The Keyless authentication user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.
User Flows
The Keyless authentication user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.
Enrollment
We only require users to register their biometric templates once. The same templates are then used to identify users during future authentication attempts.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patented privacy-enhancing security technology
Initiate
User initiates enrollment to Keyless
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network running extracts biometric features using machine learning on the user device
Key Generation
User device generates unique private and public keys and encrypts user biometrics
Upload and Store
Biometric data is irreversibly encrypted by our MPC protocol
Authentication
Keyless enables users to authenticate using any device with a front-facing camera.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Use Keys
User device uses cryptographic keys to generate a unique token that authenticates the user
Verify
Token is verified to complete user authentication
Account Recovery
Our account recovery process is seamless, secure, and significantly more cost-effective than call centers or help desks.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
User initiates account recovery
Device restore is initiated
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Identity recovered
User regains access to accounts
Get In Touch
Find out how our private-by-design MFA can help your organization prevent ATOs, improve UX, and protect your bottom line.