Sie sind auf Seite 1von 2

IN N EFU L ab s is a research oriented Information Security consulting group specializing in

meeting the Information Security needs of the consumer via specialized products and services. We believe in innovating and creating the latest technologies to combat the rapidly grow-

TM

ing menace of hacking and reduce dependency on human factors. We offer a complete gamut of Information Security services under one roof which includes our patented and patent pending products like 99% Secure - Cyber Cafe Surveillance, Tactical Internet Interception, Multi Factor Authentication, Link Analysis and Pattern Matching and services like complete corporate security

Two Factor Authentication

process management, web application security and managed security services.

Cred ent ials

Empanelled with DRDO Labs for multiple indigenous products.

A strong Board of Advisor consisting of former Army officers and academicians

Only Indian company to have developed an indigenous Two Factor Authentication (Hard token,

Push Token

USB Token, Image based login)

Only Indian company to have developed and deployed an independent Internet Monitoring System across an entire region

Successfully tracked ring of cyber criminals operating from within India as well as from outside

Served key clients in Private and Public sector for more than four years

Management with combined experience of more than 5000 Hours in information security

Largest trained manpower for Cyber Intelligence with a Private company in India

Multiple patent pending technologies including Cyber Caf surveillance, Tactical Internet Monitoring System, Multifactor Authentication

ARE YOU STILL USING THE


90s TECHNOLOGY OR
HAVE MOVED ON
TO THE LATEST
ONE!
Inf orm ati on S ec uri ty at Its best

Corp Add:- 8th Floor, Unit 876


Aggarwal Cyber Plaza II,
Netaji Subhash Palace , Delhi -110034, India
+91-11-47065866 / 27356211-12 ,
+91-9313050131
E-mail: info@innefu.com
website: www.innefu.com

Hard Token

USB Token

The Problem

Different Token Types from AuthShield

OTP-based authentication definitely adds


an extra step to your log-in process. However, depending on the form factor and the
vendor you chose it can be a minor inconvenience or a major pain. Much also depends on your users patience and your
willingness to spend the extra time to ensure a higher level of security. Users find
it difficult to enter OTPs in devices.

In this scenario, Innefu has launched a


revolutionary concept to use smart phones
as a medium for Two factor Authentication. One Touch Authentication bypass
the standard One Time Passwords, and
brings a truly Two Factor Authentication
experience which beats all hacking mechanisms including Key Logger

Token Type

It generates a new
password a er xed
intervals of me.
The user enters the
password generated
by the hard token as
a secondary form of
authen ca on.

Description
The Solution: AuthShield One Click TM
AuthShield One-Touch Authentication is the latest innovation
in Two factor Authentication. Once a user is registered for One
Touch Authentication he receives a Push Notification on his
smart phone every time he attempts to log in. The user just has
to Approve or Deny the request by a Single One Touch
Authentication on his device to log in or reject the attempt.

Mobile token is
convenient form
factor installed on
the smart phone
itself . OTP is generated in the Smart
Phone itself

In SMS token
One Time Password is generated and sent to
the registered
mobile phone of
the user.

All OATH
Compliant
tokens

Platforms

AuthShield so
token is a convenient form
factor installed
on the laptop /
desktop itself.
The user enters
the password
generated by
so token.

All Phones
With SMS

One Click Authentication Architecture


Requires Mobile
Operator
Connec vity

Offline Usage?
Seamless integra on with

Financial transac ons


Web applica ons
VPN
Mail solu ons
Remote server
Ac ve Directory Login
Cloud
ERP solu ons

ADVANTAGES

Doesnt slow you down while logging-in

Doesnt require any extra hardware tokens

Uses asymmetric cryptography to sign and verify communica ons


Delivered over a mutually-authen cated secure transport
An a acker cant breach as it is based on Public-private key infrastructure

Operating Systems
Au

hie
S
h
t

ld

va
Ad

s
ge
a
t
n

Unparalleled Support

Indigenous Technology

Competitive Advantage

Au
th

Sh
iel
dA
dv
an
tag
e

Robust and Proven Technology

Simple and Easy Integration

Our Expertise in dealing with various Government Agencies

USB token is based


on Public Key Infrastructure PKI Technology. It enables
the use of digital
signature, digital
receipt, encryp on
and permissions
management services.