SIM-based authentication

Strong authentication and superior user experience, using the SIM card in every mobile phone

Cryptographically secure

SIM-based cryptography bound to the mobile number

Superior user experience

fast authentication, invisible to the user

Phishing resistant

no account takeovers due to phished credentials

Device-based possession factor

mobile device as a strong and secure possession factor

Simple integration via API

build and integrate fast

Global coverage

over 3 billion mobile users enabled

Powered by