A DYNAMIC TEAM

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

 

What We Do

We help achieve certainty to simple questions like
• Are you the person you claim to be?
• Are you the person who signed?
• Is this an original document?

We do so by developing authentication solutions based on the cryptographic processing of a unique physical feature:  subcutaneous vein patterns. 
Vein patterns are private because unlike fingerprints and DNA they leave no trace, and unlike voice, face, and iris are not continuously shared. 

Read more… [expandable or overlay section with next topics]

You, Our Customer

Our Customers Are Organisations

 

Private, public, or non-governmental organisations need certainty in answers to questions such as
• Are you the person you claim to be?
• Are you the person who signed?
• Is this an original document?

Identity Management is a growing need for organisations facing the growth and mobility of staff, customers, patients, voters, citizen, students, refugees, etc., as well as growth and mobility of certifications and transactions.

Read more… [expandable or overlay section with next topics]

We, The People

As Citizen, We All Have Privacy Rights

 

As individuals, we interact with organisations of all sorts, private, public, and non-governmental.

We do so in a variety of roles, as staff, customers, patients, voters, citizen, students, refugees, etc., and are asked to disclose our identity and other data.

Our privacy rights include the protection of our identity from identification mistakes by organisations and from impersonation by others.  Our rights also include the protection of our personal data.

Read more… [expandable or overlay section with next topics]

You, Our Partner

Working Together for Our Customers

 

As providers of authentication platforms, we know how close you are to your customers. You know your markets, your segments, your territories, your customers, and most of all you know their business and applications.

There is no one more knowledgeable than you when it comes to adding private biometric authentication to a business process and application. You may have written your customers’ applications, you may have deployed them, you may support their running.

Read more… [expandable or overlay section with next topics]