Ukraine flag

We stand with our friends and colleagues in Ukraine. To support Ukraine in their time of need visit this page

OCRA Token Is Your Security Guard

PROTECTIMUS ULTRA
Protectimus ULTRA is one of the most reliable solutions in the market. This token’s peculiarity is that the generation of the secret key is completed during the process of token activation. Thus, the key is not known even to the token manufacturer. Besides, the token works based on the request-response algorithm, which is the most reliable of all the existing ОТР generation algorithms.

This token is ideal for the most sensitive areas of your system. Another advantage of this token is theft protection with a PIN on the token itself.

Secure Protection

Protectimus ULTRA works in the request-response mode, which is the most reliable leader in the field of ОТР. Using time as an additional parameter eliminates the possibility of repeated use of the response in case the request is used repeatedly.

Even if a potential intruder steals this wonder of authentication, it will not be of use to him because the device itself is PIN protected.

Rich Functionality

It may not be the newest sophisticated smartphone, but ULTRA can do a thing or two. It can work based on either one of the two OTP generation algorithms: OCRA and ТОТР, and you use arrow buttons to switch between the two options.

It also offers status indicators, locking after 6 incorrect PIN entries, unlock code generation, and PIN change functions.

Key Features

  • The most reliable solution;
  • Dimensions: 7.02 cm × 4.52 cm × 0.32 cm;
  • ОТР length: 8 or 12 characters;
  • PIN on the token itself;
  • Locked after PIN is entered incorrectly more than 6 times;
  • Works in the request-response mode and the time-based OTP generation mode.

Download

How to buy?

You can easily become a happy owner of this device. Depending on your preference, we can place your company’s logo and other visual features on the device; you can also choose the color of your token. Producing customized tokens based on your specific requirements takes additional 3-4 weeks.

The price of tokens does not include shipping and delivery costs and other additional charges, such as taxes and customs duties.

Delivery times depend on several factors, in particular: lot/consignment size, token availability at our warehouse, and postal service. Besides, the delivery time will depend on whether additional visual features need to be placed on the products. Typically, if there is a sufficient quantity of products at the warehouse, orders are delivered within 2 to 6 weeks.

To place an order, please fill out the form, and our specialist will promptly contact you.
Order

See Also

ImageToken ModelPrice, pcs
110050010005000
Brief DescriptionDescription
PROTECTIMUS TWOPROTECTIMUS TWO$11.99$11.49$10.99$9.99$8.99

$3 when paying service in advance for a year
Bulletproof OTP token: reliable, waterproof, stylishBulletproof TOTP token: reliable, waterproof, stylish

$3 when paying service in advance for a year
PROTECTIMUS FLEXPROTECTIMUS FLEX$19.99$18.99$16.99$15.99$13.99The reprogrammable and stylish hardware TOTP tokenThe reprogrammable hardware TOTP token
PROTECTIMUS SHARKPROTECTIMUS SHARK$14.99$14.49$13.99$12.99$11.99This hardware token offers exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithmWe recommend using this token
PROTECTIMUS SLIM MINIPROTECTIMUS SLIM MINI$29.99$28.99$26.99$24.99$21.99Reprogrammable NFC token, that fits any two-factor authentication systemReprogrammable NFC token
PROTECTIMUS SMARTPROTECTIMUS SMARTfreeAvailable for all key Android and iPhone platformsSoftware token for Android and iPhones
PROTECTIMUS SMARTPROTECTIMUS PUSHfreePush via Android and iPhone applicationsСonvenient and reliable
PROTECTIMUS BOTPROTECTIMUS BOTfreeOTP delivery via messenger — easy, secure, convenient. The service is available on Telegram, Viber and Facebook Messenger.The service is available on Telegram, Viber and Facebook Messenger
PROTECTIMUS SMSPROTECTIMUS SMS$2 per user/monthMinimum hassleMinimum hassle
PROTECTIMUS MAILPROTECTIMUS MAILfreeMinimum costsMinimum costs


Knowledge base

Along with HOTP and TOTP, OCRA is one of the algorithms for generating one-time passwords and certified by OATH. Starting with HOTP, algorithms have evolutioned for having their vulnerabilities destroyed and to get more reliable result. Then, TOTP algorithm has been introduced as a way to bound time to one-time password generation. Among the other two, OCRA algorithm is one of a kind. It is the most modernized solution with the highest reliability level. OATH challenge response algorithm is what we mean under the ‘OCRA’ abbreviation. You may try it with our Protectimus ULTRA and SMART tokens.

Overall, we can say that all three authentication algorithms – HOTP, TOTP and OCRA are something you can count on when it comes to data security issues prevention. However, every next algorithm contains new features and are overall better because of having previous versions’ weaknesses removed. OCRA is probably most secure because of its challenge response system. This algorithm is applicable in systems with the preferred asynchronous authorization. It is generally considered, that OCRA is less vulnerable in terms of malicious authentication server substitution or disalignment attacks.

OCRA token can be a hardware device or a software application that you can use or distribute among your co-workers to protect your company’s or project’s data. Today, all the information you keep secured with a static login and password can be violated by techniques, such as phishing, easily. It is essential to take care of enforcing your authorization process. One can do it by using additional feature – one-time password. OATH has delivered several algorithms for OTP generation. Challenge-response token uses one of them – an algorithm based on random server values instead of an event timer.

At Protectimus, we do our best to provide our Customers with the most secure two-factor authentication solutions. Our products are OATH certified and operate through applicable algorithms. Protectimus ULTRA is one of the products to be proud of. Actually, it does not look like a device to deliver OTPs, so no perpetrator would think to possess it. Even if someone steals your device, he would not manage using it as it is protected with a PIN. If the PIN is entered incorrectly six times, Protectimus ULTRA gets blocked. This token is extremely reliable and comes at a moderate and affordable price.

All our Protectimus tokens have been created for you to stop feeling the danger of having one’s user account hacked. Protectimus ULTRA is a challenge response token, which gives you an opportunity to test the experience of protecting your most sensitive data. Uniqueness of a challenge token implies a possibility of having a secret key set by the admin. It means no third party would know the secret key meaning. What’s more, Protectimus ULTRA supports two OATH algorithms – TOTP and OCRA. You can easily switch between them using the arrow keys on your device.

What Is OCRA?


Benefits of OCRA


What Is An OCRA Token?


What Is Protectimus Ultra?


Protectimus ULTRA pros