Innovation To Increase Cybersecurity
Use short and easy to remember passcodes.
Defeat peeking, keylogging, phishing & dictionary attack.
Try GATE Demo |
1,000's of people have learned it. You ?! ^_^ |
I'm honored to share that GATE has been nominated for UN-sponsored WSIS Prizes 2024 ! |
The GATE system includes the following innovations :
[1] GATE Authentication : An interception-resistant authentication system US DISA TEM GATE authentication presentation [ 59 min. ]
[2] GATE Encryption : A potentially quantum computer resistant encryption system
Threats / Difficulties | Traditional Password | GATE Passcode |
(1) | Traditional passwords and security questions cannot prevent peeking, wiretapping, keylogging, phishing and dictionary attacks. |
(2) | Image and photo-based methods require users to upload images or photo files, and the system must maintain the images and photos. This not only increases the burden on the user and the system, but if a hacker takes a video and plays back the login process, the image can still be recognized. |
(3) | Graphics, gestures, or location-based authentication methods can only be used between humans and machines, and cannot be used for machine-to-machine authentication. |
(4) | Key fob and mobile phone based approaches which mainly rely on objects, may be lost, stolen or imitated. |
(5) | Fingerprints, facial recognition or iris scans are difficult to recover after data loss. |
Therefore, there is a need for an authentication and encryption system and method that can overcome the above-mentioned problems. |
[1] Over 80 Percent of Hacking Related Breaches Were Related to Password Issues
[2] 8 Most Common Causes of Data Breach
[3] Data Breaches in 2019 – 2021
[4] The 57 Biggest Data Breaches in History (Updated for 2021)
[5] Two-factor authentication is broken: What comes next?
[6] 6 reasons biometrics are bad authenticators
[7] What Are the Consequences of a Biometric Data Breach?
[8] Data leak exposes unchangeable biometric data of over 1 million people
[9] The Problem with Passwordless Authentication
[10] Bank accounts of New York 'roofie murder' victims drained via facial recognition technology [ Danger of Passkeys ! ]
[11] AI can identify passwords by sound of keys being pressed, study suggests
[12] Something nasty injected login-stealing JavaScript into 50K online banking sessions
[13] Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication
Traditional password system is causing a vicious cycle, because of its obvious exposure of user pins during the login process, hackers are able to easily steal user passwords by peeking over the shoulder, using hidden cameras to record and play back the login processes or directing users to phishing sites. Data breaches caused by password exposure in turn will pressure system administrators to enforce more strict password requirements onto the users, demands like : passwords must be at least 8 digits long, must have uppercase, lowercase, numbers and special characters. And every 2, 3 months users are required to change their passwords. These restrictions made it harder for users to remember their passwords. And therefore, users will have to save their passwords to somewhere, and when hackers get to that somewhere, all user passwords will be stolen.
GATE can use short and easy to remember passcodes to defeat peeking、wiretapping、keylogging、phishing and dictionary attack.
But the GATE system can play the role of armor and bullet-proof glass, enabling users to resist multiple types of attacks in a high-risk environment without exposing passwords.
Through the comparison between the current password system and the GATE authentication system, we can see the strength of the GATE system.
The "Open Sesame" style of password has been used for thousands of years. With improvements of hackers' abilities to steal passwords, existing password systems can no longer ensure the security of our networks. Now is the time to update the password technology to adapt to the modern digital world : "When the mara grows a foot, the magga grows a yard" [ Good defeats evil ] !
The interception-resistant authentication system GATE has won multiple international cyber security innovation awards.
GATE has been selected to the top 100, among more than 2800 technologies collected from all over the world at 2021 ZGC International Technology Trade Conference.
The innovative GATE system overcomes the weaknesses of traditional passwords. Special characters are part of the GATE design. It uses tokens [ groups of symbols, displayed on buttons ] to let user enter user pins from passcode, each token has several symbols, some randomly selected user pins are included in these tokens. It is impossible for hackers to tell which symbols in the tokens are valid user pins, which are non-user pins, thereby increasing password strength exponentially. Some user pins might not even appear in the tokens, in that case user can and must enter random tokens in place of those pins, and this uncertainty makes guessing your passcode much harder, like hiding a needle in a haystack.
Instead of entering one digit at a time like the traditional approach, the GATE system enters multiple symbols at a time as a token. Only someone with knowledge of the passcode will be able to tell if the token entered is valid or not.
