The HelixShield Technology

The HelixShield technology makes remote hacking practically impossible with a novel non-electronic passwordless multifactor authentication method. HelixShield encodes unique, user-specific, and immutable digital information in synthetic DNA molecules and stores the DNAs in miniature hardware tokens, which are distributed to authorized users along with a user-specific smartphone app. While authorized users with tokens are authenticated in a few seconds with an organization-specific token reader, remote hackers must spend endless time in biology labs with no hope of cracking the HelixShield technology.

.

Synthetic DNA Encryption

It has become a conventional wisdom that existing Multi-Factor Authentication (MFA) solutions, digitally encrypted USB Keys, and One-Time Passwords (OTP) are not future-proof: it is not if, but when cyber criminals find ways to circumvent those technologies.  Synthetic DNA data storage involves creating synthetic DNA and encoding digital information on the DNA itself as a novel way to encrypt data.  Digital information is digital encrypted first then encrypted again in synthetic DNA. DNA decryption is achieved in a few seconds through DNA hybridization.  Synthetic DNA Encryption is the key ingredient of delivering an elegant asymmetrical technology: quick and effortless for legitimate users to use and unbreakable for hackers.

Our Synthetic DNA Encryption method binds the authorized user’s identity to a Non-Fungible Hardware Token and to a Smartphone App, while binding server identity to a Token Reader.  To gain system access in a matter of seconds, a user simply inserts a token in a token reader that is placed next to an IT asset.  The required presence of physical token and token reader introduces an additional layer of protection against unauthorized access to sensitive data, while eliminating the risk of losing control over the keys needed to decrypt the data.

Read more

Three Factor Authentication

HelixShield represents a new class of cybersecurity technologies that combine the power of DNA technology and digital technology.

Non-fungible Hardware Token

Synthetic DNA that encodes digital information is stored in a miniature token. The information is user-specific, unique, hidden, and immutable.

Token Reader

A small device that is placed next to the IT system it protects and reveals data in a non-fungible hardware token in seconds.

Smartphone App

Device-specific smartphone app can only be installed by authorized users. The app works with the token reader to authenticate tokens.

Blockchain

Immutable digital information encoded in tokens are stored on a private blockchain and are used to authenticate tokens.  Only authorized users have access to this client-specific chain.  A decentralized chain of independent secure data blocks maintain data integrity and prevent server-side data tampering.

Read more

Predictive Analytics

Predictive analytics collect user behavior patterns, and identify suspicious activities in order to prevent attacks from occurring. When an attack does occur, machine learning algorithms generate a profile of what happened and take steps to prevent future occurrences.

Read more

Why HelixShield?

HelixShield is a next-generation, passwordless multi-factor authentication technology that puts a firm stop to the proliferation of ransomware attacks and other cybersecurity breaches.

  • Synthetic DNA exhibits incredible information density, allowing for significantly more data to be encoded vs. traditional data storage methods.
  • DNA encryption presents an unprecedented hurdle to hackers to overcome, because it can’t be cracked with computation alone. Time-consuming and labor intensive lab work is required with no guarantee of success.
  • DNA-based token requires no energy to maintain and lasts for thousands of years, forgoing the usual overhead costs associated with conventional data storage technology, and no mechanical failure to worry about.
  • The required presence of Non-Fungible Hardware Token, Token Reader, and Smartphone App for Authorized Users prevents remote hacking, period.
  • Effortless and insanely fast authentication for legitimate users, yet…
  •  Private Blockchain Ensures Data Authenticity and Enables Predictive Analytics.

Use Case Examples

A Definitive No to Ransomware

With the recent explosion of the remote workforce and rapid cloud adoption, companies must ensure the identity of the user behind every device.  Passwords are highly susceptible to abuse.  The elimination of threats and vulnerabilities related to passwords (phishing, stolen or weak passwords, password reuse, man-in-the-middle attacks, etc.) are fundamental to an organization’s cyber security.

Using a next-generation passwordless multi-factor authentication (MFA) to prevent network access with stolen passwords, and employing predictive analytics to detect abnormal user behavior, HelixShield can protect your network from remote hackers looking to breach your systems.

A hypothetical use case: using phishing techniques, a remote hacker was successful in obtaining the username and email address of an admin user at a well known law firm. However, when the hacker tried to log in as the admin user, the law firm’s website asks the hacker to insert a HelixShield token into a HelixShield reader and authenticate using the user’s smartphone app. The hacker did not have any of those three and did not know what information is stored in the token.  Reluctantly, he gave up.

Improve Cybersecurity Effectiveness

Every day, cyber-criminals become more advanced and sophisticated in their attacks.  Passwords are increasingly susceptible to  attacks and data breaches.  While traditional MFA relies on passwords and other weak factors, High Throughput Biology and our HelixShield Technology eliminate passwords for users and from internal databases, making all password-based attacks impossible. 

As One-Time Passwords (OTP) solutions gain wider acceptance, cyber criminals have found a way to circumvent it: Featured in The Rise of One-Time Password Interception Bots, services that offer bots to intercept OTP’s are springing up because they work, and are profitable. 

HelixShield will help as the following hypothetical use case shows: An industry leader that uses One-Time-Passwords (OTP) as the second factor to authenticate users was caught when a bot was used to intercept the OTP, allowing the hacker unfettered access.  The company decided to deploy our HelixShield technology. Because no OTP is shared between smartphone app and blockchain-backed database, and all data transmissions are encrypted and specific to devices, the bot is now useless and cybersecurity effectiveness is drastically improved.

Additional Applications

Secure the supply chain

Weed out deep fakes

Verify online purchase

About Us?

At High Throughput Biology, we have developed a next-generation authentication technology (HelixShield) to put a stop to the proliferation of ransomware attacks and other cybersecurity breaches. With the combination of novel DNA encryption, digital encryption, physical non-fungible token, and blockchain, we help businesses thrive.

Need a Support!!

CONTACT NOW

Contact Us

High Throughput Biology’s HelixShield authentication is a next-generation multifactor authentication technology with DNA encryption that is quantum computing-proof. Let’s talk today on how we can help on your cybersecurity needs

ContactAddress :Summit, NJ 07901, USA