OTAC USIM Model

OTAC Solutions | USIM 


How would you feel if your IoT devices were operated under someone else's control? We are living in an IoT world where everything is connected, and cybercriminals are looking for new ways to strike. 

 

Most IoT devices are connected to a router and so the control center sends commands to each device through the router. Static information or plain text is used during this communication.

Before any command is transmitted to the device, what if the SIM verifies whether it is from the legitimate control center, and what if this SIM verification uses a technology that can generate a dynamic code that changed every single time yet still identifies the correct user? Event when the codes are stolen, what if this same code is only valid at a certain point of time, so it can never be reused.

 

For detailed information about SSenStone(swIDch, global HQ of SSenStone) and OTAC technology, please visit the website.

Next-Generation Authentication Security Lab, SSenStone. 

 

 

 

Comments