The Foundation for Biometric Authentication

Back-End Server Authentication Software

At the heart of VeridiumID is our back-end server software which acts as the authority for authentication matching.

The flexibility of our enterprise-ready solution allows you to customize the storage and matching of biometrics to your company’s specific requirements. This can either be done completely on the server, completely on the phone (making it FIDO compatible), or with the biometric data broken up and stored between the phone and server, with matching occurring on the server or phone as specified.

Our administrative dashboard provides analytics and reporting that businesses require in order to monitor the security and stability of their access control and identity management systems.

authentication server

Flexible Admin Dashboard

A key feature of VeridiumID is the Administrative Dashboard. Through the dashboard, you can completely customize your deployment of biometrics. 

You have access to user and group management, biometric engine management, real-time activity, role configuration, and security reporting and analytics.

In addition, you have the flexibility to create and enforce custom biometric authentication policies – i.e., “accepted” types of biometrics – on the basis of security factors (geolocation, time of day, machine).

For example, Touch ID may be acceptable from a security standpoint when an employee is sitting at his or her desk. But a more secure biometric (4 Finger TouchlessID) may be required if a US-based employee is logging on from a computer in an Internet cafe in Russia, on a Sunday morning.

Secure Storage of Biometric Data

Protecting the privacy of users is of utmost importance with any biometric authentication solution. That’s why VeridiumID offers several deployment options for storing and matching biometric vectors.

  • Biometric templates are stored and matched on the device.
  • Biometric templates are stored and matched on the server.
  • Biometric templates are stored between the device and server for additional security, and matched on the server or device.

We believe that breaking up biometric templates using a distributed data model is the most secure configuration. In this method, users’ biometric templates are encrypted and broken apart using visual cryptography and stored between the device and the server. This drastically reduces the risk of biometric data being stolen, ensuring the highest levels of protection for your employees or customers.

User Behavior Framework

VeridiumID 1.2 introduces the framework for integrating behavioral biometrics to the authentication process. Behavioral biometrics, and what we call continuous authentication, will be an important step forward in multi-factor authentication as the technology evolves.

Thinking about integration biometrics with your identity and access management systems? There are some key questions you need to ask yourself first.