Use your smartphone for secure authentication, next-gen logins and more.
Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection.
Everyone have a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure.
Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction.
You must authorize the use of keys with a biometry such as fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe.
Passwords are dead.
People have to remember long passwords, and they have to change them frequently.
We believe that there is a simpler way how to login: a smartphone.
Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
Desktop OS |
macOS Windows (under construction) Linux (under construction) |
---|---|
Mobile OS |
iOS Android (under construction) |
Interface |
PKCS#11 |
Cryptographic schemes |
EC RSA |
Supported applications |
OpenSSH GitHub GitLab OpenVPN OpenSSL ... |
Connectivity |
Local network (zeroconf/Apple Bonjour/Avahi) USB Bluetooth (under construction) Internet (secure bouncer server) |
Enterprise features |
Central Key Management (PKI) Remove key wipe Audit trail |