Skip to content

FAQ

Frequently Asked Questions

Just that. Whis our inventions, the archaic password with user IDs are no longer the bedrock for data security, integrity, and protection.  Passwords are the No. 1 point of attack for all cybercrime, hacking, and the new real global threat of ransomware. Swoop removed this broken bedrock of passwords and has replaced it with the Swoop PKI Platform creating a paradigm shift in the world of Authentication and Internet Security using. Say goodbye to the Password and hello to a friction-free and more secure Internet.

When Swoop’s many patented technologies and trade secrets are coupled with and layered into the global email server public key infrastructure (PKI) already well established, the Swoop PKI Platform has been created.  It is this patented Swoop PKI Platform which creates the patented and proprietary Swoop Global Authentication Network.

A Platform is hardware and software architecture that acts as the foundation or base upon which other applications, processes, or technologies are developed. In computing, platform refers to basic hardware i.e., computer system and software i.e., operating system on which software applications are often run.

Platforms are separate from User Side Applications – these Applications run on user devices that interact with the Platform. Many technical companies work in either the Platform or the Application side of a network and many need both a Platform and an Application to work (i.e., Microsoft Authentication App)

The Swoop PKI Platform enables the ability to have and use a Global Authentication Network with unparalleled security as a password free backbone and infrastructure for users and companies for all transactions that run over the Internet. Transactions can include authentications, purchases, sales, trades, successful account logins, user requested validations, application processes, secured account creation, among many other types.

No. Swoop is 100% Platform Driven technology. Even though users use devices with email and web applications to interact with the Platform, Swoop’s PKI Network enables the creation of a novel Global Authentication Network without anything the user needs to download or modify their current devices.

A public key infrastructure (PKI) is a set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

These are patented generated mailto links by the Swoop PKI Platform that include many embedded and encrypted tokens, unique identifiers, and coded instructions. The Swoop QR Codes is another form of the embedded mailto link that allows the coded swoop technology to be scanned by the user’s mobile device, instead of clicked or tapped, by the user.

Once the Swoop Embedded Links and QR Codes are activated, in effect it causes the user’s email account to open a pre-populated Swoop Email to be sent by the user to submit which will complete a transaction using the Swoop Authentication Proprietary Protocol (SAPP).

Swoop’s patent portfolio protects and discloses the Swoop Authentication Proprietary Protocol (SAAP) which drives the Swoop PKI Platform and is layered on top of and leverages the Simple Mail Transfer Protocol (SMTP) and built its Standards, Protocols and Cryptography (DKIM, SPF and DMARC).

The SAPP includes Swoop’s patented set of established rules that specify how to format, encode, send, and receive data so that computer network endpoints, including computers, servers, routers, and virtual machines, can communicate despite differences in their underlying infrastructures, designs, or standards.

The SAPP also is built upon Trade Secrets found within Swoop’s  patented technology and are handled through Swoop’s Secure Transaction Framework and Customized Mechanism employed in Swoop’s validation and authentication processes.  These include tokenization, unique identifiers, and hash codes, as well as many others coded secrets. The number of unique Swoop Customized Mechanisms for validation and authentication can triple any current MFA solution – which is still based on the vulnerable and archaic password as its bedrock.

The SAPP is intricately involved in the generation of Swoop Embedded Links and Swoop QR Codes as well as validating and authenticating Swoop Emails and governs the Swoop PKI Platform.

And this is about all we can tell you or my boss will fire our complete department!