The future of PII is now secure.
Decentralization is key to digital security, data protection and consumer privacy.
Yet the world of biometrics is stuck in an old paradigm of trade-offs – centralized databases that are prone to hacks or device-based biometrics that can be circumvented. At Anonybit, we ask, what if we could deploy biometrics without a template and give fraudsters and hackers nothing to find and nothing to steal?
Our revolutionary, patented approach answers the call for decentralized biometrics without compromising security or privacy.
The system breaks down biometric data into anonymized bits ("Anonybits") that reside in a vast peer-to peer network, made up of various types of nodes that store and compute the biometric match. The anonymized bits never leave the nodes and cannot be used to reconstruct the original image.
Privacy by design infrastructure
The network infrastructure is designed to support multiple use cases and even third-party algorithms.
Anonybit’s decentralized biometric framework enables strong, passwordless authentication, reduces fraud, strengthens compliance and protects identity and personal assets. True privacy-by-design limits potential exposure of PII and provides the backbone for strong, zero-knowledge authentication, that is not bound to any specific device or application.
Anonybit supports the entire digital identity lifecycle.
Protects Consumer Privacy and Enhances Security
- Privacy-by-design: Minimizes data protection issues around the most sensitive personal information
- Strong authentication: Ensure someone is who they claim to be even if they present with a new device or in a new application
- Zero-trust: Reduce ability for impersonation by a hacker who circumvents device-based biometrics with stolen PII and passwords
- Regulatory compliance: Reduce exposure and potential liability that comes with managing personal data
Addresses Multiple Use Cases Via a Flexible Infrastructure
- KYC: Extract the biometric information from a matched government issued ID to create a secure identity for use in downstream applications
- Login and transaction verification: Use biometrics to enable private and secure access to online services with zero-knowledge
- Password/key retrieval: Retrieve private keys and other personal assets
- Other MPC services: Send one-time-passwords, resolve tokens for payment and manage other digital service offerings