Technology & Architecture

WiKID was designed from the ground up for the Internet age using public-private keys instead of shared secrets. Unlike time-synchronous and counter-based OTP systems, WiKID only generates a code upon reciept of a proper request - a validly encrypted correct PIN.
Architecture Overview
Unlike most other two-factor authentication solutions, WiKID uses asymmetric keys rather than shared secrets.
WiKID's Strong Authentication Software Token Device Client Support
WiKID supports the broadest selection of operating systems in the industry. If you need Windows, Mac, Linux, J2ME, PocketPC/SmartPhone/Windows Mobile or Blackberry, we have you covered. Indeed, if you need a custom client, we can develop it. If you need to embed two-factor authentication into your application, we can do that too.
WiKID Strong Authentication Domains
In WiKID a user is associated with a "Domain". The domain in turn points to a Network Client - completing the triangle.
How does the WiKID Software token work?
An overview of the transactions between the WiKID Server and the WiKID Software Token.
WiKID Mutual Authentication
Typical one-time passwords systems are susceptible to man-in-the-middle attacks. WiKID combines one-time passcodes and site authentication in our PC clients to create a cryptographically secure mutual authentication system.
WiKID Strong Authentication Network Clients
Network Clients can be network services such as VPNs or SSH or another server which proxies the authentication request to the WiKID Server such as a RADIUS server or an LDAP server. Additionally, we provide a simple API and sample JSP or ASP pages for Web-enabled applications using our SSL-encrypted authentication protocol - perfect for adding two-factor authentication to extranets and intranets.
WiKID Transaction Authentication
Even with stronger session and mutual authentication, there is still a risk from session-hijacking trojans. Using WiKID for transaction authentication will thwart session-hijacers.

Document Actions

Ever since deploying WiKID, we  have  secured our Production systems from unauthorized access and maintained PCI compliance