Swoop Authentication Explained

Page created by Casey Maxwell
 
CONTINUE READING
Swoop Authentication Explained
Swoop Authentication Explained
Introduction
Swoop authentication replaces the password and reduces the security
vulnerabilities that go along with password-based authentication, including
the vulnerability that occurs when an email account is hacked. The goal of
Swoop Instant Buttons is to make the internet a more secure and better
place to get things done.

Swoop replaces customer-created passwords with a rigorous security
protocol. Authenticating with a password is one of the worst aspects to
transacting on the internet. By removing the password, organizations can
remove the security risk that comes with storing them while also providing
their customers with a superior user experience. In short, the value
proposition of Swoop authentication is that it offers a more secure and
convenient way to authenticate while online.

Your Email Account Is Your Most Important Online Account
Most people do not realize when it comes to security that their email
account is the most important online account that they possess. Email
accounts are the skeleton keys of the internet, all your other online
accounts are dependent on your email account being secure. If an intruder
takes control of your email account, they effectively become you on the
internet. They can attack your bank account, take over social media
accounts and all other accounts that you have set up online. The intruder
can simply go to these sites and reset your password and hijack your
account. Swoop authentication technology and our Instant Buttons can stop
hackers from taking over any account that uses them.

Instant Buttons
Swoop Authentication Explained
Swoop Authentication starts with our branded Instant Buttons. Inside of
these buttons, we have embedded mailto links that initiate the
authentication process. For the past 6 years, we’ve been working to
optimize the mailto link for authentication purposes. Instant Buttons
represent 3rd Generation of Swoop technology. Here is a list of Instant
Buttons currently available:

                                     This button makes it possible to login to a website
                                     without a password

                                     Makes it easy and secure to pay for a product or
                                     service.

                                     Instantly sign up for an account without having to dream
                                     up and remember a password.

                                     Makes donating easy.

                                     Makes it easy to secure the pledge. Extremely useful
                                     for capital improvement projects and donations that are
                                     too large for a credit card and may be spaced out over
                                     months or even years.
Swoop Authentication Explained
Log Into Website Without a Password
                         (Instant Sign In)

Our technology addresses a need for every website around the world
                   that asks people to sign in.
Create Online Account Without A
Password

  With this button, you can sign up in two-clicks. This will create more
accounts with more websites because they do not need you to set up and
            remember credentials (username and password).
Instant Buy
                         Buying just got a lot easier!

                                       .

Swoop Security Protocol Explained

Layer 1: Authentication with DKIM
All outgoing emails receive a digital signature as they leave the email
server. This signature is called a DKIM signature. DKIM stands for
DomainKey Identified Mail. Every email domain has its own private key
that writes a digital signature on outgoing emails that tell the recipients
where the mail came from.

When the customer authenticates through email, Swoop receives the
authentication email and checks the DKIM signature using the published
public key. If it passes, we know the message came from the customer's
domain. DKIM signatures are either in 1024 or 2048 bit encryption. Here
is an example of a confirmation message that we recently received:

DKIM-Signature: v=1; a=rsa-sha256; d=example.net; s=brisbane;
   c=relaxed/simple; q=dns/txt; l=1234; t=1117574938; x=1118006938;
   h=from:to:subject:date:keywords:keywords;
   bh=MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=;
   b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSbav+yuU4zGeeruD00lszZ
        VoG4ZHRNiYzR

If this signature passes decryption, then we know as a matter of
mathematics and physics that this email originated from the sender's do
main.

Layer 2: Authentication Using Sender Policy Framework
The digital signature based authentication process described above is
reliable on its own. But when it is a matter of security, redundancy and
second source verification is a powerful asset. To this end, Swoop
leverages Sender Policy Framework (SPF) to provide a second,
independent verifcation of the sender’s domain. SPF does not rely on an
encrypted digital signature. Instead, it relies on a path-based verification
process that is wholly independent from public key encryption methods
used in layer 1.

The first thing to know is that email domains publish lists of “senders” that
are allowed to send email on behalf of their domain. The second thing to
know is that usually an email needs to pass through three or more email
servers before it reaches its destination. So every time an email passes
through one of these servers, a lookup is performed to see if the email
came from a sender that is on the approved list of servers. If so, then a
link is established between the authentication email and the email domain
that it came from. This link is then inserted into the header of the email and
passed along.

Once the authentication email reaches our server, we verify the “path” from
the originating domain to our server. By being able to trace the handoffs
(sounds like blockchain), we know that the email came from the customer’s
domain.

As a combination, these 2 layers provide a powerful authentication
mechanism to use as the basis of our security protocol. However, there
are many gradients within each layer and additional securities measures
that need to be taken to fully safeguard the authentication process. We
call this layer 3

Layer 3: Swoop Security Algorithms
Swoop uses a security algorithm to evaluate the data provided from the
DKIM and SPF checks. There are a lot of details that we will not go into
here, but it includes things like key size, domain authority, transaction
history to name a few. Additionally, our algorithms evaluate data outside of
Layer 1 and 2 to ensure that the DNS Registry has not been compromised
by either a domain attack or a brute force DNS attack. Our algorithms
either approve a transaction, reject a transaction or ask for further
confirmation.

Layer 4: Protecting the Email Account From Hacking
Swoop offers a configurable, two-factor authentication technology that
monitors the sign in attempts for all Instant Button Accounts. This layer is
intended to provide a protection not currently available for online accounts
in the event that the customer's email account gets compromised.
When a login attempt occurs on one of your online accounts, Swoop sends
you a text message notifying you that your account is being accessed. If
you want to stop this login, then you simply text “Stop” and Swoop ends the
web session before damage can be done.

Swoop also provides artificial intelligence to monitor your log in patterns.
Much like credit card companies do, we look for patterns of behavior and
notify you or hold an account for a dual factor authentication before
allowing harm to be done from email account hacking.

Without this fourth layer, most email accounts are vulnerable to a reset
password attack. Swoop prevents this type of attack.

Summary

Authentication with Swoop Instant Buttons is more secure and more
convenient method than the use of passwords. They are designed for use
on mobile and desktop computers.

Our security protocol consists of four independent layers:
  1. Public Key Cryptography Technology Layer using either 1024 or 2048
     key technology,
  2. Path-Based Technology Layer,
  3. Swoop Proprietary Algorithm Layer, and
  4. Swoop Configurable, Two-Factor Authentication Layer that includes
     machine learning technology to monitor the account.

The goal is to eliminate the use of passwords on the internet and make the
internet a better, more secure place to get things done.
You can also read