CypherEye Mobile App User Guide

Search by Keyword

What is CypherEye

CypherEye is two-factor authentication. This means you will use your mobile device (the second factor) to sign-in on your computer (laptop or desktop system).

The CypherEye mobile app performs highly secure, private, and auditable transactions. The app protects your privacy as no personal information is transferred.

CypherEye technology uses optical cryptography. Instead of typing username and complex passwords, you simply scan an image with your mobile device. You will find the CypherEye image appearing as an animation on web pages, as shown below.

Animated CypherEye
CypherEye Image

The graphical image is optically encoded to establish a secure communication channel between your mobile device and the target service. The CypherEye server guarantees delivery and a secure channel against security threats.

CypherEye technology can be used by organizations for authentication, unifying activities, creating a single mobile authentication app. Users are able to sign-in to services by simply scanning the CypherEye image.

CypherEye can be used by organizations for authentication, unifying activities into a single app such as:

  • User identification and login to company systems
  • Unlock doors such as those with keycard access
  • Sign and certify documents
  • Authenticating to other services provided by your organization

Using the CypherEye Mobile App

Authenticating with the CypherEye App

CypherEye enabled services will display the CypherEye image as a method for authentication. You’re IT administrator will have setup your organization’s services to use CypherEye.

CypherEye enabled services will display the CypherEye image.

Scanning the CypherEye

Below are the instructions to sign-in to a service, such as a web page. This is done without typing a username or password.

  1. Using a laptop or desktop computer, go to the sign in page of service you wish to access.
  2. There you might be presented with an option to use the CypherEye app. Select the option to sign in using CypherEye and you’ll be presented with the following web page. In the example below we were signing into Zoom.
Zoom’s home page setup to use CypherEye

Note

Sometimes two-factor authentication is required, and you may not see this option. Instead, you may be taken directly to the following web page.

  1. Select the CypherEye option for signing in. The web page will display the CypherEye image.
CypherEye web page for sign-in
  1. Open the CypherEye mobile app. It will display the Home page showing the CypherEye image.
CypherEye App home page
  1. On the Home page of the CypherEye App, tap the CypherEye. This starts the scanning process. The App will display the camera’s view on your device’s screen.
  2. Aim the camera of your mobile device at the CypherEye image on the web page. Center the CypherEye image on the web page within the inner circle shown on your mobile app’s screen.
CypherEye scan page
  1. Authentication will complete once the image has been successfully recognized. The CypherEye image on the web page will be replaced with a message the scan was successful.

Registering Your Device

There are two methods for registering your device.

  1. Your IT Administrator can send you an email invitation to register the device. It will contain a link to a web page with the CypherEye image. Simply scan that CypherEye and your device will be registered.
  2. You can register a device by yourself. If your device is not recognized, the CypherEye app will prompt you to enter the email address associated with the organization.

Self-Registration

If you attempt to sign-in with the CypherEye app and your device hasn’t been registered, you’ll be prompted to register it. The registration process is automated. The CypherEye App will have you follow the necessary steps.

  1. Scan the web page with the CypherEye. The CypherEye App will prompt you to enter the email address used to sign-in to your organization.

Note

You can only use the email address provided by your organization. You must enter the email address used to sign-in to services at your organization. You cannot use personal email accounts.

  1. Tap Send
  2. Check for the registration email.

Note

When the email arrives, you must open it on a second system such as a laptop or desktop computer.

  1. Click on the link found in the registration email to open the web page containing the CypherEye image.

Note

The CypherEye web page must be displayed on a device other than the mobile device with the CypherEye App.

  1. Scan the web page with the CypherEye image using the CypherEye App.
  2. If it’s successful, you will have registered your device. You will receive a welcome email notifying you your device has been registered.

Note

If you did not receive the registration email you may have entered an incorrect email address. Make sure you enter the email used at your organization to sign-in. Contact your network administrator if you are unsure of the correct email address.

CypherEye App Pages

Home

This is the page that displays the CypherEye used to scan the CypherEye image.

Accounts

This page displays information about the Accounts and Services your device has been registered.

The first item in larger bold text is the name of the organization. This is determined by your IT Administrator. Typically, this will be the name of your company. In the example below the organization name is “CypherEye Authentication.”

Below the organization’s name is a list of services your organization has integrated with CypherEye. This is the name of the organization that has integrated Services (such as Zoom or Salesforce) to be used with the CypherEye App.

Next to each service is its status. Only active services are available for use with CypherEye.

Account Details

While on the Accounts page, at the right of the organization’s name you can tap the (i) option to view details. Once you have registered your device, you will find the following.

Organization Name: The name of your organization.

User Name: The name you’ve been given by your organization’s identify management system (e.g. the name in Microsoft Active Directory).

User Email: The email address you’ve been given by your organization’s identify management (e.g. the email account created in Microsoft Active Directory).

List of registered devices: This shows all the devices you registered with CypherEye. The current device, the one you are currently using, will be appended with “(this device).”

  • Status: if the device has been approved or is pending approval. Contact your network administrator if it has not been approved. They may have set a security policy to approve your device before it can be used.
  • Device Type: the type of device registered, such as iPhone 11 or Nokia.
  • Last Activity: the time and date of the last transaction that occurred on the device.
  • Remove <name of device>: select this option of you wish to unregister the device. You may select one of the devices other than the one you’re currently holding (shown as “this device” in the list). Use this option when a phone is sold or lost.

About

This page displays status and help options.

Status

  • Location Services: The app must be granted permission to use the phone’s location services. If you see Not Authorized, you can tap on that status message for help. If you attempt to scan a CypherEye image without permission to use location services, you will be prompted to change this setting.
  • Camera: The app must be granted permission to use the phone’s camera. If you see Not Authorized, you can tap on that status message for help. If you attempt to scan a CypherEye image without permission to use the camera, you will be prompted to change this setting.
  • Version: Version number of the CypherEye App.

Help

  • User Guide: Tap the link to open this User Guide.
  • Contact Support: Opens an email addressed to support at CypherEye.

Legal

  • Privacy Policy: Tap the link to open the CypherEye privacy policy.
  • Terms of Use: Tap the link to open this CypherEye Terms of Use.
Was this article helpful?
How can we improve this article?
Please submit the reason for your vote so that we can improve the article.
Contents

Leave a Reply

Your email address will not be published. Required fields are marked *