Learn More

About winkk


  • multiple profiles supported for different corporate roles

  • every transaction is logged

  • When the phone is upgraded all the application settings are preserved

  • For enterprise customers, user authorization is integrated with Microsoft AD groups and role management

  • In case of mobile device compromise, user's account can be centrally suspended

Uses HyperEye™ optical code to complete secure authentication

  • Patented fast reliable optical code recognition as a one-way out of band information channel

  • dynamic optical code encodes transaction ID and TOTP for the requesting service for mutual authentication

  • After scanning the code, the phone can complete the authentication transaction while air-gapped from the requesting service

FREE POC :  info@winkk.com

Mobile Phone is a secure personal device

  • each user profile is cryptographically authenticated and signed

  • Phone is a personal device which is always with you-  "something you have"

  • using PIN or pattern to unlock the phone - "something you know"

  • built in biometrics - "something you are"

  • Compromised phone is locked out

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.”

Kevin Mitnick

Famous hacker

“Yahoo said on Thursday that hackers in 2014 stole the account information of at least 500 million users, including names, email addresses, telephone numbers, birth dates, passwords and, in some cases, security questions.”

New York times

September 2016