Home » Business » Oluseyi Akindeinde of Hyperspace Secures Patent for Blockchain-driven Authentication System
Dr Oluseyi Akindeinde

Oluseyi Akindeinde of Hyperspace Secures Patent for Blockchain-driven Authentication System

*Hyperspace Technologies Limited has secured a patent for Blockchain technology-driven Multi-Factor Authentication (MFA).


IT News Nigeria:

Developed within the Hyperspace Technologies’ research and development (R&D) division, cipherKEY tap2sign™ MFA is a next-generation security system designed to leverage the decentralized nature of blockchain, the robustness of public/ private key cryptography, and the convenience of NFC (Near Field Communication) technology to provide an unprecedented level of security against identity theft, phishing, and social engineering attacks

Dr. Oluseyi Akindeinde has been credited as the inventor of this MFA that is poised to enhance a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.

The patent application was officially filed on June 22, 2023, and the patent certificate, sighted by our reporter, indicates that it was granted on August 28, 2023.

In the age of digital transformation, security is paramount. As individuals, businesses and nations increasingly rely on digital platforms for everything from banking to social networking, the need for robust security measures has never been more critical.

One such measure is Multi-Factor Authentication (MFA), a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.

Today, Hyperspace Limited has introduced cipherKEYtap2sign™, a groundbreaking MFA technology that leverages the security of public/private keys, blockchain, Web3 technology, and contactless Near Field Communication (NFC) cards.

It utilizes the concept of “proof of possession” and a fourth factor of authentication – “something you do”.

In the case of cipherKEY tap2sign™, “something you have” is the cipherKEY NFC card, and “something you do” is the action of tapping the cipherKEY NFC card against your phone.

READ ALSO  Anger as India approves crypto trading with massive 30% tax

This unique combination of factors makes thetap2sign™ system incredibly secure and user-friendly.

Before securing the patent, the Blockchain technology-driven MFA was subjected to rigorous reviews and tests.

Dr. Akindeinde’s inspiration for creating this MFA stemmed from his advocacies for blockchain technology-driven authentication processes.

“In a world where our digital identities are increasingly under threat, where a single misstep can compromise your entire network, where every transaction we make leaves us vulnerable, we understand your concern. We understand the sleepless nights. And that’s why we’ve spent years developing cipherKEYtap2sign™ MFA – your ironclad solution to security threats.

“Imagine a wall. A wall so high and so robust, nothing unauthorized can get over it, under it, or through it. That wall is the cipherKEY tap2sign™ MFA, and we’ve designed it to protect what matters most to you – your identity, your data, your peace of mind”, he said.

How does it work?

The process begins with user enrolment. Every user is provided with a digital identity on the blockchain. This identity is tied to a pair of public and private keys generated by a secure and certified Key Generation System (KGS). The private key is encrypted and stored on the cipherKEY that is given to the user, while the public key is stored in the blockchain network.The user scans a unique QR code using their mobile phone via the WalletConnect protocol. After scanning the QR code, the user’s mobile phone sends the public key to the server. This public key, generated by the WalletConnect protocol, serves as the user’s identifier.

READ ALSO  LG unveils HVAC new interactive online showroom

During authentication, the server generates a cryptographic nonce (a random number used only once) and sends it to the user’s mobile phone. The user is then prompted to tap their cipherKEY NFC card against their phone. The cipherKEY NFC card, which securely stores the user’s private and public keys, uses the decrypted private key (stored on the cipherKEY) to sign the server cryptographic nonce. The user’s phone then sends the signed cryptographic nonce back to the server.

In the verification phase, the server uses the public key to verify the signed cryptographic nonce. If the verification is successful, it means the nonce was signed with the

Share This:

Leave a Reply

Your email address will not be published. Required fields are marked *



Check Also

Innovative Conference “PayCom 2023” to Explores Future of Payments and Commerce

The Loveworld Institute of Innovation and ...

Sophos Supports Shift to Hybrid Environments with New Generation of Remotely Managed Wi-Fi 6 Access Points

Sophos, a global leader in innovating ...

LG GL-B221ALLB Refrigerator: Exceptional Quality With Larger Storage Capacity

IT News Nigeria: Advertisement Consumers can ...

Konga lines up global giants for Battle of the Brands

IT News Nigeria: Advertisement Konga, Nigeria’s ...

Samsung Unwraps Innovative Galaxy Z Flip5 and Galaxy Z Fold5 for Nigeria Market

*With an innovative form factor enhanced ...

%d bloggers like this:
Skip to toolbar