The ability to initially establish, register and subsequently verify the identity of a person with high confidence is central to any system whose security involves people. If an organization can improve its ability to verify who is at a remote terminal and better match them to their privileges the exploitation from malicious or unauthorized persons will be reduced along with the risk of damage and associated costs. This technology focuses on improving the capability to prevent and to detect unauthorized penetration attempts by fraudulent or stolen user credentials such as passwords or other means of access control using elements from multiple data sources that have portions continuously updated
Extensive research has been performed on this problem and we are seeking customers, partners and investment.