Solutions
FIDO
International standard for convenient universal biometric authentication
swIDch Auth SDK provides groundbreaking FIDO-based authentication functions that resolves the issue of
vulnerability posed by ID and passwords methods. Utilizing authentication based on the user’s biometrics (e.g.,
fingerprints, faces, etc.), you can expect a secure environment of the highest standard from simple log-in functions
to electronic signatures,
Biometrics
Devices capable of recognizing biometrics (e.g., fingerprints, faces, etc.) provide more convenient and quicker
authentication. User biometric information is neither sent nor saved to the server, making it more secure.
authentication. User biometric information is neither sent nor saved to the server, making it more secure.
Pattern
On the mobile device screen, users can verify themselves using a registered pattern.
PIN
Without the need for a complex password, users can verify themselves by setting a 4-digit or 6-digit simple PIN number.
PC Log-in
If generated QR codes from PC log-in screens are scanned using mobile device cameras or the code is
inputted, the PC will be logged in.
inputted, the PC will be logged in.
Digital Signature
Using FIDO transactions, we provide encryption and digital signature PKI functions within the mobile
environment such as data integrity encryption/decryption and user and data authenticating electronic
signatures. (PKCS #7 standard digital signature)
environment such as data integrity encryption/decryption and user and data authenticating electronic
signatures. (PKCS #7 standard digital signature)
Private Key
Implementing a private key system based on FIDO authentication technology, we create a PDF digital signature
that can be used for electronic contracts and agreements. (PKCS Detached standard digital signature)
that can be used for electronic contracts and agreements. (PKCS Detached standard digital signature)
Server/Administrator
They provide FIDO SDK related administrator functions such as user management, service maintenance, and
log management (authentication registration, success, and failures).
log management (authentication registration, success, and failures).
Learn More
White paper on Identity and Access Management Get In touchRelated Topics
Why should we pay attention to authentication SDKs?
swIDch, an authentication technology startup in cybersecurity has launched a new product. It is an authentication solution that this multi-award-wining startup has been focusing and developing for years.
Read More
API vs SDK. What’s the difference? It's what you're developing...
In today’s rapidly changing business environment, many organisations are looking to develop pragmatic apps and software with the aim to create highly personalized, seamless digital experiences for their clients.
Read More
The era of DIY kits for software development
As social distancing has become common due to the prolonged impact of COVID-19, Do-It-Yourself (DIY) trends are spreading from simple furniture assembly to home interior construction.
Read More