We focus on two distinct areas of mobile security. They are:
- Authenticating the mobile user when accessing accounts.
- Authenticating transactions that originate from a mobile user to be authentic.
As mobile users access their accounts through their mobile phone we can verify their authenticity. As users perform actions on their accounts such as transferring money, pay bills, etc. We can also verify that they are actual user. Out-of-band notifications force users to verify all transactions before they are processed.
As mobile users make payments and/or purchase goods and services with their phone we can verify credit/debit transactions are legitimate for their account preventing fraud.
Our mobile authentication system works without any knowledge of the user. For the mobile user they just use their apps and silently the system authenticates their transactions. Any imposter transactions from other mobile phones will of course be rejected.