nigol nigol nigol
more on Identity Theft more on Account Takeover more on Impersination

Problems that we have solved


Almost everyone agree that the practice of use username and password to login remote computer system is no longer providing sufficient level of security. Therefore, strong authentications have been implemented to fill the security gaps. However, security breaches persist.

While a large number of computer user may not realize, the real threat is fraud due to impersonation. This is problematic as all systems are defenseless against impersonation attacks.

Yet, login as a process in our system has involuntary left the door ajar and adversaries have been taking advantage of it. As a result, digital identities have become a sought-after digital commodity to cyber criminals and has fueled the growth of identity base fraud, amount to multi-billion dollar underground economy. Since onetime password has not address the risk of impersonation, Perhaps, it is time to look for root cause of current problem. Could we do away with the traditional login itself?

NIGOL Authentication

A break from tradition and has been implemented as a necessity to ensure digital identity is safe all the time, NIGOL authentication reverses the login process, enabling and requiring a central server to authenticate to its users. With NIGOL authentication, user’s credentials stays within the secure device that user has total control, invulnerable to identity theft. No credential is ever transmitted to a central server for authentication.

NIGOL authentication solves the following problems:

In essence, NOGIL authentication mitigates the risk of impersonation.

Proactive risk mitigation

Built from the ground up with patented technology, NIGOL authentication has been designed to be very secure. From a system perspective, it is an implemented distributed authentication concept to an extreme that every user has its own personal authentication server. At a more personal level, user has total control of personal authenticator; it is accessible only from designated service providers, while user is present during the transaction. Disconnecting personal authenticator from the internet isolates user from current and emerging cyber threats, while enhancing the system security and integrity in the process.

By analyzing and comparing to NIST publication SP 800-63, NIGOL authentication has effectively addressed all authentication protocol risks as identified by NIST: