1 2 3
Cryptauth provides cryptographic protocols involving user devices. In particular, it uses known device public keys to verify cryptographic assertions made by corresponding private keys.