<% String path = request.getContextPath(); %> <%@page contentType="text/html" pageEncoding="UTF-8"%> AuthGuru U2F FIDO Dongle, Secure Authentication Key "> "> "> "> "> "> "> "> "> ">

Secure access authentication to online account

U2F FIDO DongleAuthguru FIDO security key is contains programmed secure chip which start working on a single tap. The FIDO U2F protocol enables relying parties to offer a strong cryptographic 2nd factor option for end user security. The relying party's dependence on passwords is reduced.

AuthGuru U2F FIDO Security key is driverless USB device works on U2F protocol to protect the online account from illegal access. The FIDO security key by specially designed for 2nd factor authentication relying on high-security, public-key cryptography, durable and conveniently sized, just insert into USB port, tap and it start working with any online application that supports U2F protocol, such as Gmail, Google Apps, GitHub, Dropbox, SalesForce and many more are in row. Authguru FIDO U2F key works on Windows, Linux and Mac OS.

  • Works on application which supports U2F protocol
  • Secured and strong authentication
  • Tap and start working, No need of OTP or any sms/ mail verification process
  • Driverless, Plug and Play device
  • Metallic body makes it a robust enough for any physical damage
  • High performance smartcard chip and on-board security encryption algorithms
  • High performance smartcard chip and on-board security algorithms ensures high security level and effective performance
  • Identifies as normal USB hardware device and can be used on standard USB port
  • It doesn’t require any client software, middleware or traditional CA (certificate authority) mechanism
  • Supports multiple OS, such as Windows, Linux and Mac OS

In this world of internet and cyber-attacks, even stronger and fully encrypted passwords cannot assure complete protection to your login account. You can think would be happen if somehow your password is leaked and someone sneaking to your private data, and personal information. By the moment you come to know, it will be really late.

To stop these kinds of threats, Google has stepped forward and issued login support to universal 2 factor user authentication using a hardware security key known as FIDO keys.

The FIDO protocols use standard public key cryptography techniques to provide stronger authentication. During registration with an online service, the user’s client device creates a new key pair. It retains the private key and registers the public key with the online service. Authentication is done by the client device proving possession of the private key to the service by signing a challenge. The client’s private keys can be used only after they are unlocked locally on the device by the user. The local unlock is accomplished by a user–friendly and secure action such as swiping a finger, entering a PIN, speaking into a microphone, inserting a second–factor device or pressing a button.

" class="img-responsive" alt="Two Factor Authentication Process" title="Two Factor Authentication Process">

The FIDO protocols are designed from the ground up to protect user privacy. The protocols do not provide information that can be used by different online services to collaborate and track a user across the services. Biometric information, if used, never leaves the user’s device.

Item Parameter
Power Supply USB Port
Working Voltage 5V
Working Current 50mA
Working Temprature 0 - 70 ℃
Storing Temprature -20 - 85 ℃
Casing Material Metal/ABS
Communication Protocol HID
Interface Standard USB 2.0 High speed support, compliant with 3.0
Processor 32-bit Smartcard chip
Erasing Cycles At least 100,000

Universal 2 Factor Authentication

During registration and authentication, the user presents the second factor by simply pressing a button on a USB device or tapping over NFC. The user can use their FIDO U2F device across all online services that support the protocol leveraging built–in support in web browsers.

Second Factor Authentication
Software copy protection solution Hardware keys RTC keys for time based protection