
Back to Portfolio
⚠️ ImplementedCiberseguridad
How annoying! I forgot the password again!!
1/20/2026Developed by: 1Password, LastPass (2008)
A password on the internet is used to access your accounts securely without anyone being able to hack it, but that is not always the case, since passwords are vulnerable in millions of occasions by hackers who seek to do bad things with your accounts.
It is also true that more security must be implemented in accessing your online accounts such as two-factor verification or entering codes that arrive by SMS to your mobile and also you have to remember more and more passwords from more and more sites where we register and technology is used for everything.
For many people all this password issue is stressful, either because they forget them or because they are hacked or because they have to take many steps to access their account on a site.
Passwords are used either from a smartphone, a PC or a tablet.
Well, if there was a way to facilitate these accesses, to do it in a simple and 99% secure way, everything would be easier.
For this, mainly a unified way to access from all types of devices and to all online platforms should be given.
I mean that to achieve total security it is essential that the way to access and from what mechanism it is accessed, from all types of devices (different brands and types of devices (smartphone, PC, Mac, tablet, iPod etc) be the same.
If you have been able to read the screenshots I put above about IPs and their possible spoofing and how IP data travels through the network in the form of data packets, it makes us see that the internet is not a secure place to use passwords but, if each device had a door to the internet and another to another network such as a direct satellite connection or even a radio chain in the style of military communications of the 1960s, well every time someone wants to access from their device to any platform, it sends a signal via internet requesting access to that platform and at the same time sends on the other side a confirmation of: hey, it's me! that reaches the platform to another device of that platform that has the same system that receives it and now it grants access.
The issue is not to emphasize security methods of more and more steps and authentications but to make the primary thing is that the system knows that your devices are yours (when you buy them) and these in a simple way (in one click) allow you to access any platform you want to access because the verification is done in two different channels: 1 hackable (internet)
And another impossible to hack (an incorruptible network).
For a network to be incorruptible it must be managed and used by a single company or establishment and must not have penetration capacity through any door, it must be a closed network that the moment you create it can no longer be modified.
A radio signal I think is incorruptible, it cannot be modified.
Yes, it can be listened to but it cannot be modified.
The point is that these: \"hey it's me\" in these devices the signal arrives at the moment and almost at the same time as the signal that goes via internet.
Hackers can see what is trying to be accessed but cannot spoof that access, at most they could hinder it because being those two factors (online and radio) that take off at the same time from your device and between 1 and the other it takes 2 seconds difference to receive the good confirmation (the radio one) well I don't think hackers have time to hack the system in 2 seconds.
Hackers need hours to violate and also need to have those violated passwords saved in a database to use them in their time.
Below I will leave you some screenshots about radio frequencies and if they are plagiarizable, but the most important thing is that there is an infinite number of radio frequencies so this corroborates that this technique is the most appropriate to achieve almost absolute security in passwords.
Let's say I'm going to buy a smartphone, when I buy it in the store the seller with my ID gives me access to it and when turning it on and configuring it my smartphone randomly grants me a radio frequency (there are infinite different radio frequencies) that only my smartphone and I know (well that is if they don't hack the device but that is more difficult). My smartphone has my email and my radio frequency but my radio frequency is never known by anyone because it is not exposed on any network.
When I want to access or register on a platform (we have said that all devices and platforms use this system) my email sends a signal via internet through my smartphone and at the same time my smartphone sends a radio signal with my frequency (now I have already registered) and the company where I registered and its devices already have my credentials saved (internet and radio) so every time I want to access if the two coincide I will have access.
The key to the security of this is not the signals that are vulnerable but in the devices that are secure both those of the companies and those of the users.
For this the part of the devices that is the radio part must be completely independent from the rest of the device.
To transmit : it's me !
To receive : Is it you ? Yes correct !
If it's not you : keep trying there are infinite possibilities as radio signals.
Also an extra security factor is that smartphones and devices when creating the random radio signal for the first time when you buy the device is that it creates it but does not put a figure to that signal, (it doesn't tell you: your signal is 98.0 fm) but, your signal is created you can now use it.
Here the problem would be if we lose the device or want to change it but for this all devices should come with a USB that is capable of receiving and saving your radio signal and that you save at home and this USB serves so that when you have another new device you can clone your signal so that the new device uses it either due to change or loss of the old one also the new devices have the option to create a new unique signal for you or receive and clone the one you already used on your old device.
The failure here is if one of the companies that knows our credentials with which we register has a security breach and all the credentials of all its users are exposed for this the platforms must not store the credentials of their users but receive that request and to verify it only save the platform the identity data of that user (name surname ID) and works as follows:
The user launches the access request with their email (internet signal) their data (ID name and surnames) and their radio signal, but the platform we are going to access only keeps our name and ID but is, and here comes the kit of the question, receives that request and identifies us because in that packet goes email, ID and radio and the company has our ID saved in its database only, then at that moment of receiving the request returns by the same ways the same credentials to our device, (radio, ID and email) and our device receives it and says ok it's me but the radio simply replicates it without saving its frequency.
Therefore the composition of how the devices are especially in the matter of radio frequency is essential for this system to be secure.
The other option for this system to work and although some company or online platform that manages our data has a security breach and our authentication DNA is exposed does not happen is that there are \"authentication data bunkers\" where our credentials are kept securely and every time we request access from our device to a platform, this request reaches the bunker and the platforms give us access when they receive the request from the bunker because: I am a security data bunker and you have to give access to this user yes or yes ...
The platforms simply have our name, ID and email and when a data security bunker tells it let this one pass just because the bunker has told it so do it.
The point of all this is to achieve that when you want to access a site, in 2 seconds you do it and with total security and also always in the same way without a thousand different passwords that from so many times you have had to change them you no longer know which one is which.
You, you smartphone or pc and instant and secure access to any site!
Project Status
This idea has already been executed by other entities.
Real Examples
1Password, LastPass (2008)
Value Analysis
Revenue Potential
100M€/año
Sector
Ciberseguridad
Interested in this idea?
We can develop it together or I can generate new business avenues for your company.
Contact via Email