logo-comarch

What is tPro Mobile

Comarch tPro Mobile is a mobile application for offline one-time code generation. It works on iOS, Windows Phone and Android. And it is also engineered to take full advantage of various mobile operating systems.

It delivers a strong method of authentication based on two factors: “what the user possesses” – a mobile phone with an app, and “what the user knows” – the PIN or gesture. Comarch tPro Mobile is used as a solution for secure login into the system as well as for transaction approval.

  • Unique and cost-effective solution for authentication and authorization in most demanding digital ecosystems
  • Provides simple and effective two-factor authentication, based on what the user knows (PIN) and what the user possesses (a mobile phone with the Comarch TPro Mobile app and TPro OTP)
  • Equipped with HMAC-Based One-Time Password (HOTP) algorithm which generates a unique password for each digital operation
  • Equipped with Time-Based One-Time Password (TOTP) algorithm which generates a unique password valid within a time window
  • Delivered with the challenge-response mechanism (OCRA) which is used for a simple and effective authorization, based on the human-machine interaction enforcement

How it works

Comarch tPro Mobile works in two independent modes:

  • authentication mode, in which a one-time code is generated by Comarch tPro Mobile to authenticate the user in a secured application;
  • authorization mode, in which the secured application generates a challenge (QR, numeric code or push notification). If the code entered into Comarch tPro Mobile is correct, a response code is generated to approve the transaction.

tPro Mobile

  • Mobile application OS agnostic
  • Generates QR, numeric code or push notifications
  • Supports hardware-accelerated cryptography, when available
  • Compliant with OATH TOTP and OCRA algorithms

Features

Challenge-response mechanism

arrow UP

Challenge-response mechanism

Operates on the password-based challenge-response mechanisms (generation of numeric and QR codes).

Two-factor authentication

arrow UP

Two-factor authentication

Provides simple and effective two-factor authentication, based on what the user knows (PIN) and what the user possesses (a mobile phone with the Comarch tPro Mobile app).

Strong security

arrow UP

Strong security

Secured by the event-based HOTP algorithm (RFC4226), a cryptographic pseudo-random number generator and the SHA256 hash algorithm.

Mobile OS agnostic

arrow UP

Mobile OS agnostic

Works on four mobile operating systems (Android, iOS, Windows Phone and Java based OS).

Customizable

arrow UP

Customizable

Possibility of user interface customization.

User friendly

arrow UP

User friendly

Easy to use and install.

Benefits

  • Protects against keylogger attacks
  • Safeguards its user against electronic funds transfer frauds
  • No wire transfer can be done without physical access to the device
  • Can replace a costly authentication and authorization method based on text messages
  • No need to purchase additional devices

Contact us