HexaEight

Authenticated Encryption Anywhere And Everywhere

AI Assisted Universal Authentication And Encryption Platform Featuring an Authentication Assistant For Securing Next Generation AI Based Apps, Systems, Devices And Humanoids

HexaEight Provides A Revolutionary Authentication Platform That Enables Businesses To Develop Next Generation Multi-Lingual Interactive AI Assistants, Capable Of Authenticating Users Using QR Codes And Voice Interactions, Thus Eliminating The Need To Disclose User Password To The AI Application

AUTHENTICATED

Use Our Revolutionary Platform For Authenticating Unlimited Users In AI Assistants, Websites, Apps, Systems, Devices as well as Robots 

ENCRYPTION

Use Our Encryption Technology To Establish Secure Communication Across Sessions, Backend APIs and Resource Servers

Why HexaEight Platform?

Implement our cutting-edge authentication technology to build Next generation Front End And Back-End Apps powered by AI using your favorite language.
✓ Eliminate User Registrations And Sign-Ups
Integrated Authentication using AI Assistant
✓ Single-Sign-On Across Apps, Systems And Devices
✓ Protect your Apps using Application Layer Encryption
✓ Use Token-less Authentication To Protect Back-End API

Enhanced Compliance And Governance Across Apps

Our Platform Features

✓ Authentication

Authenticate  Any User Using  Any Email Address Or Any Machine Using A Domain Name Or Resource ID

✓ Authorization

Use Our Dynamic Authorization Capability Post Authentication Or Plugin your Own Authorization Layer

✓ Encryption

Enable Application Layer Encryption As Well As Authenticated Encryption Using Our Technology Across Applications

✓ Verification

Physically Or Virtually Verify Any User EMail Address Using Our Mobile Application To Prevent Frauds 

✓ Peer To Peer

Encrypt Information To Any User Or Machine By Fetching An Asymmetric Shared Key From Our Platform.

✓ Key Protection

Stolen User And Machine Keys Cannot Be Used By Anyone To Spoof The Identity Of Another User Or Machine

✓ Key Rotation

Machine Keys are automatically rotated every 15 minutes and Application Keys are rotated every Month

✓ Offline

Use Our Technology To Allow Devices To Establish Direct Secure communication even when they are offline

✓ Static Site Protection

Enable Authentication in your Java Script App hosted on any Static Web Site

✓ API
Protection

Protect your APIs using our Technology without using any API Keys for authorized access

✓ Non-HTTP 
Site Protection

Our Authentication solution can also protect Applications hosted on plain http protocol

✓ Protocol
Agnostic

Our Authentication and Token-less solution is completely
Protocol-independent

✓ Two Factor Authentication

Users will need to solve an Encrypted QR Captcha before they are granted access to their Login Session.

✓ Password-less Authentication

Users do not need to type any Passwords in the Client Or Browser during login in order to provide maximum security

✓ True
Privacy

Cookies can be safely disabled to prevent providers from tracking you since we don't use Cookies

✓ Data
Protection

Data can be stored securely across sessions in the local storage using built-in functions offered by our Platform

Our Solutions - Security

Authentication, Authorization And Access

HexaEight Token Server is our Authentication, Authorization and Access Solution that can be used to protect your Systems, Front End Applications, Backend APIs, Forms and even secure your GPT Applications.

HexaEight Token Server can be installed on Linux, Windows, Mac or even on Raspberry PI devices and integrated and configured within  your infrastructure to protect your assets and applications.  

HexaEight Token Server is licensed per CPU and allows for unlimited authentication and authorization of users and resources.

AI Solution - Build Custom GPTs 

Controlled GPT AI Assistant 

Is Available In Microsoft Azure Market Place which empowers businesses with a secure and compliant framework for building Custom AI assistants while retaining control over its actions, responses and behavior.  Controlled GPT Assistants prioritize user privacy, reduce bias, provide top-quality interactions, and are feature rich with function calling capabilities and can be tailored to meet individual or organizational requirements. 

Provision Controlled GPT inside a VM in your Azure subscription that seamlessly integrates with our Platform, and provides a GPT Middleware that can talk to Azure Open AI / Chat GPT and comes bundled with a static Chat Application front end.

OS Solution - SSH Authentication

Authenticate Linux Systes using Passcodes

HexaEight System Authentication Plugin can be deployed on any flavor of Linux including Raspberry pi devices. The system authentication plugin uses PAM authentication for authenticating email users using a normal SSH session.

HexaEight System Authentication Plugin integrates with HexaEight Token Server and Linux Password files to grant access only to specific email users authorized on the Linux Machine.

HexaEight System Authentication Plugin can be installed on multiple Linux machines and pointed to a Single or Multiple Token Server for authentication.

Our SDKs

Libraries

Our SDK libraries can be used to build and integrate HexaEight Sessions for authentication and establishing secure communication in Applications, Devices, Drones and Robots using Raspberry Pi's and can also use CANBUS SDK to allow electronic subsystems to authenticate and securely establish secure communication with each other.

How Does Our Authentication Work?

HexaEight Authenticator For End-Users

HexaEight Authenticator Is Our white-labelled Mobile App, Designed For Users, Resource Owners, System Administrators And Device Operators That Seamlessly Integrates Our Authenticated Encryption Technology.

It Allows End-Users To Scan QR Codes & Authenticate In
✓  Front-End Applications By Authorizing User Agents  
✓ Across Operating Systems Using One-Time-PASSCODE
✓ External And Physical Devices like Magnetic Door-locks, as well as in Humanoids, Robots, Drones.

