SlideShare a Scribd company logo
1 of 14
Introduction to AutoPassword™
Service that automatically creates and enters a
password
AutoPassword™
Assistant Manager : David Kim
Dkim35@autopassword.com
Automatically creates and enters a password
01 Problems of User Password
02 AutoPassword™ Overview
03 AutoPassword™ Management
AutoPassword™ Pricing Policy05
04 AutoPassword™ Disruptive Features
06 AutoPassword™ Best Practices
07 About DualAuth
AutoPassword™
Copyright © DualAuth, LLC. All Rights Reserved.
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
01
Inconvenience and vulnerabilities of user password
The credentials of traditional login system can easily be leaked or stolen, and they are vulnerable to phishing or
pharming attacks. Also, since the users tend to use the same password for different services, access to single
username and password can be used by hackers to access multiple sites.
Phishing
Pharming
Entering
Passwords
Memorizing
Passwords
Problems of User Password
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
Prevent
Phishing
Prevent
Pharming
Free from
Password
02
Magical service that automatically generates and enters a password for you
It is the password replacement technology that automatically enters a password for the user when the user enters his
or her ID on the online service. AutoPassword™ technology generates two random passwords on users’ screens and
smaryphones. Once the generated passwords are displayed on users’ smartphones, then they can compare them with
the password generated on the PC screen and see if they match. By visually comparing these two numbers, users can
verify if the online service is normal and not phishing / pharming sites. Most importantly, you don’t need to
memorize your passwords anymore.
AutoPassword™ Overview
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
Provide API
Cloud based
AutoPassword™
Authentication Server
Provide AutoPassword™/Service
Service Server
Service Terminal
Provide
Authentication
Service
AutoPassword™ Mobile App
03
3-1 Adding an AutoPassword™ mobile app and authentication server to the existing
online services
AutoPassword™ consists of Authentication server and Mobile Application. Autopassword connects to the associated
service server and provide authentication service. Then, the service server communicates with the service terminal to
deliver the generated password to the user’s mobile app. DualAuth provides various APIs to help the customers
integrate their existing services to the AutoPassword™’s authentication server.
AutoPassword™ Management
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
03
3-2 AutoPassword™ registration phase
The implementation of AutoPassword™ is easy. You just need to add an agreement page that asks the users if they
want to use the AutoPassword technology. Then, just assign identification numbers for each user. AutoPassword™
technology does not require any personal information, but only requires customer’s ID and identification numbers for
verification purposes. Depending on the organization’s security policy, the randomly generated identification numbers
can be distributed by SMS, email or on the screen. Once the user registers themselves on the mobile application,
they will be able to login using the AutoPassword™.
AutoPassword™ Management
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
PC Demo Mobile App Demo
03
[881 566][AutoPassword] ShopCare Login
is requesting authentication
[881 566][AutoPassword] ShopCare Login
is requesting authentication
3-3 AutoPassword™ authentication phase
AutoPassword™ automatically works when the user enters ID by accessing the user’s PC or mobile service. As soon as
the user enters ID, AutoPassword™ is generated on the smartphone. User just needs to verify the passwords then
click a button to log in. Without having to switch to different screens in the mobile phone, users can simply log in
using a push notification.
AutoPassword™ Management
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
03
3-4 AutoPassword™ deactivation phase
The user can deactivate the AutoPassword™ service anytime on the service screen. Clicking the deactivate button on
the existing deactivation page will remove the registered mobile phone and send a notification to the user’s phone. If
the user switches to a different phone or need to reinstall the app, he or she needs to reinstall the mobile app.
AutoPassword™ Management
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
03
3-5 The method of application of Auto2FA™for Social Login
AutoPassword™ can be set to run as Automatic Second Factor Authentication (Auto2FA™) after user logs in using
social network credentials. This provides extra security measures against stolen credentials. Even when the users’
social network credentials are stolen, Auto2FA™ can securely protect the user’s account.
AutoPassword™ Management
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
User
Authentication
AutoPassword™ Disruptive Features
Service
Authentication
04
4-1 DualAuth technology that verifies both the user and the service
We differentiate from all of our competitors by allowing the users to verify the service providers. Traditionally, the
authentication was one sided. Even what we call mutual authentication, refers to machine-to-machine verification. By
providing randomly generated 6 digit password, DualAuth adds human to this interaction. Not only the service
verifies if the right user is attempting to log in, but also the user is able to verify if the service is legitimate by
comparing the generated passwords. Among all current authentication technologies out there, this is the only
solution which allows users to be authenticate the service.
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
Portal
Fintech
Cloud
IoT
AutoPassword™ Disruptive Features04
4-2 Replace various user passwords with one AutoPassword™
With AutoPassword™, the users don’t have to remember or enter user passwords for different services. Once the
AutoPassword™ connects to the service server, users can immediately use the AutoPassword™ service. Since the
Autopassword can connect to multiple different services, users won’t have to manage their passwords for as many
services as they want.
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
Backup Password Login Enter Backup Password
User Password Login
Issued Backup Password
Admin
Enter User PasswordChange login to User Password
AutoPassword™ Disruptive Features04
4-3 What if you lose your phone?
AutoPassword™ provides a user password function and an additional backup code in case when the user loses or
does not have an access to his or her phone. The backup passwords will be generated and sent to the user via SMS
or email. Autopassword will continue to generate numbers and, for each number, there will be a backup password
that pairs with the Autopassword. User needs to enter the corresponding backup password to login.
Login with Backup Password
AutoPassword™
Backup Password
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
AutoPassword™ Disruptive Features04
Biometric
Authentication
4-4 The password service with the world best security authentication technologies
AutoPassword™ is integrated with the world’s best security authentication technologies and has excellent usability. In
fact, our technology is Fido certified and also incorporates biometric authentication technology, PKI authentication
technology and our own unique service authentication technology.
Automatically creates and enters a password
AutoPassword™
AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
06 Use Cases
Shopping Agent AutoPassword™ OKKY AutoPassword™ KMUG AutoPassword™

