Design Simulation Systems Ltd

Authentication isn't just about passwords

You've probably wished your authentication system asked these questions before granting access,

but you wanted multi-factor authentication simple enough for a child to use.

That sounded like an expensive 3 month project, so you're still with username/password, right?

Security should be a transparent part of the user experience - not an impediment.

Authentication should be as easy to use as username/password - but not as vulnerable.

A multi-factor authentication system must be capable of being installed in an hour.

For the price of a couple of laptops - and, yes, a child should be able to use it.

On a smartphone. Without using a keyboard, or holding up the queue at the checkout.

Without needing to do calculations, or to search through lists of obscure symbols.

Without the need for iris scans, fingerprints, blood tests or colonoscopy.

Go ahead, try the demo lower down on this page.

Wait! There are more questions...

What if your userID/password database is stolen? It's encrypted, so it should be okay, right?

Your DBA and sys admin both know the encryption key, and they're trustworthy. Aren't they?

Yes - but they may be a bit careless sometimes...

Wouldn't that encrypted data be much more secure if there were no encryption keys?

Yes, it would.

That's why our userID/password database has no encryption keys.

DSS Enterprise. The Cybersecurity Authentication Solution

  • Self-hosted identity-as-a-service
  • Central control with user self-service
  • Authentication, Access Control, Authorisation
  • Installs out-of-the-box
  • Configures on your smartphone
  • Easy migration from legacy systems
  • Keyboardless password entry
  • No learning-curve burden on users
  • Frictionless Two or Three Factor Authentication
  • No SMS, no tokens, no typing, no biometrics
  • 2-Tier single sign-on session protection

About us

Design Simulation Systems Pty Ltd is an Australian company, which was originally born in Singapore, with the aim of developing and marketing clever stuff, until it was bought by the National Computer Board.
The Australian reincarnation came about, when we noticed that existing authentication systems were either vulnerable to many forms of attack, grossly overpriced, or offered a solution which was actually a development project. Usually, they were all three.
Our answer to this, is to offer an authentication system which installs out-of-the-box in less than an hour, provides user-transparent 3-Factor authentication, and costs less than the average laptop for an all-site licence.
Also, the footprint is small enough to send all of the components by email.

Be Your Own Authentication Provider

Why rely on a third party to be your 'Identity as a Service', when the service provider can be you, on your own hardware, inside your own firewall?
Full configuration functionality is accessible from your smartphone, so you can set it up at the poolside, with a margarita in your hand.
Also, unlike freebies like Radius, you don't need to start a development project, since you can install it in 5 minutes and, unlike SAML-based systems, you can write an interface to it, with 2 lines of HTML.
If you already have an account on our online IDaaS system, you can access it here
Find out More Download Manual

2FA from Device Signature

Authentication begins when your device connects to the DSS Enterprise authentication server.
When the user responds to the challenge, the device's unique signature is encoded with the unique challenge response, then decoded by the server, and checked against those registered to you. It is the second factor of the authentication, and needs no action on the part of the user.
At no time is either the actual password or actual device signature transmitted.
Registration of any device is also user-transparent and totally hands-free, and is performed without querying the device, or installing cookies or client software.
Find out more Download Manual

First Factor From Password

Keyboardless login - on any device. The challenge panel just needs you to enter the password by simply spelling it out on the two touch panel images.
Because these are images, there are no keystrokes for malware to record, and no text for screen scrapers to read. Also, because each challenge presents a different set of random characters, malware can't predict the future encoding of your password.
At no time is the actual password entered or transmitted.
Find out more Download Manual

User Self-Service for Most Tasks

Users have no need for admin privilege to set most of their profile parameters.
They can securely and safely set Passwords, reset Passwords, register as many devices as they need and deregister devices no longer needed, lost, stolen or obsolete.
Download Manual

Interactive SSO Demo

Croesus & Midas sell diamonds. The diamonds are sold from four different stores, each of which only sells one colour

The four stores sell Red, Green, Blue and White diamonds respectively.

To make things easy for their many customers, Croesus & Midas permit a single password to give access to more than one store.

The ID's of users authorised to access the diamond stores, together with their passwords, and instructions on how to run the demo can be found here

Find out more

Secure Data At Rest with Virtual Key Encryption

Even though the confidential user details and password data in your database might all be encrypted, the Enemy Within knows the location of the encryption keys and can steal the database, decrypt the data, and publish it on the internet.
Not with DSS Enterprise. Once the virtual keys are set, not even we can access them. Even though the root user can change the keys, he's never told their value.
Find out more Download Manual

Content Driven IDS/IPS

Our interest in security has been fostered by the fact that this site has been under (unsuccessful) attack by parasites trying to implant viruses since 2009, and by a botnet since Christmas Eve 2012. We've collected and logged over 10000 hack queries, ranging from SQL injection, to dumb PHP and WordPress hacks, to attempted bash exploits. You can download these files to create pen-testing scripts.
Our IDS/IPS, has successfully defeated every single hack attempt and, by reporting the IP addresses to their ISP's, has helped to remove 96689 of these parasites from the internet - and counting...
You can see a (live) chart of incoming defeated hack attempts by clicking on "Hackers' Graveyard Graph" and, if you're interested in trying the IPS, to protect your website, drop me a line.
Hackers' Graveyard Graph Download the hack queries

Unix, Oracle and Security

We include here, a pot-pourri of Unix articles, with a leaning towards database and security applications. If you're not that good a programmer, they'll either help, or put you off, for good... Read 'Real Programmers' to see if you qualify or, if you're not a programmer, try 'WordImperfect'
Find out More

Powerpoint Presentation for Management

Blog: Random Ramblings On System Security

Blog: Identity As What Service?

Blog: The Choice of a Second Authentication Factor?

Blog: The Choice of a Third Authentication Factor?

What next?
I need more technical information
I need pricing information
I'd like a free 3-month trial

Still interested in the legacy analog simulation stuff?

Copyright © 1999-2017 Design Simulation Systems

All rights reserved for their respective owners.