logo
User FlowsThe Keyless user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.
User FlowsThe Keyless user flow is unique. From enrollment and authentication to account recovery, our technology offers an unparalleled user experience that places security and privacy at its very core.
EnrollmentWe only require users to register their biometric templates once. The same templates are then used to identify users during future authentication attempts.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patented privacy-enhancing security technology
Initiate
User initiates enrollment to Keyless
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network running extracts biometric features using machine learning on the user device
Key Generation
User device generates unique private and public keys and encrypts user biometrics
Upload and Store
Biometric data is irreversibly encrypted by our MPC protocol
AuthenticationKeyless enables users to authenticate using any device with a front-facing camera.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Use Keys
User device uses cryptographic keys to generate a unique token that authenticates the user
Verify
Token is verified to complete user authentication
Account RecoveryOur account recovery process is seamless, secure, and significantly more cost-effective than call centers or help desks.
These steps are standard and shared with local authentication tech and other biometric systems
These steps are powered by Keyless patent pending privacy-enhancing security technology
User initiates account recovery
Device restore is initiated
Initiate
User initiates authentication
Read Biometrics
Device camera captures sequence of user pictures
Extract Features
Neural network extracts biometric features on the user’s device using machine learning
Authenticate
Biometric data is irreversibly encrypted and used to retrieve cryptographic keys using our proprietary MPC protocol which ensures user biometric data is never at risk
Identity recovered
User regains access to accounts
Schedule a personalized demoFind out how Keyless can help your organization prevent ATOs, improve UX, and protect your bottom line.
© Keyless Technologies, 2022. All rights reserved - Privacy Policy - EULA - Anti Corruption - Data Processing Agreement - Cookie SettingsLondon – Company no. 11362854 | Rome – Startup Innovativa no. 14880901005 | Singapore – Company no. 201904868C