Manage your users through our simple API. Add new users, create relationships, authenticate users, store and restore keys, and more!
Want to eliminate security vulnerabilities due to lost or stolen RF devices? Our passive tags can be lost or stolen without compromsing security.
Smart Identity Devices
When combined with passive tags, our smart identity devices make your user's key invulerable to near field and other radio frequency attacks.