Fixed passwords have the advantage of easy to remember, one-time passwords have the advantage of hard to hack, GATE passcode is a fixed passcode to the user, but from the hackers' perspective, it changes every time, GATE passcodes have the best of both worlds, short and easy to remember, yet secure and hard to hack.
Basically what GATE is trying to achieve is the following :
[a] Solve the main problem current password system has : user pin exposure during the authentication process, by peeking over the shoulder, phishing, keylogger or video camera.
[b] Ease requirements for passwords that make them hard to remember : lowercase, uppercase, numbers and special characters, at least 8 digits long, change every 2 ,3 months ...
[c] Avoid dictionary attack.
[d] Avoid problems of bio-metrics.
The biggest risk is not using the GATE system to protect passwords and causing them to be stolen !
Commission based sales / marketing agents welcome.
Info | → | Details | → | More | → | Solution | → | Product |
GATE_Comparison | A demo app to compare the weaknesses of traditional password systems to the strengths of the interception-resistant GATE authentication system --- Free Download & Use. |
Feedbacks From Cybersecurity Experts :
What do experts have to say about the GATE system.
-
Ted Murphree
Counsel, IT Privacy & Security, Researcher, Mentor, and GDPR scholar
“I’ve reviewed your dossier and am greatly impressed with your experience. Please let me know if I can be of assistance to you and hope to meet you at a conference in the future ...
“Frank, you've worked really hard on this, and it shows. You've brought "graphic examples" of what you're trying to get across. You're going to make it. Keep going down this path and there are big things ahead for you. Work smart. Not hard.
I'm happy to help, Frank. You've made a great deal of progress and you're going to be successful. You're in position now to do so...
Here's the thing - you've got drive and initiative. You've a rare talent... You're a maverick in a good way, forging your path.
There is risk in forging your own path, but also potentially great reward. You'd be happiest, I think, inventing and doing your "thing."
-
Scott Schober
President/CEO, Berkeley Varitronics Systems, Inc. Greater New York City Area
hi Frank,
This method is clearly very strong. Don't think brute force automated software will be able to compromise. I do like the wildcard & fact that the pins are sometimes obscured making it further challenging to hack. Key logger won't be successful ...
You have solved the hardest part- developing a very strong authentication method that 9 out of 10 hackers would give up on and move on. I think the next challenge is to demonstrate / implement in real world use cases that the average person can get ... i.e. short / simple video depicting someone using the GATE system accessing their online bank account
Thank you for sharing !
best
Scott -
Cary Pool
President : Southeastern Cyber Security Summit, North Alabama Chapter Information Systems Security Association (NAC-ISSA)
Hi Frank,
Sorry I missed this email for so long it was in my spam folder. It was great meeting you. Did you get any traction from Google's *** ?
Have you created an API that people can license and implement?
If you'd like to write an article about it we'd be happy to publish it on our NAC-ISSA.ORG website and link to your site.
I'll follow up with her and see if she'll respond.
Warm Regards,
Cary
-
Eduard B
National Technology Officer at Microsoft Romania, Bucharest, Romania
Thank you very much for reaching out to me. I have seen and implemented many authentication methods, but GATE looks very simple and strong.
I think the key is to ensure the security of the server with strong encryption and you can beat almost any authentication solution in the market today by simplicity, cost efficiency versus the provided level of security.
I will share it on my linkedin account - hope it helps to be seen by my network of security professionals, but also i will recommend it to some banks/insurance/security services providers that i am in contact with on security topics.
I will also get back to you for more info about real life implementation, if needed. Once again, thanks for sharing and congrats for such an outstanding and simple solution !
Regards,
Eduard -
Jonathan Rosenoer
Blockchain Strategic Partnership Leader & IBM Master Inventor, New York, New York
This is a pretty cool solution. (And I see a lot of inventions every week.) we should find time for a call.
How are you commercializing this?
Jonathan
Awards Won :
|
|
|
|||
GATE won "Innovation Award In Cyber Security" at IET on 14 November 2018, in Brewery, London. |
GATE won "Global Excellence Award" at 2020 Info Security Products Guide. |
GATE has been selected to the top 100, among more than 2800 technologies collected from all over the world at 2021 ZGC International Technology Trade Conference. |