logo
User Flows
The Keyless authentication user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.

User Flows

The Keyless authentication user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.

Enrollment

We only require users to register their biometric templates once. The same templates are then used to identify users during future authentication attempts.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patented privacy-enhancing security technology

Initiate

User initiates enrollment to Keyless

Read Biometrics

Device camera captures sequence of user pictures

Extract Features

Neural network running extracts biometric features using machine learning on the user device

Key Generation

User device generates unique private and public keys and encrypts user biometrics

Upload and Store

Biometric data is irreversibly encrypted by our MPC protocol

Authentication

Keyless enables users to authenticate using any device with a front-facing camera.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Use Keys
User device uses cryptographic keys to generate a unique token that authenticates the user
Verify
Token is verified to complete user authentication

Account Recovery

Our account recovery process is seamless, secure, and significantly more cost-effective than call centers or help desks.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
User initiates account recovery
Device restore is initiated
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Identity recovered
User regains access to accounts

Get In Touch

Find out how our private-by-design MFA can help your organization prevent ATOs, improve UX, and protect your bottom line.