Igor Polivanyi

With SPINT technology, the protection of sensitive information on your device gets smarter. The following example will help you to grasp the main idea behind the concept.

Let's say, you are opening a rotary safe that has a dial with numerals and a mark point. To open the safe, you would need to rotate the dial several times aligning your PIN numbers against the mark point. But what if a "bad guy" (standing behind your back) could see the entire process? Would he be able to open the safe? The answer is yes, absolutely!

Unfortunately enough, the authentication methods used for unlocking the mobile and wearable devices provide no better protection against the malicious observers, who can easily steal your password (even from a distance using a wide range of smart devices equipped with high-resolution cameras). Relying on biometrics isn't a very viable alternative either, since your biometric data is also readily available to the people around you.

Returning back to the example with our rotary safe, let's imagine that the mark point on the safe is not shown, and it's position is known only to you, plus the dial's numerals get randomly rearranged every time you start the authentication process. Would it be difficult for a "bad guy" to open your safe? He couldn't be able to open the safe even if he knew the PIN itself.

In a nutshell, that's what SPINT technology is about, which is dealing with two secrets: the password itself and the way you enter it into the system. For more details about SPINT, click here.

SPINT is not a replacement to any existing online security technology. It provides an additional layer of the offline security protection before the online security protection gets involved.

Sounds too good to be true? You can see it for yourself by downloading our free app.



presi#SpintAndSecurity