Strong authentication and superior user experience, using the SIM card in every mobile phone
SIM-based cryptography bound to the mobile number
fast authentication, invisible to the user
no account takeovers due to phished credentials
mobile device as a strong and secure possession factor
build and integrate fast
over 3 billion mobile users enabled