motionQR technology can provide a platform that can hold/present/scan limitless types of information. This enables secure digital signatures, among other things.
2. No Special
Equipment
Needed
Verification with
Biometrics
Full Security
and
Authentication
Control
Works Online
and Offline
Ticket Presentation
Cloud-based
Implementation
Forgery-proof
Fraud-proof
Infinite
Data Size
2
Works on and
between
iOS & Android
4. Mobile Authentication Method: PC - to - Mobile Device
• Solution Elements
• Provide a platform that can hold/present/scan limitless types of
information
– Provide the capability of digitally signing all transactional (session)
information
– Avoid the usage of SIM-based private keys (to ensure secure environment)
– Encrypt stored User private keys (leveraging User-created mPIN)
Sample Use Case – Mobilized Secure Login
4
5. The User
chooses to login
with security
management
company’s
motionQR.
A motionQR Code
is presented on the
PC monitor
containing all
necessary info
regarding the
resource and
session.
The User scans
security
management
company’s
motionQR from
computer monitor
via her mobile
device.
The User enters her
mPIN.
Security
management
company verifies the
mPIN and session
info and based on
these grants or
revoke access.
The User receives
notification - result
of her login request.
Mobilized Login: PC - to - Mobile Device – Process Flow
5
6. Mobile Credential: Mobile Device - to - PC
• Solution Elements
• Provide a platform that can hold/present/scan limitless types
of information
– Provide the capability of digitally signing all transactional information
– Avoid the usage of SIM-based private keys (to ensure secure
environment)
– Encrypt stored User private keys (leveraging User-created mPIN)
Sample Use Case – Mobilized Secure Login
6
7. The User
chooses to login
with security
management
company’s
motionQR.
The User presents her
motionQR Code on her
mobile device to the PC’s
web cam the motionQR
Code can contain a one-
time or permanent
credential.
Via web cam, the PC
identifies the
motionQR Code and
forwards the content
of it to the security
management
company server.
Security
management
company verifies the
session, verifies the
User’s info and
based on these,
grants or denies
User access.
The User is provided
notification on the
result of her login.
Mobilized Login: Mobile Device - to - PC – Process Flow
7