Next Gen Security Key

JEM AirKey secures your application with the highest levels of biometrically-gated cryptographic security and simple and seamless wireless experience.

hero

Key Features

Combining advanced security with ease of use, JEM AirKey gives your app security superpowers that seamlessly protect sessions and data.

Person-bound with Biometrics
Integrated biometric verifier binds authentication and encryption operations to specific users - not just devices.

Biometrically-gated cryptographic attestation and encryption functions ensure that only registered owner can activate their JEM and access protected resources.

Wireless Connectivity
Seamless BLE connectivity with no local port access required.

JEM AirKeys communicate wirelessly to create a modern and seamless UX across all platforms. Eliminates need to open and manage local physical ports and the need for separate "middleware" installation on user devices.

Confidential & Secure Execution
Critical signing and encryption cryptographic keys never leave the JEM device in any form ensuring maximum security for your sensitive operations.

Cryptographic operations are carried out on device and returned to the requestor/host through mutually authenticated secure channels.

Consistent Cross-Platform UX
Uniform and intuitive user experience across all your devices and platforms.

Empower users and reduce friction regardless of which device or operating system they are using.

Simple Integration
Tools and services for easy implementation.

Rapidly integrate JEM into your applications with our comprehensive SDK, simple APIs and professional services.

Passwordless Authentication
Eliminate password vulnerabilities with secure biometric verification.

Replace insecure passwords with cryptographically secure authentication tied to the user's biometrics.

JEM Superpowers

Integrate JEM AirKeys into your app and gain powerful and unique/differentiated capabilities.

1

Passwordless Authentication

Authenticate users without weak or hard-to-rememeber password. Automatically gain phishing resistant single touch MFA. Verify identity simply and intuitively with the integrated biometric sensor on the JEM AirKey. Use JEM as the primary authentication mechanism or an additional challenge for protected routes or funtionality.

2

"Level 2" Encrypt/Decrypt

Go beyond authentication and leverage JEM's Confidential & Secure Cryptographic Execution capabilities to embed unique "Level 2" data security functionality. Easily protect the most sensitive information, e.g., passwords, private keys, with granular field-level encryption directly by the JEM. "Level 2" data thus encrypted can only be accessed/decrypted by the user's JEM.

3

Lifecycle Management

Reduce administrative burden on enterprise customers and admins with JEM's cloud-based and app-based self-service life cycle management options. Enable self-serve and/or admin-supervised/approved provisioning, instant revocation of lost or stolen JEMs, and recovery.

Technical Details & Specs

JEM AirKey combines compact design with powerful security features.

JEM AirKey Form Factor

  • Dimensions: 30mm x 30mm x 11mm
  • Integrated Biometric Sensor: High-precision fingerprint recognition
  • Operation: Simple single button interface
  • Connectivity: Bluetooth Low Energy (BLE)

Confidential & Secure Crypto Execution

  • Key Generation: On-device signing, encryption, and decryption
  • Key Security: Critical device keys never leave JEM in any form.
  • Key Security: Supporting keys never accessible/decryptable outside user's JEM.
  • Safe, Trustworthy Crypto: Peer-reviewed, tried & tested cryptography, including xChaCha20-Poly1305. Extensive use of Sodium libraries.

JEM SmartKey

  • "Soft-JEM" for iOS and Android devices: Functionally similar JEM AirKey alternatives without hardware component.
  • Leverages Platform Biometrics: Touch ID, Face ID on Apple devices, Android biometrics
  • Storage: Senstive data stored using platform TPM
  • Connectivity: Direct network connectivity; no BLE dependency.

JEM.Network API

  • Edge hosted infrastructure provides resilient and fast services.
  • Replies to most calls in under 50ms
  • Cloudflare CDN ensures rapid & resilient access to the service.

Ready to Supercharge Your App?

Integrate JEM AirKey and provide unmatched security to protect your customers' applications that handle customers' most sensitive data.