Authentication
A solution that allows user identity verification through biometric technology
WHAT THE TECHNOLOGY DOES
Authentication solution

Our solution allows access to any application or physical environment, or to carry out any type of transaction, through the use of different biometric technologies.
It is possible both to authenticate a user (1-1) and to identify them among a group of people (1-N).
PROCESS
Steps to follow
To carry out user authentication, a single previous biometric registration step is necessary for identity verification. Once registered, the authentication process involves two easy steps.
Client registration process
One single step. An initial biometric pattern capture and verification of the user's identity.
Authentication: Step 1
Biometric capture with passive liveness
Authentication: Step 2
Comparison with the previously registered pattern
BIOMETRY AND TECHNOLOGY
Types
Our authentication solution has different types of biometric technology, allowing its use individually or jointly. This expands the possible cases for application and increases security when using multiple biometrics at the same time.
What makes us different
Our authentication technology always seeks to combine maximum security with the best user experience.
- Reduced pattern
- Dynamic, encrypted and tokenised AES 256
- Smart learning pattern
- iBeta ISO 30107 certification
- Passive liveness
- Ultra-fast average authentication time
- 99.998% accuracy rate
- Multi-factor authentication
Sectors for application
Main industries in which technology is applied
Applications of technology
Main cases of use of authentication technology.