Signatures have a new Enabler: Silent Shard

Democratizing Adoption of Enterprise Grade MPC

Threshold Signatures: Truly Distributed Key and Signature Generation

Silent Shard enables products to adopt state of art Threshold Signature Schemes.

Read More

Secure In-Motion and Self-Custody Enabler

Private keys as a whole are never created or exposed. Silent Shard provides methods to orchestrate distributed key shards across different constructs of enterprises; enabling a true self-custody.

Read More

Scalable

Silent Shard SDK scales well across quorums: {2,2} and {t, n}, Threshold Signatures curves: ECDSA and EdDSA, and access policy designs across different form factors of shard nodes (phone, cloud, COTS devices etc).

Read More

Fast

Battle tested for computational and communicational efficiency across COTS devices.

Read More
shape 25 1
Say Bye Bye to Single Point of Private Key Failures

Use Case: MPC with Browser and Plugin Wallets

Vector
network 1

MFA has a new name: Silent Auth

Enhancing Security-Usability Balance through Cyber-Physical Proofs.

Proof of Posession

We essentially verify if the user actually possess the private keys and the MFA token when attempting to approve a transaction.

Read More

Proof of Proximity

We ensure that the login and token device are co located, in proximity of each other during approval of signature and authentication.

Read More

Proof of Liveliness

Silent Auth ensures human engagement though its unique check of liveliness.

Read More

Multi-Modal Authentication

We bring multi modal sensor signal fusion for context intelligence and authentication checks.

Read More

Risk Intelligence and Adaptive

SilentAuth has novel 3 pillars of risk intelligence to facilitate adaptive and multi step up authentication as per the use cases and situations. 

Read More

Continous Session Authentication

Silent Auth is first of its kind MFA to provide continuous trusted session and adapt as per user and service engagements.

Read More

Passwordless Authentication

Silent Auth supports passwordless session authentication.

Read More

Fast

Hassle free and effortless authentication in less than a second

Read More
shape 25 1

Say Bye Bye to Draggy, Insecure and Centralized Auth Methods

Use Case: Approve a Transaction with flick of the Phone.

Vector
network 1

Silent Shard: Use case customization to Support Both On-Chain and Off-Chain Authentication.

Our Auth framework supports contextualized libraries for specific needs of businesses needing decentralized security.

Read More our library support
shape 26 1
shape 25 1
img 19 1 1

Built by the developers and for the developers

Silent Shard and Silent Auth come as packages of plug and play SDKs and APIs.

shape 27 1

Testimonials

Partners and Customers Love Seamless Silent Auth

shape 25 1
shape 31 1

Updates and Posts

shape 3 1 1 shape 4 1 1 shape 5 1 1 shape 6 1 1

We are supporting Proof of Co-Location for DRIFE

Silent Auth, is supporting seamless authentication for decentralized ride hailing company: DRIFE. Silent Ride enables just walk in to validate.

shape 3 1 1 shape 4 1 1 shape 5 1 1 shape 6 1 1

Silent Auth Wins Singapore Blockchain Innovation Challenge 2021

Winner in both Jury and Public Voting Cateogories, hosted by Singapore Blockchain Innovation Programme (SBIP) - a collaborative and nationwide technical community.

shape 3 1 1 shape 4 1 1 shape 5 1 1 shape 6 1 1

Leading through publications and report

Silence Laboratories has been sterring need of better authentication through multiple channels including publications (such as in IEEE S & P 2021, ACM ASIA CCS 2021, ACM HotMobile etc), vulnerability disclosures and reports.

img 1 4


Want to Get Started?

Let's Connect.

.

  • Email:   info@silencelaboratories.com
  • Phone:
    +65 84528729

Copyright © 2022 Silence Laboratories