Every person is uniquely made up of a combination of distinctive traits. Biometrikey accurately captures the truly dynamic complexity of our biometric identities and uses it to
authenticate individual users’
identities through a proprietary &
simple user experience.
Why did we create
Biometrikey?
“Over 80 percent of corporate breaches are caused by weak or stolen user credentials.” (FIDO)
Passwords are just a few letters that stand between us and our private information – they are the basis of our connection to our online identities. Whenever any authentication problem arises (e.g., face ID or fingerprint doesn’t work), the system defaults to a password, triggering a “forgot password” mechanism to get users back in. However, the system is only as good as your weakest link – and that weak link is your password.
01. Nobody remembers most of their passwords. They might use Chrome to remember all of their keys, but Chrome is far from being secure.
02. The current systems can easily be hacked (how easy, that easy: video 1, video 2 )
03. 1/3 of online purchases are abandoned due to forgotten passwords.
Biometrikey’s mission is to turn your users’, clients’ and employees’ login process into an always great and always secure experience.
How Biometrikey
revolutionizes the authority
authorization process
Through our patented engine, we’ve managed to create a living password from your dynamic biometrics (“sign your name in the air”), capturing your distinctive features and the unique way in which they move. Our proprietary patented process can remember many different identifiers related to the user and can guide him/her to supply it. Therefore, the user doesn’t have to remember the “password” so it can’t be forgotten.
Essentially, we brought a new set of proprietary patented keys and locks to the world, and our differentiation is in movement – we move the lock constantly (because many things can be used to identify and grant access), and through the UX, we can guide you to the location of the lock (“use your strong hand to do a V sign”).
Since you are the password, it’s impossible to break into.
Founder & CTO
Founder & CTO
Founder & CTO
Founder & CTO
Embedded rt software engineer
Full time
Job #38112
Design and Development of an IoT wireless location tag, in software, from scratch, in C, running a thin scheduler such as FreeRTOS.
Responsibilities: over the design and development of a full-fledged, stand alone, IoT software product.
Software manager
Full time
Job #38112
Privacy Policy
Terms Of Use