Implementations
Digital handshakes, trying to ensure users are communicating with who they think they are, are everywhere in our lives today.
We’ve become accustomed to using PIN codes, passwords, passcodes, secret words, birthdates, favourite colours, city of birth, first cars, fingerprints, iris scans and on and on – all in an attempt to ensure the handshake is between the appropriate parties.
GATE technology can be used to improve security and reduce vulnerability in any of these situations – essentially anywhere that warrants some form of authentication.
Examples of potential GATE implementation include:
⦁unlocking a phone, ipad or computer
⦁credit or debit card PIN code entry and point of sale, online or at ATMs
⦁crypto wallet access
⦁buildings, doors or other physical access
⦁server to server authentication