Passwords are still the most common method for authentication and encryption - even as a fallback for biometric or password less authentication. The problems with passwords are clear – users cannot remember numbers of meaningless alphanumeric strings with ease. Hence, they react by choosing simple and predictable words or numbers related to their everyday life as well as engaging in insecure practices, such as writing passwords down in unsafe locations or sharing them. These practices can cause breaches into even the most secure and protected network systems.

Weak Passwords

The ubiquity of smart phones used as personal and professional data repositories forces enterprises as well as consumers to consider adequate protection mechanisms for these devices. Currently, security measures for smart phones are simple. 52 percent of enterprises use some kind of authentication for mobile users. A majority, 62 percent, still rely on the simple and easy-to-crack system of username and password. Merely 9 percent work with secure authentication.
Strong passwords made easy


Instead of typing complex and badly noticeable textual passwords, you just drag some images in the right order  to tell a story that is meaningful and memorable for you.


Create your individual style. Either your personal snapshots or ready-made themes with or without branding that you like.


Instead of entering secret alphabetic or numeric characters, the user drags (relocates) user-selected images on a matrix according to a secret sequence. The sequence in conjunction with the correct images constitutes the password. This mechanism works very fast and and is easy to use even for children.
Master Password
Optimized for touchscreen devices passpol can be used universally for unlocking mobile devices serving as access control for apps, documents, databases and payment systems. It also can be applied to multi-user applications such as websites or corporate IT platforms.
Fun to use
The keyboard-free operation of PASSPOL relieves the smart phone user of the often tedious and error-prone task of entering complex and long text passwords on small keyboards. As mobile devices are primarily operated on the move this advantage is almost immediately evident.
It can also be optionally operated by clicking or speech/text-based commands thus providing convenient operation even for people with disabilities.
Resistant against
Brute Force Attack // Dictionary Attack // Guessing (AI based) // (Spear-) Phishing // Social Engineering // Key-logging // Shoulder Surfing // Spyware // Smudge Attack

Contact us

We will get in touch as soon as possible.