We make passwords dynamic, complex and secure by seperating the management of passwords from the end user.
LeVAULT is a disruptive innovation that will greatly improve the way that identities and important information are protected from hackers.
LeVAULT, a state-of-the-art security system, will help put hackers out of business. LeVAULT's primary purpose is to stop hackers from breaking through computer security.
LeVAULT is a key and a subsystem (software application) that manages the security of computers, tablets, smartphones and networks. LeVAULT can be used in individual home computers, business computers, large or small company networks, servers, laptops, and tablets. LeVAULT technology can also be integrated into Smartphones.
LeVAULT is a server and client web application that provides the following components:
LAS: LeVAULT Application Server.
For the consumer, Comet Enterprises will host an LeVAULT Application Server(LAS) web server
For the enterprise, LeVAULT Application Server(LAS) will be hosted by the enterprise
dLeVAULT: Desktop Client.
Client runs outside of the browser
Manages standalone applications such as QuickBooks, etc.
iLeVAULT: Web Client
Runs over the web.
Runs multiple browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.
Runs on multiple devices such as but not limited to tablets, smartphones, desktops, laptops, etc.
wLeVAULT: Windows Login Client
Manages and supports the windows login password for Microsoft Windows Operating System.
The news is full of reports about hackers breaking into computer systems and stealing personal information from governments, businesses and individuals. By utilizing LeVAULT's patented dynamic password technology, loss of personal information and financial loss can be dramatically reduced, if not eliminated.
How does LeVAULT differ from other security products?
LeVAULT replaces other less solid security solutions such as password archival solutions (USB archives, security questions, spreadsheets, and sticky notes) with a robust and dynamically changing password environment. LeVAULT removes the overhead and security risks associated with external "layered" security alternatives such as dedicated tokens and smart cards.
LeVAULT uses a Universal Serial Bus (USB) device and other mobile devices (smartphones, tablets, etc.) along with a password generation schema to generate and control the password, making it virtually impossible to break. Passwords are never stored anywhere in the system, but are dynamically generated as needed through the use of the password generation schema.
Each employee/individual has a USB or Bluetooth enabled device and is not allowed to log into the network/computer unless the USB device is connected to the computer. Other security systems such as firewalls and Demilitarized Zones (DMZ) have simple passwords known by their employees and can easily be compromised by hackers. LeVAULT is also a lot less expensive than a security consultant in the event security has been breached.
How does LeVAULT Work?
LeVAULT features multiple levels of authentication:
First Level: Key that enables LeVAULT (USB device, Bluetooth device, tablets, or smarphones).
Second Level: Authentication to LeVAULT through a password, fingerprint, and / or other biometrics.
Third Level: Fixed or dynamically generated PIN numbers that can be sent to your smartphone or e-mail.
Fourth Level: Dynamically generated password for each user account or network.
To authenticate to the LeVAULT Application server (LAS), a user could combine multiple biometrics, passwords, PIN numbers, and devices that will give the user well over 10 levels of authentication. The user's accounts are protected and managed by LeVAULT. The user is seperated from the management of passwords to the accounts. This eliminates hacking through social engineering and because LeVAULT manages and changes the password, to the user's accounts, it greatly decreases, if not making it impossible, the ability of hackers to hack though other means such as brute force methods.
LeVAULT uses keys such as Universal Serial Bus (USB) devices, bluetooth enabled devices, or other mobile devices such as smartphones. The key, in addition to the authentication method, is the device that allows the subsystem to be accessible. The LeVAULT subsystem manages the dynamic generation of passwords and schemas, and automates the login process and password changes for the user.
The subsystem maintains multiple login accounts in a database along with the information needed to dynamically generate passwords for the user's accounts, as well as the information needed to authenticate the user into the LeVAULT Application Server (LAS).
The login and password change information is sent to the host of the login account, through an authentication protocol.
Based on certain mathematical formulas or schemas, the subsystem generates up to a 128-character password, but not limited to 128 characters. The exact length of the password generated for each login account is set by the user and the login account provider. The frequency as well as the schema for the generation of a new password change is set by the user, the remote host or network administrator.
There will be two types of devices: one for a client systems (desktops, laptops, smartphones and tablets) and another for a remote host (network). The network device is for businesses to ensure that all client computers or remote login systems follow the standards set by the company for the generation, changing and maintenance of password and user ID's. For security reasons, the client device will be disabled after a certain amount of time, or when the device is disconnected from the computer. In order to be re-enabled the user must re-authenticate with the device.
The device connects to a USB port or through bluetooth detection. Once the client or network administrator enters a certain key and goes through the authentication process, the administrator is allowed to access the login accounts. Once the user is authenticated, the user will have several options such as changing the owner authentication method, register, change, deactivate, reactivate authentications devices in LeVAULT, add a login entry to the login accounts database, edit the configurations of a login account, delete accounts entries, and login to remote host sites.