Solutions
Omni-Access Security
Omni-Access Security
We guarantee top-tier security and user-friendly access for IoT devices. Powered by our Omni-Access Security technology, your smartphone is the only tool you'll need for seamless access—whether it's activating a device or entering a space—without any key or password.
No codes, no passwords, no more key
Pioneering global security
Easy operation for all ages
Omni-Access excels in versatility
Traditional accessing methods, including passwords, are vulnerable to cyber threats due to widespread reuse and breaches. Physical identity proofs, like keys or cards, are easily lost or stolen. Keyless entry enablement is no longer a trend but a necessity.
MFA
Cost Effective
Secure Privacy
Breadth of Application
Reliability
Keyless
Unreplicability
MFA
Cost Effective
Secure Privacy
Breadth of Application
Reliability
Keyless
Unreplicability
With Omni-Access
Traditional unlocks without Omni-Access
How does it work?
Engineering Security & Convenience into the Everyday Life of Tomorrow with Software & Hardware Dual Protection
Our phone-as-a-key solution
With TrustZone security chip to secure
It's the correct phone
The phone is in the right hands
All the correct info is recorded or extracted accurately
Significant risks due to the lack of 1HSMs with software integration
Attackers can transmit fabricated data
Attackers can retrieve sensitive data
Attackers can gain control over its software
ONE ecoID for Safer Cross-Device Data Exchange
"ecoID" is the cornerstone of our system - a collective identity of the authentic user, phone, and device pairing. Powered by our cutting-edge Omni-Access Security technology, building on the sturdy foundation of Public Key Infrastructure (PKI) and Multi-Factor Authentication (MFA) and TrustZone security chip, this sophisticated framework simplifies the intricate processes of authentication and authorization, automating interactions between users, phones, and devices. With one ecoID, users can enjoy unified user experiences while accessing various ecoKeyless branded devices.
A set of “ecoID” replaces countless passwords and keys - not stored somewhere temporarily, but genuinely no longer needed!
A set of “ecoID” replaces an average passwords reset cost of US$70 - no passwords, no worries about forgetting!
A set of “ecoID” spans across multiple devices and industries - no need for additional integration, welcome everywhere you go!
Crucial to phone-as-a-key solutions is the relationship between a legit phone and the IoT device. The Phone needs to be recognized as the User's agent and permitted to control the device.
- Authorization: for Phone to become the agent of User
- Authentication: for Device to be ensured that it is the correct Phone held by the authorized User
- Accounting: for all information in the processes to be faithfully recorded
- Confidentiality: for all information in the processes to be encrypted for transmission and could only be decrypted by legit authority
- Integrity: for all the information in the processes not to be tampered with or deleted
- Availability: for the system to work smoothly, enabling the authorized User to access or use promptly without interruption
- Security chip of ARM Cortex M22 with TrustZone: ensure all the information be safely stored and used in Trusted Execution Environment (TEE).
- 20+ global innovation patents for the assurance of security throughout the processes.
- IEC 62443-4-1 certified for the assurance of security of the software on our PKI cloud platform, app, and security chip.
Our offline, remote temp code setup solution
Offline Defense: Eradicating cybersecurity threats
Temp code validity setup remotely
Temp code usage frequency setup remotely
Online Exposure: Risking yourself to major attacks
Our globally exclusive technology enables users to remotely generate temporary passwords with specified validity and usage frequency settings, all without an internet connection. This not only reduces cybersecurity risks but also ensures energy efficiency and cost-effectiveness for the door lock.
Applications
Unlocking anything now requires a code, password, or key, whether online or offline
Join our ever-expanding ecosystem to bringing Simpler & Stronger Security to Market
Omni-Access Security solution has gained support and engagement across various industries, committed to assisting more brands in diminishing their dependency on passwords or keys. We eagerly anticipate ongoing collaborations with companies to bolster the cybersecurity stance of IoT, all while ensuring a seamless user experience. Join us on this journey!