Fort Knox Digital Introduces Guardog: Four-Factor Authentication for Ultimate Internet Transaction and Communication Security

Share Article

Traditional two-factor Internet security authentication is obsolete with the introduction today of a breakthrough service by Fort Knox Digital. In launching Guardog™, Fort Knox can deliver a four-factor authentication process resulting in the most comprehensive transaction and communications security available.

“Guardog is a patented technology that prevents impersonation by dynamic – not static – identity protection that goes beyond simple user name and password security,” said Scott Wallace, Fort Knox Digital chief executive officer.

Traditional two-factor Internet security authentication is obsolete with the introduction today of a breakthrough service by Fort Knox Digital. In launching Guardog™ http://www.fortknoxdigital.com/ Fort Knox can deliver a four-factor authentication process resulting in the most comprehensive transaction and communications security available.

Nearly 100 percent of all recent security breaches have involved impersonation using stolen usernames and passwords and could have been prevented by Guardog.

Traditional factors of identification (username and password) and a physical device are now strengthened by the addition of two additional factors. Those factors are reverse confirmation (the institution confirming its identity back to the sender) and continuous random mutual authentication. This reverse identification and constant random confirmation is possible through the introduction of an independent, server managed by Fort Knox Digital.

“Guardog is a patented technology that prevents impersonation by dynamic – not static – identity protection that goes beyond simple user name and password security,” said Scott Wallace, Fort Knox Digital chief executive officer. “By first mandating authentication on the other end of the transaction, and then repeatedly and randomly completing digital authentication between sender and receiver, Guardog eliminates the ability of intruders to impersonate valid users and gain access to a company’s servers and user’s account information and personal data,” he added.

“The current debate on the effectiveness of three-factor authentication, through introduction of a biometric element (eye scan, fingerprint, etc.) is over. Guardog’s patented third and fourth factors have rendered biometrics unnecessary which, given their ineffectiveness, is welcome,” said Wallace.

Guardog uses a unique and radically different approach to defeat hackers, spear-fishing, social engineering and man-in-the-middle attacks. It gives the user a physical element, a Guardog key. This Guardog key is either a USB key or a Smartphone app which works in conjunction with the user’s browser. By employing either of these physical elements, and communicating through the independent server, the session is beyond the reach of any intruder. A server-to-server only version is also available.

Patented in the United States and internationally, the technology solution behind Guardog has been tested extensively for the past several years without intrusion.

The solution is built upon four basic pillars:

  •     A non-digital physical element (the Guardog key) which is inserted by the user into his/her USB port (also available as a Smartphone app);
  •     Using the key, the user’s identity is authenticated. The server then authenticates itself back to the user. The entire process is called Cothentication™”.
  •     Cothentication does not stop with login. It occurs within milliseconds each time the user makes a request of the service provider, and vice versa.

Guardog’s Cothentication is dynamic and based on encryption through randomly-generated codes
“Cybercrime continues to grow, with more than $100 billion lost to business as a result of digital security breaches. The problem, until now, is that all systems designed to stop intruders have been static; a user logs in with the same username and password; those two elements are all an intruder needs to impersonate legitimate users. And given that an Internet breach goes an average of 462 days before it is even detected, a lot of damage is done to both user and institution,” said Wallace.

Potential uses for Guardog are many. A large retail chain could issue a Guardog to each of its suppliers so that information sent to and from the retailer would be from verified sources. A bank could issue its large commercial customers with a Guardog to verify ACH transfers – one of the riskiest banking transactions. Health providers can use Guardog to safeguard medical records. A newspaper could issue Guardog to its reporters so it is sure that a filed story is one actually submitted by a reporter and not a hacked replacement.

Fort Knox Digital is a digital security development firm headquartered in New Canaan, CT. It is focused on promoting the patented authentication protocols developed by Poy Chen, an industry leading digital security engineer. For further information, contact http://www.fortknoxdigital.com/

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Dennis Cesa
Catalystics Marketing LLC
+1 (201) 370-8839
Email >
Visit website