What is SNA?
SNA is an authentication method available at user signup, login, or during a high-risk transaction. It confirms that a user’s SIM (Subscriber Identity Module) is actively connected to the mobile network and not being spoofed or cloned. SNA uses standardized GSM (Global System for Mobile Communications) authentication, a proven technology backed by decades of industry trust.Key Requirement: To initiate SNA, the user’s session must connect via mobile data, not Wi-Fi. This ensures that the underlying GSM authentication process can take place seamlessly. For mobile browsers, users may need to switch off Wi-Fi; mobile apps can enforce a cellular-only data connection programmatically.

How It Works
SNA builds upon GSM’s standard authentication mechanism. Here’s a technical overview: Detailed Steps:- SIM Activation: The mobile network operator securely assigns a unique key (Ki) to the SIM at activation. Ki never leaves the operator’s systems or the SIM.
- Challenge Initialization: For authentication, the network sends a unique 128-bit random value (RAND) to the SIM.
- Signed Response (SRES): Both the network and the SIM compute a one-way function
f(Ki, RAND)
, resulting in a Signed Response (SRES). - Verification: The SIM returns its SRES to the network, and the network compares it with its own computed SRES.
- Authentication Result: A matching SRES confirms genuine user presence and SIM integrity.
Features
- Frictionless User Experience: Users authenticate seamlessly—no PINs, passwords, or additional taps needed. Once triggered, SNA works silently in the background.
- Enhanced Security: By relying on SIM-based cryptography and direct mobile operator connections, SNA drastically reduces common attack vectors like SIM swapping or credential theft.
- Higher Conversion Rates: Streamlined authentication reduces friction, leading to fewer drop-offs and improved user engagement and retention.
Security Measures
SNA employs multiple layers of protection:- SIM-Based Cryptography: Tamper-resistant and unique, the SIM’s cryptographic capabilities form the cornerstone of SNA’s trust model.
- Server-Initiated Flow: Sensitive operations occur between secured servers, limiting client-side exposure.
- Source IP Verification: Ensures requests originate from legitimate network sources.
- Device Signature Matching: Compares device signatures to identify phishing or man-in-the-middle attempts.
- Latency Monitoring: Detects anomalies in response times, helping spot suspicious activity.
Limitations
- Cellular Connection Required: SNA only works over mobile data. If a user is on Wi-Fi, they must switch to cellular data or be prompted to do so—this can be enforced in native mobile apps but may require user action in mobile browsers.
- Limited Availability:SNA is region- and operator-specific. For instance, in India, we currently support Jio and VI networks; Airtel integration is on the roadmap for the next 2-3 months.