FAQ

Have a question? Check here to see if it's been answered

General Information


What is two-factor authentication (2FA)?

Two-factor authentication (2FA) is an authentication process that is comprised of two elements. The first is something you know, such as a password. The second is something you have, usually a security token or a smart card. 2FA increases your security because if a hacker manages to steal one factor—like your password—they won't be able to gain access without the second factor.

Why do I need two-factor authentication?

Two-factor authentication (2FA) greatly increases your identification and access security by adding a second "factor" to the authentication process. 2FA helps protect crucial data and information such as bank accounts and confidential records without the need to manage multiple complex passwords.

Why is it not secure to solely rely on static passwords?

Advancements in technology means hackers have many easy ways to steal static passwords. Common attacks include malware, phishing, Man-In-the-Middle (MITM) attacks, and much more. If the password you use is static, it never changes, which makes it possible for hackers to steal it and use it to access your internal networks. This is why using a second factor to secure your account access keeps you much safer.

What is a one-time password (OTP)?

A one-time password (OTP) is a unique, dynamic password that changes based on either an event (like a button press) or a time value (from the clock on device or server). It's valid for only one logon session, which effectively prevents password theft.

What is Universal Second Factor (U2F)?

U2F is an open authentication standard that enables Security keys devices and other devices to securely access any number of web-based services, making it impossible for a remote attacker to gain access to your account, protecting you from most of the malicious hacks you hear about.

Which browsers support U2F?

Right now Google Chrome version 38 or later include support for the U2F protocol.

Buying Hypersecu Products


What locations do you ship to?

Hypersecu products are shipped globally using Canada Post, UPS, or FedEx. All destinations are subject to the availability of these carriers, as well as exporting regulations where applicable.

Do you have an online store for purchasing your products?

Your online purchasing experience and security is our top priority. We use industry-leading e-commerce service providers such as Amazon.

Do you offer fulfillment services for Information Security Service Providers?

Yes, fulfillment services, such as drop shipping to your clients' locations, are available. Please contact us. We are more than happy to discuss with you how we can help meet your individual requirements.

Do you offer discounts or specials for your products?

Yes, we do offer corporate discounts and special prices for large orders. Please contact us for details.

Do you offer customization service on the products?

Yes, customization services such as branding, special packaging, software customization, and development are available on most Hypersecu products. See our customization guide for details.

Do you offer other products and solutions that are not listed on your website?

Yes, we can provide products and solutions tailored to your needs. Please contact us for details.

HyperFIDO™ FIDO U2F Security Keys


What is FIDO?

The Fast IDentity Online (FIDO) Alliance is a non-profit organization dedicated to reducing reliance on passwords and usernames for authentication. Their goal is to develop an open set of standards that can be widely adopted in order to change the nature of secure authentication. To learn more about FIDO, visit https://fidoalliance.org/.

What is the HyperFIDO U2F Security Key?

The HyperFIDO U2F Security Key is a two-factor authentication device that adds a strong second factor when signing in to online services. Registering and using the HyperFIDO requires just a press of a button. It works with all online services that support the FIDO protocol, including Gmail and Dropbox.

Learn more about HyperFIDO.

What is the benefit of using of a HyperFIDO U2F Security Key?

The HyperFIDO security key makes use of the browser and a public key/Key Handle system in order to perform authentication. As a result, it effectively prevents phishing attacks and can also combat real-time attacks, which secretly intercept communication between a user and the authentication server.

Been widely adopted by different online services, HyperFIDO security key can be used in many FIDO U2F enabled services, like protecting Gmail accounts, signing in to online banking services, and more.

How do I use the HyperFIDO U2F Security Key?

Register your HyperFIDO security key with the account you want to secure. Then activate the device by pressing the button during the registration process. When you sign in later, simply insert the security key into a USB port when prompted and press the button. Learn more with our HyperFIDO User Guide.

What kinds of accounts can I secure with a HyperFIDO U2F Security Key?

You can secure all kinds of online accounts using your HyperFIDO security key where FIDO U2F is enabled. All these accounts can be secured with just a single device.

How many accounts can I secure with one HyperFIDO U2F Security Key?

There is no limitation to the number of accounts with our new generation HyperFIDO U2F security keys. (Previous versions of the HyperFIDO K5, delivered prior to 2017, supports up to 64 individual accounts.)

How do I set up my Linux system to use my HyperFIDO U2F security key?

You’ll need to add a rules file to your Linux system inside the folder /etc/udev/rules.d/. To do so, use one of the following methods:

Automatically download the rules file from our website and install the file
From your terminal, execute:

$ sudo curl https://hypersecu.com/downloads/files/configurations/70-u2f.rules > /etc/udev/rules.d/70-u2f.rules
$ sh -c /etc/udev/rules.d/70-u2f.rules

then restart your computer.

