REL-ID is a simple and scalable security platform
. . .that, for the first-time, tightly integrates your identity, authentication, and channel security into one seamless experience. This powerful omni-channel technology enables a phenomenal user-experience for every interaction with your customer while dramatically reducing your attack surface. REL-ID completely eliminates credential compromise and man-in-the-middle as attack vectors.
Business Benefits
High assurance customer authentication without any hassles
Eliminate the risk of credential compromise completely
Doesn’t require 3rd party authenticator apps that disrupt the user and brand experience
Eliminate reliance on SMS and third party vulnerabilites ( against attacks on CAs and DNS)
Protect your customers from spoofed wifi and malicious VPN attacks
Improved user experience increases user sign-up and satisfaction ratings
Support an omni-channel user experience - one device authenticates across all interactions
Verify transactions in real-time to prevent and audit fraud
Realize the cost savings of a better and cheaper authentication platform compared to other strong authentication solutions
Built for internet scale, supporting millions of users at the same time.
Platform Capabilities
Strong Authentication
Mutual and simultaneous multi-factor authentication, all right within your own native app.
Phenomenal User Experience
Built for the mobile-first world, with an emphasis on ensuring a simple, convenient user experience.
Omni-Channel Support
Provides customers a consistent authentication experience across all channels - online, mobile, IVR, in-branch and call-center.
Channel Security
Connect over a whitelist based secure communication tunnel that is MITM proof and safer than TLS.
Secure Data-At-Rest
Encrypt data stored locally on the device using a key that is only active in fully verified context.
Device Trustworthiness
Optionally use root/jailbreak/malware detection to block connections from vulnerable or compromised devices.
Simple Integration
Our mobile SDK lets you add the right level of security to your mobile app, tuned to your needs and the risk profile.
Enforce business and risk rules around a customizable list of device, user and other context variables.
The Problem

Your internet security is, essentially, backwards. And hackers know it.

Existing channels (e.g. SSL/TLS) are built to connect and then authenticate. This is like letting a stranger into your house and then asking for ID.

Because of the "connect first" strategy, your connectivity is only truly protected by a patchwork combination of traditional identity and authentication solutions. Think about all the effort required to integrate solutions such as voice, retina, fingerprints, SMS and OTPs, hard tokens, and challenge questions. Each approach is independent of the channel it's using. Each can and have been hacked.

To make matters worse, as these patchwork credentials move through your network, multiple tools and layers and paths are used, each of which is distinct and relatively uncoordinated with the others. Authentication of the user, the security of the channel, and access to application processes are all separate actions. Each handoff creates a gap for hackers and a vulnerability for your network.

Current security solutions have cracks that hackers exploit.
How will REL-ID help?

REL-ID flips today's channel model on its head. We are able to authenticate before connecting by using a relationship-based identity. Each side only has half of the information to authenticate, and each relationship is unique.

In real life, you would only open your door for people you can recognize and have an existing relationship with. In the same way, REL-ID won't let strangers into your network without first verifying an established trusted relationship. For your business, that means no request will touch your network without first establishing that it comes from an approved user, with an approved app, on an approved device. Hacks from connectivity paths are eliminated. REL-ID marries the best continuous authentication solutions with Software Defined Perimeter technology to deliver the most secure method of connecting your customers to you, all at IoT scale.

By expanding the elements REL-ID's innovative protocol, Uniken is building a family of products that will bring this new, more secure connectivity model from the clientside mobile app environment all the way to the server-to-server connections that drive the heart of your business. Our family of products is designed to provide secure, authenticated, and encrypted "trusted zones" of application connectivity. These zones surgically narrow the paths to only the applications the user or process should have access to, creating true app-to-app security. REL-ID just makes sense.

You wouldn't let a stranger into your house and then  ask who they were.
Why do it digitally?
What is REL-ID?

REL-ID is a safe, simple, and scalable security platform that, for the first-time, tightly integrates your identity, authentication, and channel security. By combining strong, "relationship" identities with our patented protocol, secure, continuously authenticated application channels can be established with blazing speed and at IoT scale. This powerful omni-channel technology enables a phenomenal user-experience with every authorization and login while dramatically reducing your attack surface.

How does REL-ID work?

REL-ID (short for "RELationship-IDentity") starts with elements of the existing model of absolute identities and super-charges them. REL-ID first establishes a unique device identity, overlays an application identity, and then binds any set of absolute user-credentials (username, voice, retina, fingerprint, etc.). It also takes the device, application, and access identities at the server side of the connection and binds all of those difficult-to-spoof, mutual factors into a unique combination. This shared/mutual/relationship identity, containing elements from both the user and the enterprise, is then split. Each side of the connection is responsible for part of the identity, but neither ever has full knowledge. Like writing down a note and then tearing it in half, it is impossible to recreate that tear and to guess perfectly all the contents of the half you don't posess.

