Challenges

Like any past or future human activity, Internet technology introduces new threats. Swindling attempts such as identity theft or hijacking are increasingly numerous. Phishing attacks, nowadays widely used by hackers,
aim at recovering logins and passwords in order to usurp web surfer identities. The legal responsibility of service providers is committed when security best practices are not enforced.

Ethertrust Solution

EtherTrust designs strong authentication technologies, based on smart cards that are compatible with all operating systems such as Microsoft, Apple, or Linux. The user plugs in a USB dongle equipped with a smart card.

The device delivers trusted computing services, runs EtherTrust software and stores certificates and cryptographic keys. This system guarantees that the Web browser and the customers computer are not involved in the identification process; the smart card autonomously performs authentication operations. As a consequence Trojan horses running on the laptop cannot recover any sensitive data.

Benefits

  • The end of phishing: customers no longer enter any logins and passwords, thus this critical information cannot be stolen.
  • More satisfaction for customers:
    • Faster connections: the end of the headache in trying to remember which login and which password are required for each WEB site.
    • A simpler connection: the customer uses his Secure Element, for example a USB key, inserts it into the terminal and that’€™s it!€
      The user also has the choice of protecting the dongle with a four digit PIN code or by using a biometric method, in order to disable the potential loss or theft of a portable secure device
    • A more secure connection: our technology avoids eavesdropping of sensitive information connected with bank accounts.
  • May be used as a consumer loyalty card

image not displayed