We enable organizations to manage digital identities and control user access to critical corporate information

Pain points

IoT devices are easy targets for hacking and targeted malware. When exposed to these attacks, IoT devices are prone to large-scale information leakage or accidents.

Weak and predictable passwords

Most IoT devices come with a password set in advance when shipped from the factory, leaving some users easily exposed to risk as a result of not updating the password. Even if you change your password, this static code becomes an easy game for hackers.

Unsecured network services

Devices connected to networks communicate continuously amongst themselves using various wirelesscommunication protocols. Such communication guarantees the response of IoT applications, but if it becomes infected by malicious code or hijacked by a low-security wireless protocol, this poses real cause for concern. Numerous IoTs, such as radio-controlled aircraft, radio-controlled cars, and industrial drones, have the potential of being hijacked.

Improper data transmission

The onboard chip used for communication between the telemetry module and the unmanned device mainly uses a low-security wireless protocol. So any sophisticated hacker who can reverse engineer the software on an unmanned device can send navigation controls, block all commands from real operators, or even crash them.

The solution

IoT security strategies should reduce vulnerabilities by using policies such as device identity management, encryption, and access control. swIDch provides a safe IoT communication environment by making it impossible to hack and take control of a device through a random code that changes every time in connection and commands.

  • Provide unidirectional code generated by the client without communication with the server
  • Generate a dynamic code that changes every time and is safe from hacking and leakage
  • Block attacks in advance with one-time code that does not allow cloning and spoofing attacks
  • Protect devices by issuing a unique code that never overlaps with other connected devices


swIDch enables user and device identification by simply passing the OTAC generated by the user or drones to the authentication server without the help of the server. By searching and verifying commands that change by virtual code for each order, it is possible to prevent the takeover of control in advance.

Control module
  • User command receiver
  • OTAC Virtual code generator
  • Detailed code generation unit
Drone module
  • Detailed code generation unit
  • Command search section
  • OTAC Virtual code authentication unit
  • Control decision unit

It searches for and verifies commands that change by virtual code for each command to prevent the taking of control.

AI Speaker

Users can easily identify themselves by calling the one-time authentication code of swIDch, which changes every time, anytime, anywhere, to the AI speaker. It is possible to expand the AI speaker technology and ecosystem based on safe authentication from pairing with IoT devices such as vacuum cleaners, televisions, refrigerators, and shopping to payment.

AI Speaker Login and Payment

Why swIDch

OTAC, developed by swIDch, is the original technology
that provides all of the following features at the same time.
Sufficient to IDENTIFY user
DYNAMIC Authentication code
that does NOT duplicate
Uni-directional authentication
in off-the-network environment

OTAC is a dynamic code, which means the code keeps changing. As a result, you don’t need to worry about any leak of your personal information, such as your card details, because the codes must have already been changed when others try to use them.

The network connection is NOT necessary at all for generating OTAC.

Reducing an authentication stage that requires the network connection directly means there are fewer gateways for the hackers to access our personal information.

Moreover, this feature enables users to authenticate even when they are in networkless environments, such as on the plane, underground, rural or foreign areas.

swIDch can guarantee that the code never duplicates with anyone at any given moment.

There is NO chance of someone else having the same code.

The users or their devices can be identified with the code alone.

Once OTAC has been generated, providing OTAC alone is already fully sufficient to identify the user as the code is unique.

It means, you can forget about the bundles of static information including IDs and passwords.