The mathematics of the "relationship identity" (torn-note) is a true 1:1 relationship. Because of the 1:1 nature of the relationship, the two halves from the basis of our very strong key-exchange and subsequent continuously authenticated encrypted channel. By moving the key-exchange into the application layer at both ends, we keep decryption as close to the responsible parties as possible. Rather than connecting devices-to-networks, REL-ID connects apps-to-apps! You can post all of your usernames and passwords to Facebook, LinkedIn, Twitter and still be safe with REL-ID. We make the compromise of user credentials irrelevant and eliminate unauthorized entry.

Digital is the new Economy.
But threats are everywhere.
A generational leap in technology like REL-ID looks like magic.
Is the tech real?

If you showed an iphone to a teenager in 1977, they'd think it was magic. So we're not surpised when prospective customers and critics are incredulous about the power of REL-ID. A generational leap in technology like REL-ID looks like magic - in fact, the last time someone innovated as deeply in the security stack as we did was 1977.

But it's not magic: we are real. We have 2 U.S. patents and have had some of the world's best cryptographers and security specialists in banking and the military review our product. Almost all become customers after seeing it in action.

Much of the communication on the web today is based off of the Diffie-Hellman Key Exchange (DHE). REL-ID is an advancement on DHE. So compelling was the innovation that Dr. Whitfield Diffie has joined our team as our Chief Science Officer.

Many in the cryptography community refuse to use any unpublished crypto. And so do we. Thankfully, REL-ID does not create any new crypto. It is an integration and enhancement of the identity model and key exchange only. We support all industry standard cryptography (AES, etc.). We will soon publish the first version of our key-exchange, once our second version is out of R&D. We know that Relative Mutual Authentication and Key Exchange (RMAK) will become an industry standard protocol within the next 3 years.

28 Implementations Worldwide
4 Million Users
8.8 Million Devices Secured
3 Global Innovation Awards
Top Startup, Next Bank Silicon Valley 2016, USA
Top Emerging Company, IE20 2016, India
Best Growth Startup, Fintech Finals 2016, Hong Kong
2 Major Conference Presentations
JPMorgan Global TMT Conference, Nov 2015, Hong Kong
TEDx "Hacked" Cybersecurity Salon, Nov 2015, Hong Kong
How is REL-ID deployed?

REL-ID is a family of products, all of which use our embedable SDK as part of their communications strategy. The core of REL-ID is built in endian-neutral ANSI-C, making it easily deployable and portable to almost any operating system. Because of the nature of our device-fingerprinting process, the SDK must be wrapped in a device-specific binary for each operating system. Currently we support Windows, OSX, Linux, iOS, and Android. All of these platforms connect through the SDK to our edge-server, a horizontally scalable soft-appliance that can be deployed on premise or in the cloud. Unlike many security solutions on the market, Uniken never touches your connections - our edge-server appliance is entirely in your control.

In order to demonstrate the power of REL-ID, the Uniken team has built several turn-key solutions across multiple device types. Each of these "packaged" offerings is a whitelabel solution that uses REL-ID at its core. These packages are provided to REL-ID customers as both a reference application for developers, as well as a turn-key deployment solution or pilot-ready test offering.

The Uniken team is also currently building support plugins for many hybrid frameworks and IDEs such as Xamarin, Cordova, React-Native, etc.

Find out more about our offerings...
What comes with a REL-ID license?

The REL-ID API-SDK available as a C library. All other implementations use this with wrappers or raw. The code base is common across all agents.


The REL-ID gateway server, with 4 unique runtime components, each individually scalable. The REL-IDgateway is delivered as a soft appliance.


The REL-IDcore wrapped in a mobile app. This mobile agent provides a base HTML/CSS/JS framework for UI/UX while maintaining the security of REL-ID.


The REL-ID authentication and verification solution, bringing mobile, in-band verification and scalable risk assessment. REL-IDverify is ideal for logins from untrusted computers and 100% transaction verification/non-repudiation.

Coming Soon...

The REL-IDcore wrapped in a desktop installable. This desktop agent provides a base HTML/CSS/JS framework for UI/UX while maintaining the security of REL-ID.


