Multi-factor Biometric Authentication Software

It’s Flexible, Secure and Enterprise-Ready.

See VeridiumID in Action

Why VeridiumID?

Everyone acknowledges that passwords are a weak link in enterprise security. You can lose them, share them, and crack them. Biometric authentication can strengthen legacy systems by adding an additional layer of security. With our technology, a company can deploy biometrics to replace tokens or passwords altogether. Either way, you can now truly verify the identity of the end user.

How It Works

VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company’s mobile app. This complete software solution is highly customizable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography.

VeridiumID installs easily within your network to provide authentication to enterprise applications, websites, even doors. And it works just by you being you.

Add Biometrics As a Second Factor

You can use VeridiumID to replace hard and soft tokens as a second authentication factor. In addition to what you know – your password – you are adding two additional factors; what you have – your mobile device – and what you are – your biometrics.

Eliminate Passwords Altogether

Are you ready to eliminate passwords? Our technology and unique storage architecture combine to provide true identity authentication. The software handles everything from biometric data collection and encryption, secure storage, and the ability to perform matching on the device or server during authentication sessions.

Learn more by reading our whitepaper, "Multifactor Authentication: The Path Forward for Security."

Proving Identity

Identity is the “claim” you make to access information, but making that claim with a password doesn’t prove who you are.

Passwords only authorize access, while biometric authentication is the process of verifying the claim that identity makes.

Only biometrics – your face, your voice, your fingerprints – prove you are who you say you are.

VeridiumID Benefits

  • Supports multiple biometric libraries, including 4 Finger TouchlessID, allowing for complete customization of authentication systems

  • Provides complete control over the entire solution, from customizing the biometrics used to setting rules for varying security demands

  • By encrypting biometric vectors with Visual Cryptography and storing them between the device and server, it is nearly impossible for them to be compromised or stolen

  • Built on open standard IEEE 2410 and supported by a working group which continues to advance this standard, future-proofing your investment

  • Easily integrates into your existing corporate infrastructure without additional hardware

  • Reduces password resets, help desk requests and support calls by up to 90 percent

Download the Datasheet

VeridiumID Process

VeridiumID Features

Biometrics as a Primary Factor
VeridiumID allows for the complete elimination of passwords, using biometrics as the only authentication factor.

Biometrics as the Secondary Factor
VeridiumID can also be integrated into multi-factor authentication systems to replace token-based one-time passwords as the second authentication factor.

Tamper-Aware Transaction Signing
VeridiumID 1.2 adds transaction signing to authentication events. This signature includes the “when, where, and what device was used” of every transaction, and is stored on a secure server for compliance audits. This provides legal non-repudiation, a critical security function for financial services firms that need to be PSD2 or GDPR compliant.

Biometrics for Single Sign-On
VeridiumID can act as the identity provider via SAML to provide biometrics as an option for single sign-on for compatible systems.

Protect Privacy with Visual Cryptography
VeridiumID uses a unique data storage model with visual cryptography to store biometric data in a more secure manner. This process encrypts and breaks up the biometric vector into multiple pieces, allowing those pieces to be stored in different locations, reducing the risk of theft and ensuring the privacy of the user.

FIDO Compatible
VeridiumID can be configured to be compatible with FIDO authentication architecture.

Data Breaches

Proving identity with unique traits or behavioral characteristics can safeguard your company’s most critical assets in a way that’s both convenient and secure.

There’s finally a viable alternative to passwords. A better way to keep your data safe.