Why SplitKey?
SplitKey transforms smartphones and tablet into powerful authentication devices that protect your users' accounts and enable eIDAS-compliant digital signatures, delivering enterprise-grade security without compromising user experience.
Unique technology behind SplitKey
SplitKey technology is based on proven principles of public key cryptography, digital signature schemes, and public key infrastructure (PKI). Public key cryptography works on the concept of key pairs:
- the public key is bound with the verified identity of the user
- the private key is confidential and protected (e.g. inside a smart card, which is under sole control of the user)
Convenient and cost-effective
Tokenless mobile digital identity that turns any smartphone and tablet into secure authentication and qualified signature device.
Secure PKI cryptography with full user control over their private key.
Regulatory compliant with the EU PSD 2 and the eIDAS regulations.
Turnkey solution with full infrastructure, service design and advisory for implementing digital identity.
Unbreakable security
Common Criteria certified to EAL4+ (Evaluation Assurance Level 4+) as a qualified signature creation device.
Evaluated internally within a MS, an un-notified eID scheme.
Developed by scientists and cryptographers, research published in a peer-reviewed journal.
Assessed to correspond to assurance level “high” eID authentication scheme.
No security breaches or other privacy compromising security incidents.
Additional documents
Introduction to SplitKey Foundations
Download SplitKey White Paper (.pdf)Comparison of Cloud-Based Signature Solutions and SplitKey
Download SplitKey and Cloud Based Signature Solutions Comparison (.pdf)