Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone, a mobile financial and security pioneer with more than 80 granted and pending patents, today unveiled its Connected Smart Card (CSC) solution – a combination of hardware products, software solutions and hosted services – that enables financial, government, healthcare and other enterprises to augment passwords and other user ID information used to access sensitive information. Tyfone’s CSC solution uniquely combines centralized data with local, device validation to strengthen and simplify the centralized storing of passwords, credit card numbers and other digital ID credentials, optimally ensuring security to keep passwords, payment and biometric ID information out of the hands of cybercriminals.

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

“Criminals have always robbed banks because ‘that’s where the money is,’ but today’s cybercriminals prefer the centralized databases that store individuals’ passwords because with passwords they can loot literally millions of bank accounts and credit card numbers, steal sensitive government and corporate data, and hack critical infrastructure such as power grids,” said Dr. Siva Narendra, CEO of Tyfone.  “Recognizing this threat, Tyfone worked closely with our financial and government customers to implement our CSC technology, a next-generation cyber security solution that enables the locally-secured, hardware-enabled storage of passwords, card preset payment information, biometrics and other ID credentials to keep criminals and hackers at bay.”

Tyfone’s CSC solution operates much like the traditional plastic smart card systems already in widespread use, but has a much smaller physical footprint and uniquely has the ability to connect to any mobile device, tablet or PC. Tyfone’s CSC hardware works with all existing software, smart card applets, password schemes and digital certificates, making it the first truly interoperable solution that secures the device, the identity and the transaction, controlling access to ID information in a unique combination of distributed and local (on device) layers.  This unprecedented approach allows for seamless integration with organizations’ existing smart card-driven security solutions, maximizing investments in security infrastructure.  The end result is that Tyfone’s CSC solution ensures that employees, consumers and other end-users can securely access their bank accounts or email, pay online as a card preset transaction or enter a building without the vulnerability that comes with today’s centralized storing of passwords or biometric IDs. 

New Data Security Approach Necessary for Increasing Cyber Attacks

Cyber security is a critical and growing concern for governments and financial institutions as access to sensitive information and financial transactions are increasingly done via mobile devices and websites, which utilize password protection.  Of particular concern is the security of these passwords, which are stored centrally – and increasingly in the cloud – making these databases vulnerable and tempting targets for hackers.  According to Deloitte, one of the top auditing and consulting firms worldwide, 90 percent of centrally-stored passwords are currently vulnerable.  Additionally, according to Wired Magazine, more than 280 million stored passwords have been compromised over the past 18 months.

Though further bolstering authentication through the use of thumbprints and other biometric IDs has been touted as a solution, the reality is that biometric credentials are unique, sensitive, personal information and therefore actually more vulnerable than passwords, if centrally stored in the cloud.  This greater vulnerability is because a person’s thumbprints and other biometric data cannot be changed if stolen, whereas passwords can be changed after a breach has occurred.

“While cloud services increase productivity by allowing for ubiquitous, anywhere access, centralized data create centralized points of failure,” said Dr. Steve Crocker, Tyfone advisory board member and an Internet Hall of Fame inductee for his work that lead to the development of ARPANET, a precursor to the Internet.

“There are two solutions to this centralization problem. One option, as more services move to the centralized cloud servers is to migrate identity storage to be client centric. This client-centric approach helps prevent a single hack from compromising millions of identities, like recent hacks of Zappos.com or LinkedIn," added Crocker. "The other alternative is to have a completely distributed storage that syncs up between various authenticated clients without any centralized storage. This distributed approach also prevents massive loss of data from a single hacking event. In either case, information and/or control of access to information is distributed, making the authentication solution more robust.”

CSC Availability and Incorporation into Existing Systems

Tyfone’s CSC solution is currently in pilot deployments for strategic customers with general availability planned for the fourth quarter this year. Organizations interested in joining the pilot or integrating Tyfone’s CSC solution with their own security products can contact Tyfone at [email protected].

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.