Armed forces are encountered with an ever increasing set of challenges in defending cyber security from the threat of attack due to
a greater dependence on computer systems and a reliance on connected networking. As cyber systems become increasingly interconnected,
a multi-layered and dynamic security system becomes imperative. With increasingly networked systems, the defence sector has been
presented with a whole array of emerging challenges in cyber defence.
Identification Friend or Foe (IFF) is an identification system designed for command and control.
It enables military and civilian air traffic control interrogation systems to identify aircraft, vehicles or forces as friendly
and to determine their bearing and range from the interrogator. Such systems are useful for preventing action against friendly forces.
The military systems on a battlefield must accurately identify potential targets as friend-or-foe when detected within range of available weapon systems.
IIF means that military commanders are repeatedly faced with the onerous decision whether to engage a detected target while avoiding accidental fratricide.
In the midst of battle, it is very difficult to identify your friendlies or targets.
Current solution to the problem is to identify friendlies from their devices using static information.
OTAC can generate dynamic signals from the device, without the internet.
OTAC is a revolutionary authentication technology enabling
such IFF systems to be able to generate a unique,
dynamic and random value without a network, to verify such
values, and identify targets in one simple unidirectional process.
OTAC sends a one-way code to help identify allies,
transmits a random code to prevent unauthorized use due to
enemy signal hijacking, and ensures the safety of allies
by generating an identifiable code even in the off-the-network environment.
OTAC is a dynamic code, which means the code keeps changing. As a result, you don’t need to worry about any leak of your personal information, such as
your card details, because the codes must have already been changed when others try to use them.
The network connection is NOT necessary at all for generating OTAC.
Reducing an authentication stage that requires the network connection directly means there are fewer gateways for
the hackers to access our personal information.
Moreover, this feature enables users
to authenticate even when they are
in networkless environments, such
as on the plane, underground, rural or foreign areas.
swIDch can guarantee that the code never duplicates with anyone
at any given moment.
There is NO chance of someone else having the same code.
The users or their devices can be identified with the code alone.
Once OTAC has been generated, providing OTAC alone is already fully sufficient to identify the user as the code is unique.
It means, you can forget about the bundles of static information including IDs and passwords.