Design Simulation Systems Ltd

Authentication isn't just about passwords

DSS Enterprise. The Complete Cybersecurity Solution

  • Authentication
  • Access Control
  • Authorisation
  • 2/3FA
  • 2-Tier SSO Session Management
  • Identity as a Service
  • Installs Out-of-the-Box
  • Intrusion Protection

About us

Design Simulation Systems Pty Ltd is an Australian company, which was originally born in Singapore, with the aim of developing and marketing clever stuff, until it was bought by the National Computer Board.
The Australian reincarnation came about, when we noticed that existing authentication systems were either vulnerable to many forms of attack, grossly overpriced, or offered a solution which was actually a development project. Usually, they were all three.
Our answer to this, is to offer an authentication system which installs out-of-the-box in less than an hour, provides user-transparent 3-Factor authentication, and costs less than the average laptop for an all-site licence.
Also, the footprint is small enough to send all of the components by email.


Authentication begins when your device connects to the IDaaS authentication server.
The device's unique signature is checked against those registered to you, and is the second factor of the authentication - which also permits Single Sign-On to multiple applications.
This process is totally transparent. We don't query the device, or install cookies or client software on it.
Your password data is protected by strong encryption, and the most secure and effective encryption key management system you've ever seen. Even the root user neither knows nor can access the encryption key, and even he can't access any user's password.
Why rely on a third party to be your 'Identity as a Service', when the service provider can be you, on your own hardware, inside your own firewall?
Unlike freebies like Radius, you don't need to start a development project, since you can install it in 5 minutes, configure it using your smartphone and, although we use the SAML authentication protocol, unlike SAML-based systems, you can write an interface to it, with 2 lines of HTML.
If you already have an account on our online IDaaS system, you can access it here
Find out More Download Manual

2FA from Device Signature

Totally hands-free registration of any device, without cookies or client software.
The signature is unique to your device, and provides the second factor of authentication. In fact, it's so unique, you can use it as your first factor, and omit the password.
Find out More Download Manual

First Factor From Password

Keyboardless login - on any device. The challenge panel just needs you to enter the password by simply spelling it out on the two touch panels.
Find out more Download Manual

User Self-Service for Most Tasks

Users have no need for admin privilege to set most of their profile parameters.
They can securely and safely set Passwords, reset Passwords, register as many devices as they need and deregister devices no longer needed, lost, stolen or obsolete.
Download Manual

Interactive SSO Demo

Croesus & Midas sell diamonds. The diamonds are sold from four different stores, each of which only sells one colour

The four stores sell Red, Green, Blue and White diamonds respectively.

To make things easy for their many customers, Croesus & Midas permit a single password to give access to more than one store.

The ID's of users authorised to access the diamond stores, together with their passwords, and a detailed description of the demo can be found here or you can run it blind, by tapping the link below.

Find out more Run the Demo

Secure Data At Rest Keyless Encryption

Even though the data might all be encrypted, The Enemy Within knows the location of the encryption keys and can steal the database, decrypt the data, and publish it on the internet.
Not with our system. Once the keyless keys are set, not even we can access them.
Find out more Download Manual

Content Driven IDS/IPS

Our interest in security has been fostered by the fact that this site has been under attack by parasites trying to implant viruses since 2009, and by a botnet since Christmas Eve 2012. We've collected and logged around 10000 hack queries, ranging from SQL injection, to dumb PHP and WordPress hacks, to attempted bash exploits. You can download these files to create pen-testing scripts.
Our IDS/IPS, has successfully defeated every single hack attempt and, by reporting the IP addresses to their ISP's, has helped to remove 77753 of these parasites from the internet - and counting...
You can see a (live) chart of incoming defeated hack attempts by clicking on 'See Live Graph' and, if you're interested in trying the IPS, to protect your website, drop me a line.
See Live Graph Download the hack queries

Unix, Oracle and Security

We include here, a pot-pourri of Unix articles, with a leaning towards database and security applications. If you're not that good a programmer, they'll either help, or put you off, for good... Read 'Real Programmers' to see if you qualify or, if you're not a programmer, try 'WordImperfect'
Find out More

Blog: Random Ramblings On System Security

Blog: Identity As What Service?

Blog: The Choice of a Second Authentication Factor?

Blog: The Choice of a Third Authentication Factor?

I need more technical information
I need pricing information
I'd like a free 3-month trial

The Legacy Simulation Stuff

In an era where an electronic circuit is a slab of silicon, designed by writing a language like VeriLog or VHDL, with virtually no need to understand the mathematics of circuit design, or the physics of semiconductor devices, we present a set of tools from a more gracious age. From an age when computers were still drawn by horses, and it took an engineer to design something. Not a software package.

I guess this is all precipitated by the fear that, one day, there will be nobody left who actually understands how or why stuff like VHDL works, and colleges will have stopped teaching mathematics, because it's all too hard, and too many people fail the courses - which isn't politically correct, because it damages their delicate egos....

So, what are these analog tools? I hear you ask...

At some point, you might like to see a complete electronic circuit design cycle, starting with schematic capture, proceeding to a time-domain simulation, and finishing with some DSP post-processing of the result, to produce a Fast Fourier Transform of the output waveform

These tools are all available for free download, compiled for either Linux or Sun SPARC. No special gizmos, like Motif or Java are needed, and they'll run quite happily on anything with a working X11 library.

Graphical Schematic Capture and Edit
Of course, circuit design is done with a graphical circuit editor, supported with libraries for everything. Behavioural level Laplace Transform primitives, high level logic functions, semiconductors, mechanical components, PCB track primitices and a heap of others.
Find out more

FFT, IFT And A Lot More
When the simulation is finished (or if you have your input data in a file), you can apply a whole heap of mathematical functions, including forward and inverse Fourier transforms, convolution, deconvolution, differentiation, integration functions and display results in the complex plane.
You can also download either the SPICE or Spice3 simulator (or both), each of which has functionality that the other doesn't have. Both simulators have been enhanced with LIMPTS increased to 65536, and memory to 800000. They both continuously dump node data to a binary file
Find out more Find out about DSP functions

High Level Digital Logic Simulator
Not content with offering the analog circuit creation and simulation anachronism, we compound the injury by also showing a digital circuit simulator, which simulates digital logic at the device level, not the gate level.
Find out more

Oscilloscope, Spectrum Analyser, Signal Generator
You can set up any waveform you can think of with the signal generator, drive your circuit over whatever time interval, and with whatever resolution you choose, and watch the outputs change. This goes for a time domain analysis, a frequency domain sweep and everything else that SPICE can do. All results are presented graphically.
Find out more

SPICE Models From Data Sheets

Since even the most comprehensive library may miss the very device which you need to use, we also supply a set of component modelling tools

Vmodel will make a computer model from the characteristics supplied on the data sheet, while Vmodel2 accepts X-Y characteristic curve data, and accurately extracts and optimizes the relevant SPICE parameters by curve-fitting techniques

Find out more

Free Downloads

All the analog tools mentioned above are available as either Linux or SPARC executables. If you're planning on using GEX, you're going to need the analog lib file, which also contains SPICE models for a whole variety of stuff.
There are also Unix man pages for most of the products, which you can install in any 'man' directory.
Go to downloads page

Can't make it work on your version of Linux?

Need to model an obscure semiconductor device?

Get in touch:
Copyright © 1999-2017 Design Simulation Systems

All rights reserved for their respective owners.

visitors since January 1st