The HelixShield Technology
The HelixShield technology makes remote hacking practically impossible with a novel non-electronic passwordless multifactor authentication method. HelixShield encodes unique, user-specific, and immutable digital information in synthetic DNA molecules and stores the DNAs in miniature hardware tokens, which are distributed to authorized users along with a user-specific smartphone app. While authorized users with tokens are authenticated in a few seconds with an organization-specific token reader, remote hackers must spend endless time in biology labs with no hope of cracking the HelixShield technology.
.
Synthetic DNA Encryption
Our Synthetic DNA Encryption method binds the authorized user’s identity to a Non-Fungible Hardware Token and to a Smartphone App, while binding server identity to a Token Reader. To gain system access in a matter of seconds, a user simply inserts a token in a token reader that is placed next to an IT asset. The required presence of physical token and token reader introduces an additional layer of protection against unauthorized access to sensitive data, while eliminating the risk of losing control over the keys needed to decrypt the data.
Three Factor Authentication
HelixShield represents a new class of cybersecurity technologies that combine the power of DNA technology and digital technology.
Non-fungible Hardware Token
Synthetic DNA that encodes digital information is stored in a miniature token. The information is user-specific, unique, hidden, and immutable.
Token Reader
A small device that is placed next to the IT system it protects and reveals data in a non-fungible hardware token in seconds.
Smartphone App
Device-specific smartphone app can only be installed by authorized users. The app works with the token reader to authenticate tokens.
Blockchain
Immutable digital information encoded in tokens are stored on a private blockchain and are used to authenticate tokens. Only authorized users have access to this client-specific chain. A decentralized chain of independent secure data blocks maintain data integrity and prevent server-side data tampering.
Predictive Analytics
Predictive analytics collect user behavior patterns, and identify suspicious activities in order to prevent attacks from occurring. When an attack does occur, machine learning algorithms generate a profile of what happened and take steps to prevent future occurrences.