Solutions

ISO logoISO/IEC 27001:2013 Certified
ISO logoARM PSA Level 1 Certified
ISO logoIEC 62443-4-1 Certified
Omni-Access Security
Custom Service
thingsPKI
Omni-Access Security
Custom Service
thingsPKI

Omni-Access Security

We guarantee top-tier security and user-friendly access for IoT devices. Powered by our Omni-Access Security technology, your smartphone is the only tool you'll need for seamless access—whether it's activating a device or entering a space—without any key or password.

No codes, no passwords, no more key

Pioneering global security

Easy operation for all ages

Omni-Access Security image
Omni-Access Security image small

Omni-Access excels in versatility

Traditional accessing methods, including passwords, are vulnerable to cyber threats due to widespread reuse and breaches. Physical identity proofs, like keys or cards, are easily lost or stolen. Keyless entry enablement is no longer a trend but a necessity.

Omni-Access excels in versatility image
Omni-Access excels in versatility image

MFA

Up to 5 factors authentication

Cost Effective

Exceptionally affordable

Secure Privacy

Encrypted storage and transmission

Breadth of Application

Applicable to any product requiring a password or key

Reliability

Missjudgment is highly unlikely

Keyless

No more password or key

Unreplicability

Fraudulence is highly unlikely
Omni-Access excels in versatility image

MFA

Up to 5 factors authentication

Cost Effective

Exceptionally affordable

Secure Privacy

Encrypted storage and transmission

Breadth of Application

Applicable to any product requiring a password or key

Reliability

Missjudgment is highly unlikely

Keyless

No more password or key

Unreplicability

Fraudulence is highly unlikely

With Omni-Access

Traditional unlocks without Omni-Access

How does it work?

Engineering Security & Convenience into the Everyday Life of Tomorrow with Software & Hardware Dual Protection
Our phone-as-a-key solution
Omni-Access

With TrustZone security chip to secure

It's the correct phone

The phone is in the right hands

All the correct info is recorded or extracted accurately

VS
Other IoT security techs

Significant risks due to the lack of 1HSMs with software integration

Attackers can transmit fabricated data

Attackers can retrieve sensitive data

Attackers can gain control over its software

1Hardware Security Modules

ONE ecoID for Safer Cross-Device Data Exchange

"ecoID" is the cornerstone of our system - a collective identity of the authentic user, phone, and device pairing. Powered by our cutting-edge Omni-Access Security technology, building on the sturdy foundation of Public Key Infrastructure (PKI) and Multi-Factor Authentication (MFA) and TrustZone security chip, this sophisticated framework simplifies the intricate processes of authentication and authorization, automating interactions between users, phones, and devices. With one ecoID, users can enjoy unified user experiences while accessing various ecoKeyless branded devices.

one ecoID for all devices image
one ecoID for all devices image small

A set of “ecoID” replaces countless passwords and keys - not stored somewhere temporarily, but genuinely no longer needed!

A set of “ecoID” replaces an average passwords reset cost of US$70 - no passwords, no worries about forgetting!

A set of “ecoID” spans across multiple devices and industries - no need for additional integration, welcome everywhere you go!

Crucial to phone-as-a-key solutions is the relationship between a legit phone and the IoT device. The Phone needs to be recognized as the User's agent and permitted to control the device.

  • Authorization: for Phone to become the agent of User
  • Authentication: for Device to be ensured that it is the correct Phone held by the authorized User
  • Accounting: for all information in the processes to be faithfully recorded
  • Confidentiality: for all information in the processes to be encrypted for transmission and could only be decrypted by legit authority
  • Integrity: for all the information in the processes not to be tampered with or deleted
  • Availability: for the system to work smoothly, enabling the authorized User to access or use promptly without interruption
  • Security chip of ARM Cortex M22 with TrustZone: ensure all the information be safely stored and used in Trusted Execution Environment (TEE).
  • 20+ global innovation patents for the assurance of security throughout the processes.
  • IEC 62443-4-1 certified for the assurance of security of the software on our PKI cloud platform, app, and security chip.
Our offline, remote temp code setup solution
Omni-Access

Offline Defense: Eradicating cybersecurity threats

Temp code validity setup remotely

Temp code usage frequency setup remotely

VS
Other Remote Control IoT

Online Exposure: Risking yourself to major attacks

Our globally exclusive technology enables users to remotely generate temporary passwords with specified validity and usage frequency settings, all without an internet connection. This not only reduces cybersecurity risks but also ensures energy efficiency and cost-effectiveness for the door lock.

Applications

Unlocking anything now requires a code, password, or key, whether online or offline

applications with Omni-Access image
applications with Omni-Access image

Join our ever-expanding ecosystem to bringing Simpler & Stronger Security to Market

Omni-Access Security solution has gained support and engagement across various industries, committed to assisting more brands in diminishing their dependency on passwords or keys. We eagerly anticipate ongoing collaborations with companies to bolster the cybersecurity stance of IoT, all while ensuring a seamless user experience. Join us on this journey!

applications with Omni-Access image
applications with Omni-Access image