Password-less login using the blockchain Starting at $0/mo.
ShoCard protects and verifies identity using strong public/private key encryption with multiple keys, data hashing, out-of-band communication, data matching, and two-factor authentication.
ShoCard’s game-changing pricing means almost no marginal cost to our customers for verifying identity. Banks and others can check identity on every transaction, virtually eliminating fraud.
No hard-to-remember passwords, no complicated code generators, no obscure challenge questions. ShoCard works on your phone, so it’s always at hand.
Register for and log into websites, membership/ID, stores, institutions, signing authority with delegation, more.
Users can login to websites without using the usernames and passwords. A website that supports the ShoCard platform can present a QR code next to their login screen. The user can scan this QR code using the ShoCard App. This will cause the App to ask the user to authenticate themselves using their passcode, TouchID or other biometrics. This authentication would then be passed along to the requesting website along with the session information and the user will be logged into the website.
A customer who calls into a call center can be authenticated without having to ask them questions to match identity information with the call center. Instead, the caller would simply provide one piece of PII, such as account number, email address or phone number. The user would be alerted by the ShoCard App that the organization they are calling is requesting them to authenticate themselves. The user would do this by entering their passcode, TouchID or biometrics on the mobile phone. This would in turn initiate a similar authentication process to those described above to verify the caller is the user and allow the rep to proceed.
Verify identity and account ownership without compromising privacy (biggest driver of identity theft), e.g. anti-phishing process, online banking security, no-password-login
The available application locations for this add-on are shown below, and depend on whether the application is deployed to a Common Runtime region or Private Space. Learn More
|Region||Available||Installable in Space|