SplitKey

Digital identity technology for secure electronic signing and authentication.

Talk to our experts
Women holding the Iphone

Why SplitKey?

SplitKey transforms smartphones and tablet into powerful authentication devices that protect your users' accounts and enable eIDAS-compliant digital signatures, delivering enterprise-grade security without compromising user experience.

Secure

Shield your users from sophisticated cyber-attacks with our advanced cryptographic techniques that ensure their identity and data are always protected.

Convenient

Streamline authentication and enhance security by eliminating the need for additional tools or devices

Scalable

Grows with your organisation and adapts to your needs, ensuring optimal performance as you scale.

Unique technology behind SplitKey

SplitKey technology is based on proven principles of public key cryptography, digital signature schemes, and public key infrastructure (PKI). Public key cryptography works on the concept of key pairs:

  • the public key is bound with the verified identity of the user
  • the private key is confidential and protected (e.g. inside a smart card, which is under sole control of the user)

Convenient and cost-effective

  • Tokenless mobile digital identity that turns any smartphone and tablet into secure authentication and qualified signature device.

  • Secure PKI cryptography with full user control over their private key.

  • Regulatory compliant with the EU PSD 2 and the eIDAS regulations.

  • Turnkey solution with full infrastructure, service design and advisory for implementing digital identity.

Unbreakable security

  • Common Criteria certified to EAL4+ (Evaluation Assurance Level 4+) as a qualified signature creation device.

  • Evaluated internally within a MS, an un-notified eID scheme.

  • Developed by scientists and cryptographers, research published in a peer-reviewed journal.

  • Assessed to correspond to assurance level “high” eID authentication scheme.

  • No security breaches or other privacy compromising security incidents.

Additional documents

Introduction to SplitKey Foundations

Download SplitKey White Paper (.pdf)

Comparison of Cloud-Based Signature Solutions and SplitKey

Download SplitKey and Cloud Based Signature Solutions Comparison (.pdf)

Would you like to know more?

Contact our digital identity team:

Square format portrait photo of Sven Heiberg

Sven Heiberg

Head of Digital Identity Technologies

sven.heiberg@cyber.ee