OR

Manually install the rules file
If you are not able to execute the commands, you can download the rules file from hypersecu.com/downloads/70-u2f.rules and copy the file to /etc/udev/rules.d/

Note: If you already have the rules file from another U2F device vendor, add the following into the current rules file and restart your computer:

# HyperSecu HyperFIDO
KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{idVendor}=="096e|2ccf", ATTRS{idProduct}=="0880", TAG+="uaccess"

To test your HyperFIDO U2F security key once you’ve completed the configuration, go to u2fdemo.hypersecu.com.

HyperOTP™ One-Time Password Devices


What is a one-time password (OTP)?

A one-time password (OTP) is a unique, dynamic password that changes based on either an event (like a button press) or a time value (from a UTC clock on the device or server). It's valid for only one login session, which prevents password theft.

Do you offer mobile OTP?

Yes, we offer a selection of mobile OTP products compatible with both iOS and Android devices. Please contact us for more information.

What are the security advantages of OTP tokens?

OTP tokens provide a unique, dynamic password each time you log in, which significantly decreases the risk of password theft. It also prevents the need to change your password frequently or to maintain long and complex passwords.

How do I use an OTP token?

Simply press the button on the token to display your one-time password value, then enter the value to sign in to your OTP-enabled network services. Check with your service provider to see if your account has been linked with an OTP token.

What is a time drift?

A time drift is when the internal clock inside a time-based OTP token becomes out of sync with the server’s time window. When this happens, the codes generated by the token will no longer match what the server recognizes and authentication will fail. Many authentication servers will provide a feature to re-sync the OTP token so that there’s no need to replace it.

How can I re-sync an OTP token?

If you need to re-sync an OTP token, many OTP authentication servers will allow you to do so. A common method is to have the user enter two OTP codes in sequence. The server will then verify the token’s ownership, determine the time offset on the token, and store this information in order to calculate future passcodes. However, all authentication servers are different. Please contact your authentication server provider if you are not certain how to re-sync your OTP token.

What is the HyperOTP Edge?

HyperOTP Edge is our innovative user-programmable OTP card that allows end users to program the secret key (seed) through NFC technology. This is done by using a smart phone or tablet and our Edge Programmer app. Like all HyperOTP products, the Edge is designed to integrate with OATH and RADIUS. You can program the card using your own authentication server or you can use a generated code from any service using Google Authenticator servers, like Facebook, Twitter, GitHub, and more.

What is the benefit of using the HyperOTP Edge?

Because end users can program the Edge card themselves, any access using two-factor authentication can be integrated with the Edge. Also, the secret key (seed) is never shared with any third party, giving you enhanced security over the authentication process. To find out why a hardware token like the Edge can keep you safer, read our white paper Hard vs. Soft Tokens.

How do I use the HyperOTP Edge with my social media account or password manager?

Simply enable two-factor authentication in your account settings and follow the service's instructions. Then use the key code provided by the service to program Edge with our Edge Programmer app and it's ready to use.

What is a "seed"? How do I add the seed to the HyperOTP Edge?

A seed, secret key, or seed value is a unique symmetric key associated with each OTP token and the server account linked with this token. This is a core element for all types of OTP tokens. For services similar to Google Authenticator, your seed value or "key code" will be generated and given to you by your online service provider.

HyperPKI™ Public Key Infrastructure Devices


What is a public key infrastructure?

A public key infrastructure (PKI) is digital certificate-based security solution that provides online security for identification and authentication, as well as safe and secure digital transaction using digital signing and encryption/decryption. Each unique certificate generates a key pair containing a public key and a private key. Your public key can be used to verify a digital signature or shared to encrypt information, while a private key is used for decryption and digital signing. With our HyperPKI™ tokens, all operations are performed on board within a secure and closed environment to prevent data theft and malicious attacks.

Learn more about HyperPKI.

Does PKI require any programs to use? How do I install this program?

Each HyperPKI token includes the PKCS#11 middleware, allowing the token to function with any PKCS#11 PKI-enabled application like Microsoft Outlook, Windows Smartcard Logon, Adobe digital signatures software, Mozilla Firefox, and more. PKCS#11 offers a user-friendly interface to manage certificates and log on to remote systems. To download the latest version of this middleware, click here.

HyperSC™ Smart Cards and Smart Card Readers


What is a smart card?

A smart card is a plastic card embedded with a microchip that can be loaded with data applications for electronic processes (also known as ISO/IEC 7816 smart cards). Smart cards can be contactless, which allow users to "tap" the card rather than inserting it (also known as ISO/IEC 14443 Type A/B/C contactless smart cards).

What is the benefit of using a HyperSC smart card?

HyperSC smart cards come with well-designed Native or Java COS, and are compliant with the latest top smart card industry standards. With various selections of the high security level smart card chips, HyperSC smart cards can be customized for every requirement in banking, authentication, and many other sectors.

Learn more about HyperSC.

How do I know if smart cards are right for me?

For off-the-shelf users, the native PKI smart cards are the best selection for PKI implementations, while Java Cards can be easily customized to meet your specific requirements.

hypersecu support

Still can't find what you need?

Our support team is here to help: This email address is being protected from spambots. You need JavaScript enabled to view it..