The client, a large international bank, intended to launch a mobile-banking application for their retail customer base. Due to compliance and security issues, they struggled to realign their existing OEM. The failure to launch a mobile app became a significant detractor for retail customers.
  • Mobile banking offered a large attack surface.
  • Spoofed banking apps were popping up on AppStore & PlayStore
  • The existing app sent unencrypted traffic to the SSL library.
  • The SSL solution was still prone to a variety of attacks.
  • Mobile phones were constantly infected with malware.
  • Application is hosted behind REL-ID gateway, limiting access to only whitelisted devices.
  • Only whitelisted processes can access the app, so malware cannot intercept data.
  • Simultaneous and mutual authentication prevents phishing and MITM attacks.
  • REL-ID has inherent multifactor authentication (MFA).
  • REL-ID is available on Android, iOS, and WindowsPhone.
Using REL-ID, the Client was able to launch mobile banking services within a span of 3 months. Due to a shared user experience across multiple platforms, end-users were exceedingly satisfied, resulting in a 400% increase in mobile banking app usage in the first 6 months.
The Client, one of the largest Mobile Payment Solutions in South Asia, was authorized by it's central banking regulatory authority to set up semi-closed payment system in India. Users of this service can pay mobile and DTH recharge, utility bills, purchase goods, etc. at click of a button through their app.
  • The existing app was prone to MITM attacks.
  • The client wanted enhanced security of the data in motion (between application and server).
  • Customers were downloading fake apps and becoming victimized by spoofed purchasing with their stolen PII.
  • REL-ID API SDK integrates seamlessly with their existing app without impacting the user experience.
  • Relationship-based identity and true mutual authentication provides complete protection against MITM attacks.
  • The new application could connect to the server using an App-to-App tunnel with end-to-end encryption, securing their data in motion.
REL-ID not only helped protect against MITM threat vectors, it did so without impacting the user experience, scalability, and performance of the app.
The Client, a large, Israeli, security integrator, was using a web VPN product to provide secure access over the internet to its sales team and their Microsoft Dynamic CRM portal. The user experience and speed were poor, pushing management to look at different solutions.
  • The web-VPN secure access for the Microsoft Dynamic CRM faced scalability and usability issues.
  • SSL is structurally reliant on 3rd parties or subject to MITM attacks, an increased danger for employees accounts.
  • VPN is slow and cumbersome to manage and roll out.
  • Compliance – The REL-ID agent provides better than traditional multifactor authentication.
  • Usability – REL-ID provides an easy to access, secure web-portal with Windows Single Sign On but without the hassle of VPN.
  • Simplicity – with REL-ID, you can present one dashboard with single-click access to all employee applications.
REL-ID replaced their existing VPN solution and improved the productivity of remotely working employees. The enhanced user experience of REL-ID helped to speed up the adoption of the technology as well as simplify the on-boarding of new applications/multiple portals.
The Client, a large retail lifestyle firm, faced significant risk of directly exposing enterprise applications like SAP and Lotus Notes email to internet and intranet. Client needed a solution for secure access along with multifactor authentication for their employees to access these applications from home/field.
  • Remote access posed risk of exposing the apps & devices over public internet.
  • There was a loss of efficiency & productivity as employees were not able to access applications from home/field.
  • A poor digital experience lead to lower adoption of existing technology. Delays in service delivery at client location were due to cumbersome access process.
  • REL-ID offers secure access to all enterprise apps from a single dashboard.
  • REL-ID offers secure access to enterprise apps from own devices without risking the brand.
  • Inbuilt 2FA using device fingerprinting & binding avoids vulnerabilities due to loss/sharing of login credentials.
  • The architeture of REL-ID reduces internet footprint significantly.
REL-ID deployment provided a multifactor secure access to SAP and email applications to employees anywhere, anytime. It resulted in increased productivity & efficiency. As the applications were hidden behind REL-ID gateway the attack surface was significantly reduced.


Who is on the team?

Bimal Gandhi

Chief Executive Officer

Robert Levine

Chief Operating Officer

James Villarrubia

VP of Product

Dr. Whitfield Diffie

Chief Security Officer

Tejas Limaye

VP of Engineering

Nishant Kaushik

Chief Technology Officer

Who are the investors?

Let's Get in Touch

7 World Trade Center
250 Greenwich St
New York, NY 10007
466 Southern Blvd
Chatham Township, NJ 07928
3 Shalem St.
Ramat Gan, Israel
Teerth Technospace
S. No. 103
Mumbai Banglore Highway
Baner, Pune
Maharashtra 411045, India
Phone Numbers
+1 212 520 2557
+1 844 33-RELID
+1 844 337-3543
+972 (72) 2433000
+972 (72) 2733379 (f)
Hong Kong:
+852 6417 4790
+91 20 6725 3900