No shared secrets. No user passwords needed or stored - eliminating the single largest point of compromise. M-Pin ® uses pairing based cryptography to sign and verify authentication between the M-Pin provider and an end-user’s smartphone.
The security framework splits the functions of a pairing-based key generation server into two services, issuing halves of private keys to distinct identities. The shares of the two private keys are received by mobile or web app clients, thus becoming the only audience who possess knowledge of the whole key.
Since key generation services are under separate controls, current root key compromises and key escrow threats are an order of magnitude more difficult since an attacker would need to subvert both parties.
Extremely disruptive economics enabling you economically, for the first time, to strongly authenticate not only employees, but partners and external users on mass.
The ability to scale to external users economically at a fraction of the cost, incurred only when the service is used.
Unlike other authentication services, M-Pin can authenticate the external users who power your business and who trust their personal, financial, or medical information to you.
End users should be your strongest advocates, and not the weakest link in your security. More control over compliant strong authentication enables you to digitalise more processes and provide more value to external users.
Easier to Administer, with no shipping, no need to set up in-house infrastructure, and no need to integrate any on-premise network devices. Everything is provided in the cloud.
Deployment is faster than ever before - you can be up and running in the same day. Updates are deployed automatically, with no support required from you or your team, and you can easily integrate any monitoring, service layer or analytics applications for deep insight, control and management.
It’s also easier for end users. Download the free mobile app and enroll in a few steps.