Eliminate Usernames & Passwords
Rethink everything about login with UNS authentication
UNS infrastructure puts control in your hands
How UNS Security Works
UNS authentication relies on trusted devices. Authentication is proof that the user has physical possession of their trusted device and is able to unlock it.
The UNS network consists of Guardian nodes that act as identity brokers for users, and Comptroller nodes for Internet services. Each user chooses a Guardian they trust, and each Service chooses a Comptroller they trust. Together, the network of Guardians and Controllers form a chain of trust between any user and any service.
- User installs the UNS authenticator app which generates a security certificate.
- UNS Guardian and Comptroller nodes handle the details of a challenge-response authentication protocol between User and Service.
- To logon the Service, the User only needs two things: access to one of their trusted devices, and the ability to unlock that device.
UNS Benefits for Business
UNS Benefits for Users
Those who sacrifice privacy for the sake of security will enjoy neither.