The Foundation for Biometric Authentication

Back-End Server Software

At the heart of VeridiumID is our back-end server software which acts as the authority for authentication matching.

The flexibility of our enterprise-ready solution allows you to customize the storage and matching of biometrics to your company’s specific requirements. This can either be done completely on the server, completely on the phone (making it FIDO compatible), or with the biometric data broken up and stored between the phone and server, with matching occurring on the server or phone as specified.

Our administrative dashboard provides analytics and reporting that businesses require in order to monitor the security and stability of their access control and identity management systems.

The server software is based on IEEE 2410, the Biometrics Open Protocol Standard – the first global standard for biometric authentication for digital access and electronic transactions, as well as physical access control.

authentication server

Full Customization For Your Organization

authentication server

Windows Live
Login Tile

The Windows Live Login Tile plugin allows you to add biometrics to Windows Login screens, with a push notification to a mobile device or by providing a QR code to scan.

authentication server

Active Directory Integration

VeridiumAD integration allows you replace passwords in your Active Directory Deployment, replacing them with biometrics. 

authentication server

Custom Business Plugins

VeridiumID come with customized plugins so you can apply biometric authentication to any aspect of your business for secure, easy access to data or physical environments.

Flexible Admin Dashboard

A key feature of VeridiumID is the Administrative Dashboard. Through the dashboard you can completely customize your deployment of biometrics. 

You have access to user and group management, biometric engine management, real-time activity, role configuration, and security reporting and analytics.

In addition you have the flexibility to create and enforce custom biometric authentication policies – i.e., “accepted” types of biometrics – on the basis of security factors (geolocation, time of day, machine).

For example: Touch ID may be acceptable from a security standpoint when an employee is sitting at his or her desk. But a more secure biometric (4 Finger TouchlessID) may be required if a US-based employee is logging on from a computer in an Internet cafe in Russia, on a Sunday morning.

Learn More About VeridiumID in our Webinar “The Password Is Dead.”

VerdiumAdmin-05-roles

Secure Storage of Biometric Data

Protecting the privacy of users is of utmost importance with any biometric authentication solution. That’s why VeridiumID offers several deployment options for storing and matching biometric vectors.

  • Biometric templates are stored and matched on the device.
  • Biometric templates are stored and matched on the server.
  • Biometric templates are stored between the device and server for additional security, and matched on the server or device.

We believe that breaking up biometric templates using a distributed data model, is the most secure configuration.  In this method, users’ biometric templates are broken apart using visual cryptography, with a piece stored on the device and another piece on the server. This drastically reduces the risk of biometric data being stolen, ensuring the highest levels of protection for your employees or customers.

info-splitting-vector

How Are Biometrics Being Used Around the World?

info-be

Thinking about integration biometrics with your identity and access management systems? There are some key questions you need to ask yourself first.