Authentication & Verification
Classic 2FA / MFA
MFA for AD, LDAP, Databases
Wi-Fi Authentication
Electronic Visit Verification
Popular Integrations
Popular Integrations
Programmable hardware TOTP token in a card format that fits any authentication system
Classic hardware TOTP token with SHA-1 algorithm support
Programmable hardware TOTP token in a key fob format that fits any authentication system
Classic hardware TOTP token with SHA-256 algorithm support
Programmable hardware TOTP token in a card format that fits any authentication system
Classic hardware TOTP token with SHA-1 algorithm support
Programmable hardware TOTP token in a key fob format that fits any authentication system
Classic hardware TOTP token with SHA-256 algorithm support
A free 2FA authenticator app with cloud backup, easy token transfer to a new phone, PIN and biometric authentication protection
Free OTP delivery with chatbots in messaging apps
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time passwords delivery via push notifications
A free 2FA authenticator app with cloud backup, easy token transfer to a new phone, PIN and biometric authentication protection
Free OTP delivery with chatbots in messaging apps
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time passwords delivery via push notifications
Get Started
Classic 2FA / MFA
API Documentation
Software Development Kits
Get Started
Classic 2FA / MFA
API Documentation
Software Development Kits
Using programmable TOTP hardware devices allows you to connect users who do not want or cannot use their cell phones as OTP tokens to your two-factor authentication system.
Note, a hardware token Protectimus Slim NFC can store one seed no longer than 32 symbols in Base32.
At the moment, my assessment of the company’s work is 10 out of 10. An important factor in choosing this two-factor authentication provider was the possibility of customizing the 2FA system for our project. After we got in touch with the Protectimus team and explained the task, they implemented the necessary functionality for us free of charge. There were no problems. Everything works well.
Protectimus was chosen because of their unique Dynamic Strong Password Authentication (DSPA) technology. Using this product, we added 2FA to all the systems we needed to protect in one fell swoop, as it allowed us to integrate two-factor authentication services straight with Active Directory. We have been using the Protectimus two-factor authentication platform for a year and are satisfied with this product.
Over the past years, we’ve had only positive cases of working together. Protectimus helped us at every stage, from integration to adding additional features that solved our specific tasks. Using Protectimus, we are confident that Volet infrastructure and users are well protected. Protectimus gives us what money can’t buy – not a sense of security, but REAL security. I highly recommend it for implementation.
Display Type | E-ink |
---|---|
Display size | 6 digits |
Size ID1 | 86 x 54 x 0.9 mm (3.4 x 2.1 x 0.035 in) |
Size mini | 64 x 38 x 0.9 mm (2.5 x 1.5 x 0.035 in) |
Weigh ID1 | 5 g (0.18 oz) |
Weigh mini | 4 g (0.14 oz) |
Standard | TOTP (time-based) IETF RFC6238 |
Algorithm | SHA-1 |
Time interval | 30 and 60 seconds |
Compliance | OATH (Google Authenticator) |
Temp | -10°C to +50°C (-14°F - +122°F) |
International Protection Code | IP67 |
Battery | 3-5 years |
Connection protocol | NFC |
Application for the token's setup | Android |
Number of tokens you order | Price per token |
---|---|
1—99 | $29.99 |
100—499 | $28.99 |
500—999 | $26.99 |
1000—4999 | $24.99 |
5000 and more | $21.99 |
The token’s warranty lasts for 12 months from the moment the device is sent to its recipient.
The warranty is valid in the absence of mechanical damage and during normal operation of the 2FA token.
We offer worldwide shipping at a starting cost of $29.00.
Please note that when ordering large batches of tokens, the delivery price increases.
Want OATH tokens with custom branding? We can make them for you!
Branding is available for orders of 1000 OTP tokens or more. Cost: $1 per token.
Initiate the token setup on the system where you require enhanced security. Save the secret key in a SAFE place so that you can easily restore the security token.
Scan the secret key using the TOTP Burner app, or input it manually. We recommend the automatic method.
Activate the OTP token and place it near your phone's NFC antenna. While holding it near the NFC antenna, tap "Burn the seed" and wait for a message confirming that the 2FA token was programmed successfully.
One-time passwords are generated by a special algorithm (TOTP, HOTP, OCRA) using a secret key. Conventional hardware OTP tokens’ secrets are configured during production, and cannot be changed. For example, in 2FA solutions based on OATH authentication standards, secret keys are generated by the server, and connecting a hardware token with a preinstalled secret key is impossible. But programmable NFC tokens can be set up uniquely to each 2FA system as such MFA token can be set up to use a secret key generated by the authentication system, and reflashed every time it is reassigned to another person.
Protectimus Slim NFC tokens can be used by anyone who wants to protect their account in Google, Facebook, Dropbox, GitHub, Kickstarter, KeePass, Microsoft, Teamviewer, Office 365, Azure MFA, etc. The 2FA systems of these and other popular platforms are built on the basis of Google Authenticator, and require users to install the app from Google or receive one-time passwords by SMS. But hardware TOTP tokens are more reliable. They nullify the risk of interception of the one-time passcodes.
SMS messages are one of the most convenient and widely used ways to deliver one-time passwords. But they are not the safest. During transmission, SMS messages can be intercepted by means of a “man in the middle” attack or a virus on the user’s smartphone. In addition, SMS-center employees may have access to these messages. Hardware MFA tokens operate completely autonomously without requiring a connection to a network, which means they are protected against such threats. Thus programmable OATH tokens are a safer alternative to SMS-authentication.
Soft tokens were invented with the advent of smartphones as a convenient alternative to hardware OTP tokens. Functionally identical to hardware tokens, and sometimes even more convenient, because a single application lets you create multiple OTP tokens for different resources. But from the point of view of security it is better to buy a TOTP hardware token, since with the increasing popularity of smartphones, the number of viruses designed specifically to compromise the software OTP generators or intercept SMS-messages with one-time passwords has increased as well. With the hardware tokens there is no such risk.
A programmable NFC token smart-card as small as 64 x 38 x 0.9 mm is an innovation in two-factor authentication. This MFA token looks stylish, takes up little space in your wallet, and is waterproof and robust. Protectimus Slim NFC tokens are built to last up to 3-5 years, with a warranty of 12 months. The world has long been waiting for such a solution to strengthen two-factor authentication systems built on the basis of Google Authenticator and OATH authentication standards. And finally with the advent of NFC technology it has become possible.
To transfer NFC security tokens to your 2-factor authentication system, the tokens must be pre-programmed. To do this, we provide a special application for smartphones based on the Android operating system Protectimus TOTP Burner. Please note that your Android phone must support NFC technology. Detailed instructions on the use of this application is available on our website.
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64