Keyless is a secure and easy-to-use authentication and identity management system that respects your privacy. Built using provably secure cryptography and state-of-the-art biometrics, Keyless replaces your something you need to remember (e.g., your PIN or password) with something unique about you (e.g., with your face).


Schedule demo

Secure multi-party computation

Advanced secure multi-party computation protocols enable Keyless to authenticates users without revealing their biometrics or their cryptographic keys.

Advanced biometric authentication

Keyless uses advanced biometric authentication with liveness detection, which cannot be fooled using photo, a video, or a Hollywood-style mannequin.

Two distinct authentication factors

Keyless seamlessly integrates two distinct authenticator factors: your biometrics, and your trusted device using cryptographic zero-knowledge proofs.

Zero-knowledge biometric authentication

The Keyless protocol implements zero-knowledge biometric authentication and key management using secure multi-party computation. It supports several biometric modalities, including face recognition, fingerprints, and iris. The users interact with a set of nodes in the Keyless network. Each node stores cryptographically-protected shares of the users biometric data and keys. Using these shares, users can perform authentication without storing any biometric template on their device.

Read more

Enrollment flow

How to add a new user to Keyless

1

INITIATE

 


User initates Keyless enrollment

2

READ
BIOMETRICS


Biometric reader (e.g. device camera, iris scanner etc.) captures a picture

3

EXTRACT
FEATURES


Neural network running on user device extract biometric features

4

KEY
GENERATION


User device generates user and device keys, circuits and other Keyless magic

5

UPLOADS

 


User public key, device public and circuits are uploaded from device to nodes

6

PUBLISH

 


Nodes publish user and device public keys on a database or blockchain

These steps are standard and shared with FaceID and other biometric systems

These steps contain the Keyless "magic sauce"

Authentication flow

How to login to a website, confirm a transaction etc.

1

INITIATE

 


User initiates action (e.g. login to website, confirm transaction) and receives a cryptographic challenge from the server.

2

READ
BIOMETRICS


Biometric reader (e.g. device camera, iris scanner etc.) captures a picture

3

EXTRACT
FEATURES


Neural network running on user device extracts biometric features

4

RETRIEVES

 


User’s device retrieves the user private key from the Keyless network using the biometric features via the Keyless protocol (sMPC). Note: multiple nodes are involved in the computation

5

SIGN

 


User’s device signs the cryptographic challenge using the retrieved private key and sends the signature to server

6

VERIFY

 


Server verifies the signature and authenticates user

These steps are standard and shared with FaceID and other biometric systems

These steps contain the Keyless "magic sauce"

Ready to get started? Get in touch

As organizations strive to deliver secure and seamless digital experiences, validating identity with privacy-preserving biometric authentication is the way forward. Reach out to see how Keyless can simplify your authentication workflow.

We received your message and we will be back to you soon.