfully completed projects that saved companies £800k annually and contributed to the sale of a business for £3.5 million supported by technology he helped create.

Jackson Howell

Chief Technology Officer

John has long been a pioneer in FinTech and the Digital Trust model for internet transactions, having helped to found Barclays’ original Information security management team, and in 2000 helping to set up IdenTrust - a global bank joint venture. He is now heavily involved in the development of distributed ledger technology in fintech.

John Bullard

DIRECTOR

Jonathan is the founder of Shayype having pioneered pattern-based authentication in Europe as long ago as 2005. His background is in communications, media (both as print and broadcast journalist), public relations and conference organisation. In 2008 a company he set up to begin exploring the potential of device-less OTP authentication was awarded “Cool Vendor”status by Gartner, and in 2009 the same company won UKTI’s Franco-British Award for Innovation. Now as part of the Shayype team he hopes to save the world from the burden of passwords, replacing them with what is arguably the first new knowledge-based “factor” for use in human authentication in decades.

Jonathan Craymer

president & Founder

Ready to implement password-free seamless authentication?

get in touch

HOW CAN WE HELP?

Frequently Asked Questions

Can I have several patterns?

Yes. Like having multiple passwords, you can have more than one pattern. However (although this is up to individual users) you may decide having just one, or even two, patterns is enough.

How do I get set up with Shayype and register my secret pattern before using it for the first time?

Typically, you’d be directed (perhaps via an email link) to a webpage containing a ‘blank’ grid. You then just click on a few dots to create a secret pattern or shape (guided by a neat ‘strength’ meter). The system then suggests you try out your pattern by seeing a dummy ‘real’ grid and reading off numbers. If you can do that OK, the system will ask if you want to save your pattern, and you’re done. It’s as simple as that.

What if someone is filming me, or has put screen-scraping and key-logging software on my device?

If there’s a risk of you being overlooked or recorded, there are two additional versions of Shayype (‘Evade’ and ‘Swipe’) designed to defeat such threats. Talk to us directly about those.

Is it possible to use Shayype on other IAM packages or existing/legacy systems?

Certainly. We will be able to offer an SDK (software developers’ kit) and our existing API library will adapt to any system.

I’m an individual keen to use online facilities (e.g. Gmail or Google apps) in the most secure way possible. Will Shayype help me?

Yes. In fact, we want to build a system which will allow things like Google password and phone-based two-factor to be replaced by Shayype. Google Authenticator with its QR codes and phone-based OTPs clearly isn’t the answer most people want. The system has been around for approaching a decade, yet a year or so back one of the Google security engineers revealed that less than 10% of users have it. So, we’re aiming to build an alternative: whenever you need to authenticate, a Shayype matrix will pop up and you’ll just read off and input a securely delivered OTP to prove it’s you. We’re going to welcome support from people like you in exchange for getting hold of early versions. Watch this space.

Will IAM with Shayype allow facilities such as single sign-on (SSO)?

Absolutely. Users of Shayype combined with most of the state-of-the-art IAM packages on the market allow users to authenticate just once rather than having to do it again each time they want to use individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users – which hugely raises security (as there are no longer multiple places where possibly ‘shared’ passwords are stored). Once logged-in to an IAM via Shayype, users won't have to log in again to access a different application.

does the same apply to logging out with Shayype Keycloak.

Yes. Shayype Keycloak provides single sign-out, which means users only have to log out once to be logged-out of all applications that use Shayype Keycloak.

I understand security is raised because my pattern will never be stored in its original form?

Yes. Compared to existing systems such as MS Active Directory where encrypted passwords are stored, the Shayype system offers far higher security as users' secret patterns are not actually stored in their original form.

If I forget my pattern, what do I do?

You’ll be able to re-set your pattern securely. (Talk to us directly to find out how user security is maintained.)

We’re a large organisation, with millions of users. Will Shayype help us?

Yes. Shayype is highly scalable, so in theory huge numbers of users can be granted a one-time passcode facility. This means whole user/customer-bases could be provided with greater online security, or a city/town could do the same for its citizens.