AI Assisted Universal Authentication And Encryption Platform Featuring an Authentication Assistant For Securing Next Generation AI Based Apps, Systems, Devices And Humanoids
AUTHENTICATED
ENCRYPTION
Implement our cutting-edge authentication technology to build Next generation Front End And Back-End Apps powered by AI using your favorite language.
✓ Eliminate User Registrations And Sign-Ups
✓ Integrated Authentication using AI Assistant
✓ Single-Sign-On Across Apps, Systems And Devices
✓ Protect your Apps using Application Layer Encryption
✓ Use Token-less Authentication To Protect Back-End API
✓ Enhanced Compliance And Governance Across Apps
Authenticate Any User Using Any Email Address Or Any Machine Using A Domain Name Or Resource ID
Use Our Dynamic Authorization Capability Post Authentication Or Plugin your Own Authorization Layer
Enable Application Layer Encryption As Well As Authenticated Encryption Using Our Technology Across Applications
Physically Or Virtually Verify Any User EMail Address Using Our Mobile Application To Prevent Frauds
Encrypt Information To Any User Or Machine By Fetching An Asymmetric Shared Key From Our Platform.
Stolen User And Machine Keys Cannot Be Used By Anyone To Spoof The Identity Of Another User Or Machine
Machine Keys are automatically rotated every 15 minutes and Application Keys are rotated every Month
Use Our Technology To Allow Devices To Establish Direct Secure communication even when they are offline
Enable Authentication in your Java Script App hosted on any Static Web Site
Protect your APIs using our Technology without using any API Keys for authorized access
Our Authentication solution can also protect Applications hosted on plain http protocol
Our Authentication and Token-less solution is completely
Protocol-independent
Users will need to solve an Encrypted QR Captcha before they are granted access to their Login Session.
Users do not need to type any Passwords in the Client Or Browser during login in order to provide maximum security
Cookies can be safely disabled to prevent providers from tracking you since we don't use Cookies
Data can be stored securely across sessions in the local storage using built-in functions offered by our Platform
Our Solutions - Security
HexaEight Token Server is our Authentication, Authorization and Access Solution that can be used to protect your Systems, Front End Applications, Backend APIs, Forms and even secure your GPT Applications.
HexaEight Token Server can be installed on Linux, Windows, Mac or even on Raspberry PI devices and integrated and configured within your infrastructure to protect your assets and applications.
HexaEight Token Server is licensed per CPU and allows for unlimited authentication and authorization of users and resources.
AI Solution - Build Custom GPTs
Is Available In Microsoft Azure Market Place which empowers businesses with a secure and compliant framework for building Custom AI assistants while retaining control over its actions, responses and behavior. Controlled GPT Assistants prioritize user privacy, reduce bias, provide top-quality interactions, and are feature rich with function calling capabilities and can be tailored to meet individual or organizational requirements.
OS Solution - SSH Authentication
HexaEight System Authentication Plugin can be deployed on any flavor of Linux including Raspberry pi devices. The system authentication plugin uses PAM authentication for authenticating email users using a normal SSH session.
HexaEight System Authentication Plugin integrates with HexaEight Token Server and Linux Password files to grant access only to specific email users authorized on the Linux Machine.
HexaEight System Authentication Plugin can be installed on multiple Linux machines and pointed to a Single or Multiple Token Server for authentication.
Our SDKs
Our SDK libraries can be used to build and integrate HexaEight Sessions for authentication and establishing secure communication in Applications, Devices, Drones and Robots using Raspberry Pi's and can also use CANBUS SDK to allow electronic subsystems to authenticate and securely establish secure communication with each other.
How Does Our Authentication Work?
HexaEight Authenticator Is Our white-labelled Mobile App, Designed For Users, Resource Owners, System Administrators And Device Operators That Seamlessly Integrates Our Authenticated Encryption Technology.
It Allows End-Users To Scan QR Codes & Authenticate In
✓ Front-End Applications By Authorizing User Agents
✓ Across Operating Systems Using One-Time-PASSCODE
✓ External And Physical Devices like Magnetic Door-locks, as well as in Humanoids, Robots, Drones.
✓ Resource Owners Build And Authorize Front-End And Back-End Applications
✓ System Administrators Authorizes Machines And Integrate Our Plugins to Enable Authentication For End-Users Across Operating Systems
✓ Device Operators Authorizes External Devices And Build Apps Using Our SDK To Enable Authentication For End-users In External and Physical Devices.
HexaEight Sessions Is Our Flagship Technology Solution That Enables Authentication Using Encryption Across Web, Mobile, Systems, Devices as well as in AI powered Applications.
It Uses A Unique Concept Of Token-less Authentication, Relying On Our Patent-pending Encryption Technology To Establish The Identity Of Any User Or Machine.
In Addition, HexaEight Sessions Implements Two-factor Authentication, Using Encrypted QR Codes As An Extra Security Layer To Ensure The Highest Level Of Protection.
HexaEight Sessions can be used in both client and server applications to establish secure communication.
An end user can prove their identity by encrypting information to the server application using HexaEight Session. Similarly the server application uses HexaEight Middleware Session to verify the user's identity and also proves its own identity by sending back encrypted information back to the client application.
HexaEight Sessions Can Also Be Used For Peer To Peer Authentication Like In A Chat Application Or In A Peer To Peer Web3 or Gaming App
Our Technology allows seamless, direct communication between machines using HexaEight Machine Sessions without the need to implement any application.
Our Cloud Platform provides the encryption keys for the source and destination machines, enabling them to establish a secure and authenticated bidirectional communication channel using our cutting-edge encryption technology.
Our Core Technology
HexaEight Encryption
Standard Encryption Techniques like Public Key cryptography use a pair of keys, a public key and a private key, to encrypt and decrypt data. The Public key is used to encrypt the data, while the Private key is used to decrypt it. While this technique ensures the secrecy of the message, it cannot be used to establish the identity of the sender as the Public key can be subject to attacks during the exchange process.
To verify the identity of a user using a public key, a Certificate Authority (CA) must certify the Public key and issue a Digital Certificate. While Digital Certificates and Signatures offer message authenticity, they can be compromised if the private key is misplaced or stolen. In this case, it can be time-consuming to revalidate and issue a new Digital Certificate and Signature
Download Our Mobile Application
The first step before you attempt to use our solutions and products is download our Mobile Application available on the Playstore by scanning the QR Codes shown below. You will need to first create an Email digital token on your mobile by following this video tutorial. Once you have created an email digital token, you can then create and authorize new Domain or Generic resources using the mobile application for use in our solutions
CPU Based Licensing
HexaEight Platform offers unlimited authentication and encryption capabilities by allowing you to generate any number of client tokens and asymmetric shared keys for any destination using a resource Login Token by simply purchasing a Licensed Machine Token.
This Licensed Machine token is tied to a Machine and is priced daily or monthly based on the number of CPU cores that you intend to deploy the Login Token for use either by using our Token Server or by developing your own program using HexaEight SDK Libraries. The purchased Machine Token can also be used to renew/extend the license duration for existing Login Tokens.
Licensed Machine Token Prices Per Day
Licensed Machine Token Prices Per Month
(20% Discount Applied)