We make passwords dynamic, complex and secured by isolating the management of passwords from the end user.
LeVAULT features multiple levels of authentication:
Fist Level: Key that enables LeVAULT (USB device, Bluetooth device, tablets, or smarphones).
Second Level: Authentication to LeVAULT through a password, fingerprint, and / or other Biometrics.
Third Level: Fixed or dynamically generated PIN number that could be send to your smartphone or e-mail.
Fourth Level: Dynamically generated password for user’s account or network.
To authenticate to the LeVAULT Application server (LAS), a user could combine multiple biometrics, password, PIN number, and devices that will give the user well over 10 levels of authentication. The user’s accounts are protected and managed by LeVAULT. The user is isolated from the management of passwords to the accounts. This will eliminate hacking through social engineering and because LeVAULT manages and changes the password, to the user’s accounts, it greatly decreases, if not makes it impossible, for hackers to hack though other means such as brute force methods.
LeVAULT uses keys such as Universal Serial Bus (USB) devices or Bluetooth enabled devices, smart cell phones with the use of a SIM card, or other mobile devices such as PDAs. The key, in addition to the authentication method, is the devise that allows the subsystem to be accessible. The LeVAULT subsystem manages the dynamic generation of passwords and schemas, and will automate the login process and password changes for the user.
The subsystem maintains multiple login accounts in a database along with the information needed to dynamically generate the password for the users accounts, as well as the information needed to authenticate the user into the LeVAULT Application Server (LAS).
The login and password change information is sent to the host, of the login account, through an authentication protocol.
Based on certain mathematical formulas or schemas, the subsystem will generate up to a 128-character password, but not limited to 128 characters. The exact length of the password generated for each login account is set by the user and the login account provider. The frequency as well as the schema for the generation of a new password change is set by the user, the remote host or network administrator.
There will be two types of devices one for a client systems (desktops, laptops, smartphones and tablets) and another for a remote host (network). The network device will be for businesses to ensure that all client computers or remote login systems follow the standards set by the company for the generation, changing and maintenance of password and user ID’s. For security reasons, the client device will be disabled after a certain amount of time, or when the device is disconnected from the computer. In order to be re-enabled, the user must re-authenticate with the device.
The device connects to a USB port or though Bluetooth detection. When the client or network administrator enters a certain key and goes through the authentication process, they will be allowed to access the login accounts. Once the user is authenticated, the user will have several options such as change the owner authentication method, register, change, deactivate, reactivate authentications devices in LeVAULT, add a login entry to the login accounts database, edit the configurations of a login account, delete accounts entries, and login to remote host sites.