More Related Content

What's hot

ADSelfService User guide
ADSelfService User guideADSelfService User guide
ADSelfService User guide
ADSelfServicePlus
 

What's hot (8)

ADSelfService User guide
ADSelfService User guideADSelfService User guide
ADSelfService User guide
 
Razorpay payment gateway integration in laravel and vue js 2
Razorpay payment gateway integration in laravel and vue js 2Razorpay payment gateway integration in laravel and vue js 2
Razorpay payment gateway integration in laravel and vue js 2
 
Razorpay Payment Gateway Integration In iOS Swift
Razorpay Payment Gateway Integration In iOS SwiftRazorpay Payment Gateway Integration In iOS Swift
Razorpay Payment Gateway Integration In iOS Swift
 
Creating a Sign On with Open id connect
Creating a Sign On with Open id connectCreating a Sign On with Open id connect
Creating a Sign On with Open id connect
 
Deep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected AppsDeep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected Apps
 
Part 3
Part 3Part 3
Part 3
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue Handling
 

Similar to Password Replacement Technology : Removing Limitations of Current Passwords

CGS4308- Group 5 Poster
CGS4308- Group 5 PosterCGS4308- Group 5 Poster
CGS4308- Group 5 Poster
Michael Belyea
 

Similar to Password Replacement Technology : Removing Limitations of Current Passwords (20)

Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
 
encryption ppt
encryption pptencryption ppt
encryption ppt
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Managing Identity and Securing Your Mobile and Web Applications with Amazon C...
Managing Identity and Securing Your Mobile and Web Applications with Amazon C...Managing Identity and Securing Your Mobile and Web Applications with Amazon C...
Managing Identity and Securing Your Mobile and Web Applications with Amazon C...
 
Credit Cooperative Society Software
Credit Cooperative Society SoftwareCredit Cooperative Society Software
Credit Cooperative Society Software
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
 
Universal login
Universal loginUniversal login
Universal login
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Devteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystifiedDevteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystified
 
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
 
CGS4308- Group 5 Poster
CGS4308- Group 5 PosterCGS4308- Group 5 Poster
CGS4308- Group 5 Poster
 
OAuth in the Wild
OAuth in the WildOAuth in the Wild
OAuth in the Wild
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Password Replacement Technology : Removing Limitations of Current Passwords

