Mobile security

Today’s society requires flexibility in terms of accessing important data and information as well as the freedom to pursue related actions. At the same time, smartphones collect and compile an increasing amount of sensitive information to which access must be protected. Accumulate enables a wide range of mobile security services that focuses on ease of use under the highest possible security.

Mobile authentication

The mobile authentication service replaces security solutions, such as hardware security tokens, one-time pass codes and digital certificates, and gives organisations a secure and cost efficient authentication solution. Use it to login to VPN’s, intra/extranet’s and secure web pages.

Mobile signature

The mobile signature service allows the end User to sign different actions with its mobile phone. Example of signings are different types of monetary transactions, increasing/decreasing credit limits, approval of invoices and loan applications, etc. The service provides a complete ”Sign what you see” experience and is compliant with the EU Directive 1999/93/EC framework for advanced electronic signatures.

Mobile 3D-secure

The mobile 3D-secure service eliminates the need for hardware tokens. Not only does this service reduce cost in hardware and distribution, it also simplifies the purchase procedure for the end User whilst increasing the security.

Mobile e-ID

The mobile eID solution consists of authentication and signature, but with the addition of eco-system components and a different key handling in order to be able to function in a global eco-system. This service is targeted towards certificate or registration authorities in an electronic identification eco-system.

Security is key

* Direct authentication of the User by the Issuer; in real-time, on every transaction.
* Sign what you see
* No sharing of sensitive information between the User and third parties
* No storing of sensitive information in the mobile device
* Two factor authentication (2FA), via application authorized to the User and protected by pin. 3 FA possible by adding for instance, voice, behaviour or face recognition.
* Compliant with EU Directive 1999/93/EC
* Secured against phishing and man-in-the-middle attacks.