Here are some common questions with our answers!
iVALT® allows users to create a Universal Biometric ID™ that can be accessed from anywhere and from any iVALT-enabled device or service. Users install the iVALT® mobile app to register their mobile number and facial biometrics to create their unique and universal ID. Once the Universal Biometric ID™ is created, users can use it with any iVALT-enabled application, secure access processorother use case. Once installed, the app itself becomes the “biometric authenticator” to compare real-time facial profiles to the reference Biometric ID to verify the identity of anyone needing to show positive validation of who there are. Use cases include online access, physical access, on-demand proof of ID, and many other financial, location, document security, attendance and secure device applications.
iVALT® provides a mobile application that can be downloaded from commercial sites and used to register the user (via a numeric code, typically the mobile number). In addition, the user can complete the IVALT® activation process by enrolling biometrics via facial profiles captured by the mobile app. This information is stored anonymously on two separate remote servers without any identifying information. When needed, the user can use their mobile number and facial profile to verify their biometric ID for any application. In addition, any iVALT-enabled application can request an on-demand facial biometric verification from a user when required. Once registered and enrolled, any iVALT-enabled device with the iVALT® mobile appinstalled can be used as the “biometric authenticator” for any registered and enrolled iVALT® user.
The whole process of registration and enrollment takes less than 5 minutes and once registered with iVALT, an authentication takes 15 seconds or less assuming no significant delay in transmission over the network.
Mobile phone facial recognition today ties a specific user to a specific device. These devices are typically high end smartphones. Use cases typically revolve around secure access to the mobile phone and mobile payments. iVALT can be used with any smartphone with a camera, irrespective of the presence of native facial recognition technology. Any device that has the iVALT mobile app installed can serve as a “reader” for any iVALT user. The ID is not limited to the mobile phone owner for mobile use cases that unique tie them to their phone . iVALT authentication is accessed via a mobile phone, but is done remotely to enable autonomy from a specific device.
1. Additional factor for online user credentials
2. Physical access
3. Secure access to documents
4. Cloud Services
7. Social engineering
8. Contractor ID and WiFi Access
IVALT provides the IP and framework for application developers to build secure authentications that use 3-factor authentication (including facial biometrics). iVALT has documented mobile APIs and an SDK for building Internet-enabled authentication integrations.
iVALT has a WordPress biometric ID application that is available today for any WordPress admin. The solution consists of a downloadable WordPress plugin (available from the WordPress library) and the iVALT mobile app. Once registered and enrolled on the mobile app, the admin can download the plugin inside WordPress and register the mobile number. When logging into WordPress, the admin will enter login and password as usual and a request will be sent to their mobile phone for quick facial profile reference. Once compared to the registration and enrollment information, the WordPress plugin is authenticated and the admin gets immediate access to WordPress. No, iVALT provides the APIs, an SDK and the ability for mobile and fixed applications to be authenticated by any mobile user using iVALT.
Yes, but there are existing biometric approaches for purely mobile phone access. iVALT has patents pending for the use of mobile biometric authentication for access to other devices (mobile and fixed that are separate from the mobile phone).
iVALT works with any website that uses standard login and password. It can take the place of 2nd factor authentication (through facial recognition) or completely replace the need for logins and passwords. The use cases enabled by iVALT are highly flexible.
IT departments no longer need to request or remind employees about password updates, complex change rules, or reset processes. All passwords are stored by IT on the iVALT password server (with policy management for frequent and complex changes). When authenticated by facial recognition and user info, IT is prompted and releases the password directly to the employee’s device for immediate access. Employees do not need to create, remember or type any passwords, ever.
iVALT is working with partners to provide multiple use cases for Active Directory, including access to login and enablement of employees to be challenged for access to specific and highly valued assets. Again, flexibility is key for enterprise applications and iVALT can be configured in a large number of implementations to meet specific corporate needs.
Please refer to the user guide.
Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.