HexaEight Authenticator For Owners

✓ Resource Owners Build And Authorize Front-End And Back-End Applications

✓ System Administrators Authorizes Machines And Integrate Our Plugins to Enable Authentication For End-Users Across Operating Systems


✓ Device Operators Authorizes External Devices And Build Apps Using Our SDK To Enable Authentication For End-users In External and Physical Devices.

HexaEight Sessions

HexaEight Sessions Is Our Flagship Technology Solution That Enables Authentication Using Encryption Across Web, Mobile, Systems, Devices as well as in AI powered Applications.
It Uses A Unique Concept Of Token-less Authentication, Relying On Our Patent-pending Encryption Technology To Establish The Identity Of Any User Or Machine.
In Addition, HexaEight Sessions Implements Two-factor Authentication, Using Encrypted QR Codes As An Extra Security Layer To Ensure The Highest Level Of Protection.

User To Machine, Services And Devices

HexaEight Sessions can be used in both client and server applications to establish secure communication.

An end user can prove their identity by encrypting information to the server application using HexaEight Session. Similarly the server application uses HexaEight Middleware Session to verify the user's identity and also proves its own identity by sending back encrypted information back to the client application.

Direct User To User Authentication and Secure Communication via Application

HexaEight Sessions Can Also Be Used For Peer To Peer Authentication Like In A Chat Application Or In A Peer To Peer Web3 or Gaming App

HexaEight Session Capabilities

Authenticate Any User

HexaEight Sessions simplifies the complex task of authenticating Email Users without the need to type a password at login prompt

Encrypt And Decrypt

HexaEight Sessions provides encryption and decryption capabilities for any destination even if the destination is not yet registered on our Platform

Protect And Decipher

HexaEight Sessions provide self encryption capabilities to protect the data stored in local Browser storage or in an untrusted environment

Secure Communication

HexaEight Sessions offers HTTP Client instances that implements authenticated encryption to secure communication with Destination APIs

Machine To Machine Communication

Our Technology allows seamless, direct communication between machines using HexaEight Machine Sessions without the need to implement any application.

Our Cloud Platform provides the encryption keys for the source and destination machines, enabling them to establish a secure and authenticated bidirectional communication channel using our cutting-edge encryption technology.

Our Core Technology
HexaEight Encryption


Standard Encryption Techniques like Public Key cryptography use a pair of keys, a public key and a private key, to encrypt and decrypt data. The Public key is used to encrypt the data, while the Private key is used to decrypt it. While this technique ensures the secrecy of the message, it cannot be used to establish the identity of the sender as the Public key can be subject to attacks during the exchange process.


To verify the identity of a user using a public key, a Certificate Authority (CA) must certify the Public key and issue a Digital Certificate. While Digital Certificates and Signatures offer message authenticity, they can be compromised if the private key is misplaced or stolen. In this case, it can be time-consuming to revalidate and issue a new Digital Certificate and Signature

HexaEight Technology combines asymmetric and symmetric encryption techniques to create a new method that can be used for both Authentication and Encryption. Our platform eliminates the need to maintain a public key infrastructure by allowing users to establish secure communication with any user or machine by simply retrieving an asymmetric shared key of the destination from our Platform. Asymmetric shared keys are resistant to attacks, making our technology a secure option for use in any environment.

A Schematic Diagram Of Our Encryption And Decryption Process Used Across
Users, Applications, Machines And Devices

Download Our Mobile Application

The first step before you attempt to use our solutions and products is download our Mobile Application available on the Playstore by scanning the QR Codes shown below.  You will need to first create an Email digital token on your mobile by following this video tutorial. Once you have created an email digital token, you can then create and authorize new Domain or Generic resources using the mobile application for use in our solutions

SCAN

This QRCode

To Download Our
Mobile App From
Google Play Store

SCAN

This QRCode

To Download Our
Mobile App From
Apple Play Store

Simple Pricing for Everyone

Pricing

CPU Based Licensing

 HexaEight Platform offers unlimited authentication and encryption capabilities by allowing you to generate any number of client tokens and asymmetric shared keys for any destination using a resource Login Token by simply purchasing a Licensed Machine Token. 

This Licensed Machine token is tied to a Machine and is priced daily or monthly based on the number of CPU cores that you intend to deploy the  Login Token for use either by using our Token Server or by developing your own program using HexaEight SDK Libraries.  The purchased Machine Token can also be used to renew/extend the license duration for existing Login Tokens.

Licensed Machine Token Prices Per Day

1 Core License

$3.00

Per Day

2 Core License

$6.00

Per Day

4 Core License

$12.00

Per Day

8 Core License

$24.00

Per Day

16 Core License

$48.00

Per Day

32 Core License

$96.00

Per Day

64 Core License

$192.00

Per Day

Licensed Machine Token Prices Per Month
(20% Discount Applied)

1 Core License

$72.00

Per Month

2 Core License

$144.00

Per Month

4 Core License

$288.00

Per Month

8 Core License

$504.00

Per Month

16 Core License

$1008.00

Per Month

32 Core License

$2304.00

Per Month

64 Core License

$4032.00

Per Month


 Remember you'll be directed to our third party processing page
who is our only authorized third party provider to sell Digital Products.

We also provide API key based subscriptions through our Third Party API Provider for usage in scenarios where the usage is less than 50 users or resources, but we recommend you switch to the CPU Licensed model since our new pricing model provides unlimited authentication for users and resources without use of API keys 

Need Licensed Machine Tokens For CPU Cores Not Listed Above ?

Contact us using Email or by raising a ticket and we will help you purchase using an exclusive link

Privacy Policy

Terms of Use

© Copyright 2024 HexaEight - All Rights Reserved
HexaEight Trademark is held by HexaEight. Various trademarks are held by their respective owners.