How Unibeam user authentication works

Unibeam makes user authentication simple and reliable for your business. By binding the user’s SIM/eSIM and mobile device behind the scenes, it adds an extra layer of protection without slowing anything down. No need for passwords or codes – the user experience is as seamless as you want it to be. And if anything doesn’t match, access is instantly blocked. It’s that simple.

When one of your users tries to log in or complete a transaction, your app or website sends a request to your company server.
The server retrieves the registered device identifier and contacts the Unibeam or telco server for authentication.
A secure request is sent to the SIM/eSIM, prompting a pop-up message on the user’s phone.
Once he or she approves or rejects it, a response is sent back to your server, which verifies the SIM/eSIM, and mobile device details to complete the authentication.
The SIM/eSIM, and mobile device details are verified.
The authentication is complete.

Whenever the user tries to log in or complete a transaction, your server cross-checks these details. If everything matches, the user request is verified. But, if any of the details don’t match or the user rejects the pop-up, the authentication fails, and the transaction or login won’t go through. This helps protect user accounts from unauthorized access, even if someone else tries to use their phone number or device.

By asking for approval and verifying the details behind the scenes, the system provides multiple layers of security. 
It’s designed to make sure only your users 
can access their accounts, giving you peace of mind that your transactions and logins 
are protected.

Mobile authentication
is safe again

Unlike traditional MFA methods like SMS OTP, Unibeam eliminates the risks of SIM swaps, phishing attacks, eavesdropping, social engineering, large-scale 
database hacks, and password leaks.

our secret sauce

Unibeam works directly with your users’ SIM/eSIM – meaning we don’t depend on mobile network device info, which can be compromised. Authentication can happen quietly in the background or with a pop-up for your users’ approval, depending on the experience your company wants to provide. We use unique identifiers for each device and company to prevent issues from spreading if one company’s servers are breached. Plus, we don’t store any Personally Identifiable Information (PII), minimizing data leak risks and ensuring compliance with privacy laws.

Our technology is flexible, can be applied to a variety of use cases, and works in harmony with your existing authentication solutions.

What We Do

User
authentication

Unibeam works by linking the unique ID on a user’s 
SIM/eSIM card with their phone’s unique ID. There are different levels of security you can use. The basic option is “touch authentication”, where users confirm their login through a simple pop-up message. For stronger security, we offer “multi-level authentication”, where users also need to provide a personal detail as part of the process. This way, you can choose the right level of security to keep your users safe.

silent
authentication

Unibeam works by securely interacting with your users’ SIMs/eSIMs and devices. It sends a request to the SIM/eSIM with zero engagement required from the end user. This lets you offer smooth, hassle-free authentication. It’s also great for securing and authenticating IoT devices without any user involvement.

Transaction confirmation

Businesses need to make sure account owners approve important transactions like payments, profile updates, or e-commerce confirmations. Unibeam makes this easy by sending a quick, hassle-free pop-up to your users’ phones for approval, ensuring secure and smooth authentication every time.

Select Use Cases

Branded calls

People around the world are losing trust in unidentified incoming phone calls.
They often ignore unknown numbers to dodge spam or fraud. Unfortunately, this can also mean missing urgent calls from legitimate businesses. With branded calls, your users will see the verified business name and purpose of the call on their screen, helping them decide whether to answer or ignore the call safely.

Anti SIM swap

Unibeam authentication tracks all device and SIM/eSIM identifiers. If a fraudster tries to switch a user’s SIM/eSIM to a new device or port their number, those identifiers will change. This alerts the enterprise about the device change, helping you prevent any login attempts from potential fraudsters.

Anti social engineering

Social engineering tricks users into visiting fake websites to steal their login info. But with Unibeam, your users’ logins are safe because their phone and SIM/eSIM are required for authentication. And, if someone tries to hijack MFA info, Unibeam can also detect active calls on that phone, blocking any authentication during those calls.

IOT

Your IoT devices rely on SIM cards or e-SIMs, which can be moved to unauthorized devices or hacked to access the IoT network. Unibeam has your back by spotting any unusual changes in the SIM-device pairing, so your IoT enterprise can quickly block potential attacks and keep everything secure.