{"id":116355,"date":"2023-08-05T02:54:49","date_gmt":"2023-08-05T06:54:49","guid":{"rendered":"https:\/\/o52s5t8h2.nuvmedia.com\/social-media\/tech-firm-annihilates-passwords-in-2fa-authentication-us-patent-granted-seeking-partnerships-w-cyber-security-firms\/"},"modified":"2023-08-05T02:54:49","modified_gmt":"2023-08-05T06:54:49","slug":"tech-firm-annihilates-passwords-in-2fa-authentication-us-patent-granted-seeking-partnerships-w-cyber-security-firms","status":"publish","type":"post","link":"https:\/\/o52s5t8h2.nuvmedia.com\/social-media\/tech-firm-annihilates-passwords-in-2fa-authentication-us-patent-granted-seeking-partnerships-w-cyber-security-firms\/","title":{"rendered":"Tech Firm Annihilates Passwords in 2FA Authentication, US Patent Granted, Seeking Partnerships w\/ Cyber Security Firms"},"content":{"rendered":"

<\/p>\n

\n
\n
\"Passwords<\/a><\/div>\n<\/div>\n

A giant step in cyber security eliminates need to create and use passwords yet provides true two-factor remote user authentication for customers and employees.<\/i><\/p>\n

There is a critical need to not forget the human weak link at the center of new security technology implementations.\u201d<\/b><\/p>\n

\u2014 Tara Chand<\/p>\n<\/div>\n

LOS ANGELES, CA, US, July 26, 2023\/EINPresswire.com<\/a>\/ — The conventional wisdom of cyber security industry follows that in this age of ever evolving cyber security risks, businesses provide enhanced security in remote access to their servers by their employees and customers, using two-factor authentication, a strong form of authentication, including use of complex passwords as one-factor, and a soft token as another factor.<\/p>\n

\u201cWe succeed in annihilating this conventional wisdom of requiring use of a complex password as one of these two-factors by eliminating use of a password altogether; and yet provide a true two-factor remote user authentication\u201d, said Tara Chand, CEO of Internet Promise Group Inc., a boutique innovation enterprise.<\/p>\n

Chand emphasized, \u201cThere is a critical need to not forget the human weak link at the center of new security technology implementations. We did not\u2026 and achieved this giant step in cyber security defense by leveraging certain unique non-obvious security features of a wireless carrier\u2019s wireless network.\u201d <\/p>\n

Chand continued, \u201cwe\u2019re eager to roll out this unique RUAS (Remote User Authentication Security) technology to all businesses including financial institutions to better serve their customers. We are seeking partnership with reputable security firms to quickly deploy this security service to their existing and new business customers.\u201d Chand may be contacted at chand@InternetPromise.com or at 310 787 1400.<\/p>\n

Chand continued, \u201cfor us humans, creating, safeguarding and using passwords has always been problematic. This is why many enterprises have been active in developing new ways to use a password. For example, Microsoft, in selecting a point on an image as a password by displaying one or more images as part of remote user authentication. These band-aid solutions do not address hacking of stored identity credentials, as well as the human weak link.\u201d <\/p>\n

Chand said, \u201cimagine the relief in an ensign\u2019s face at his office desk working in a defense department, in not having to write down that complex password and sticking it next to his terminal, easily accessible for use. The key feature of a password is as a mental secret \u2013 and which human would remember a complex password as that mental secret?\u201d<\/p>\n

Chand, a CISSP\u00ae<\/sup> credentialed cyber security professional, drawing from a wealth of experience as an Electrical Engineer, Systems Engineer, Software Engineer and non-practicing attorney with an innate talent to comprehend all facets of a problem space, successfully leveraged and implemented a unique set of non-obvious security features of a wireless carrier\u2019s wireless network, resulting in a significant advance in cyber security defense.<\/p>\n

Chand continued, \u201ccyber security firms interested in eliminating the need to create and use passwords, yet still provide true two-factor remote user authentication for their existing and new business customers are encouraged to contact us.\u201d Chand may be contacted at chand@InternetPromise.com or at 310 787 1400.<\/p>\n

Tara Chand is CEO of Internet Promise Group\u00ae<\/sup> Inc.,<\/a> a boutique innovation enterprise active across six market verticals, including human health, with 100+ patents, seeks human-factor driven convenience for customers in all of his innovations, including many of his innovations in cyber security defense. www.InternetPromiseGroup.com<\/a><\/p>\n

Contact:<\/p>\n

Tara Chand, President\/CEO
Internet Promise Group Inc.
+1 310-787-1400
chand@internetpromise.com<\/a><\/p>\n

\"\"<\/p>\n

\n

You just read:<\/p>\n

\n
\n

News Provided By<\/p>\n

\n July 26, 2023, 14:50 GMT\n <\/p>\n<\/p><\/div>\n<\/div>\n

<\/p>\n

\n
EIN Presswire’s priority is source transparency. We do not allow opaque clients, and our editors try to be careful about weeding out false and misleading content.
\nAs a user, if you see something we have missed, please do bring it to our attention. Your help is welcome. EIN Presswire, Everyone’s Internet News Presswire,
\ntries to define some of the boundaries that are reasonable in today’s world. Please see our
\n
Editorial Guidelines<\/a>
\nfor more information.\n <\/p>\n<\/p><\/div>\n<\/p><\/div>\n

Originally published at https:\/\/www.einpresswire.com\/article\/646399069\/tech-firm-annihilates-passwords-in-2fa-authentication-us-patent-granted-seeking-partnerships-w-cyber-security-firms<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

A giant step in cyber security eliminates need to create and use passwords yet provides true two-factor remote user authentication for customers and employees. There is a critical need to not forget the human weak link at the center of new security technology implementations.\u201d \u2014 Tara Chand LOS ANGELES, CA, US, July 26, 2023\/EINPresswire.com\/ — […]<\/p>\n","protected":false},"author":1,"featured_media":116356,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[558],"tags":[],"class_list":["post-116355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t