  • 1. Introduction to AutoPassword™ Service that automatically creates and enters a password AutoPassword™ Assistant Manager : David Kim Dkim35@autopassword.com
  • 2. Automatically creates and enters a password 01 Problems of User Password 02 AutoPassword™ Overview 03 AutoPassword™ Management AutoPassword™ Pricing Policy05 04 AutoPassword™ Disruptive Features 06 AutoPassword™ Best Practices 07 About DualAuth AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved.
  • 3. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. 01 Inconvenience and vulnerabilities of user password The credentials of traditional login system can easily be leaked or stolen, and they are vulnerable to phishing or pharming attacks. Also, since the users tend to use the same password for different services, access to single username and password can be used by hackers to access multiple sites. Phishing Pharming Entering Passwords Memorizing Passwords Problems of User Password
  • 4. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. Prevent Phishing Prevent Pharming Free from Password 02 Magical service that automatically generates and enters a password for you It is the password replacement technology that automatically enters a password for the user when the user enters his or her ID on the online service. AutoPassword™ technology generates two random passwords on users’ screens and smaryphones. Once the generated passwords are displayed on users’ smartphones, then they can compare them with the password generated on the PC screen and see if they match. By visually comparing these two numbers, users can verify if the online service is normal and not phishing / pharming sites. Most importantly, you don’t need to memorize your passwords anymore. AutoPassword™ Overview
  • 5. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. Provide API Cloud based AutoPassword™ Authentication Server Provide AutoPassword™/Service Service Server Service Terminal Provide Authentication Service AutoPassword™ Mobile App 03 3-1 Adding an AutoPassword™ mobile app and authentication server to the existing online services AutoPassword™ consists of Authentication server and Mobile Application. Autopassword connects to the associated service server and provide authentication service. Then, the service server communicates with the service terminal to deliver the generated password to the user’s mobile app. DualAuth provides various APIs to help the customers integrate their existing services to the AutoPassword™’s authentication server. AutoPassword™ Management
  • 6. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. 03 3-2 AutoPassword™ registration phase The implementation of AutoPassword™ is easy. You just need to add an agreement page that asks the users if they want to use the AutoPassword technology. Then, just assign identification numbers for each user. AutoPassword™ technology does not require any personal information, but only requires customer’s ID and identification numbers for verification purposes. Depending on the organization’s security policy, the randomly generated identification numbers can be distributed by SMS, email or on the screen. Once the user registers themselves on the mobile application, they will be able to login using the AutoPassword™. AutoPassword™ Management
  • 7. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. PC Demo Mobile App Demo 03 [881 566][AutoPassword] ShopCare Login is requesting authentication [881 566][AutoPassword] ShopCare Login is requesting authentication 3-3 AutoPassword™ authentication phase AutoPassword™ automatically works when the user enters ID by accessing the user’s PC or mobile service. As soon as the user enters ID, AutoPassword™ is generated on the smartphone. User just needs to verify the passwords then click a button to log in. Without having to switch to different screens in the mobile phone, users can simply log in using a push notification. AutoPassword™ Management
  • 8. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. 03 3-4 AutoPassword™ deactivation phase The user can deactivate the AutoPassword™ service anytime on the service screen. Clicking the deactivate button on the existing deactivation page will remove the registered mobile phone and send a notification to the user’s phone. If the user switches to a different phone or need to reinstall the app, he or she needs to reinstall the mobile app. AutoPassword™ Management
  • 9. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. 03 3-5 The method of application of Auto2FA™for Social Login AutoPassword™ can be set to run as Automatic Second Factor Authentication (Auto2FA™) after user logs in using social network credentials. This provides extra security measures against stolen credentials. Even when the users’ social network credentials are stolen, Auto2FA™ can securely protect the user’s account. AutoPassword™ Management
  • 10. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. User Authentication AutoPassword™ Disruptive Features Service Authentication 04 4-1 DualAuth technology that verifies both the user and the service We differentiate from all of our competitors by allowing the users to verify the service providers. Traditionally, the authentication was one sided. Even what we call mutual authentication, refers to machine-to-machine verification. By providing randomly generated 6 digit password, DualAuth adds human to this interaction. Not only the service verifies if the right user is attempting to log in, but also the user is able to verify if the service is legitimate by comparing the generated passwords. Among all current authentication technologies out there, this is the only solution which allows users to be authenticate the service.
  • 11. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. Portal Fintech Cloud IoT AutoPassword™ Disruptive Features04 4-2 Replace various user passwords with one AutoPassword™ With AutoPassword™, the users don’t have to remember or enter user passwords for different services. Once the AutoPassword™ connects to the service server, users can immediately use the AutoPassword™ service. Since the Autopassword can connect to multiple different services, users won’t have to manage their passwords for as many services as they want.
  • 12. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. Backup Password Login Enter Backup Password User Password Login Issued Backup Password Admin Enter User PasswordChange login to User Password AutoPassword™ Disruptive Features04 4-3 What if you lose your phone? AutoPassword™ provides a user password function and an additional backup code in case when the user loses or does not have an access to his or her phone. The backup passwords will be generated and sent to the user via SMS or email. Autopassword will continue to generate numbers and, for each number, there will be a backup password that pairs with the Autopassword. User needs to enter the corresponding backup password to login. Login with Backup Password AutoPassword™ Backup Password
  • 13. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. AutoPassword™ Disruptive Features04 Biometric Authentication 4-4 The password service with the world best security authentication technologies AutoPassword™ is integrated with the world’s best security authentication technologies and has excellent usability. In fact, our technology is Fido certified and also incorporates biometric authentication technology, PKI authentication technology and our own unique service authentication technology.
  • 14. Automatically creates and enters a password AutoPassword™ AutoPassword™ Copyright © DualAuth, LLC. All Rights Reserved. 06 Use Cases Shopping Agent AutoPassword™ OKKY AutoPassword™ KMUG AutoPassword™