Above and beyond Biometrics
Auto-adaptive recognition: our algorithms pre-identify the user based on behaviors, using also biometric parameters obtained from the upper face and voice.
Self Sovereign Identity
All customer related data remains exclusively at the user's disposal, offering maximum privacy and respect of GDPR regulation.
Each data set is encrypted, divided in pieces and spread on a network of nodes, making it impossible for an external unauthorized source to extract. At each authorized data usage the inverse process is done to recompose the data set.
Operations peer to peer are realized with an inseparable connection, transparent and immutable through smart-contract like logic
API or SDK for third party allow easy integration in already existing systems