RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

UnifyID

Product
Technology: Cybersecurity - Authentication,  cybersecurity - Biometric identification

The American startup of UnifyID put in 2016 on the market a new product — the besparolny system of authorization and user identification. Developers claim that the password as a method of authorization is not capable to protect the user from cracking any more. Therefore this system collects and analyzes data on devices at which the person usually works, and about places where he is at this time and also about his biometric parameters and behavior. It helps to prevent login from the unfamiliar device or in the uncharacteristic place and also just other person.

The UnifyID platform gives an opportunity to authorization using biometric parameters. But it is not about a fingerprint or scanning of an iris of the eye of an eye. A system in literal sense can identify the user on gait and also on a warm rhythm, speed and a manner of clicking of keys on the keyboard, even on a method to sit down on a chair and to rise from it[1].


Learn more: Technologies of biometric identification

UnifyID uses during the work a combination of deep neural networks, tree charts of solutions, Bayes networks, filtering systems and signal processing and also semi-controlled and uncontrollable machine learning.

UnifyID allows the user to become authorized on social networks and to come into personal accounts of the bank websites without request of a nickname and the password. But the platform does it only when it is sure that it is that person. In the first days of work UnifyID can "have suspicions", and then it sends a request for identification using a fingerprint for the user's smartphone. Then, when a system will rather well study the user, such cases will occur very seldom, developers assure.

The company understands that how a lot of information on it will be collected and concentrated in one place can disturb the client. But UnifyID leaves full control over these data in hands of the person. Information is stored on local devices, but not on final cloud servers. Besides, data are ciphered in such a way that the company has no access directly to their sense.

Notes