top of page
AdobeStock_295722879.jpeg
BioSig-ID-Logo-Full.png

BSI's
technology flagship.

Four written characters that sets us apart.

USPTO Patents

US-007663614-B2

US-008004492-B2

Advanced. Robust. Simple.

A patented biometric identity authentication solution that controls access to files and information through MFA in one product. It works on all devices using HTML5.

  • Requires no hardware or software downloads and authenticates users with a four-character password.

  • Blends amazing biometric technology with the password format users are comfortable with.

  • Provides real-time warning of potential data crimes in progress.

A simple intuitive
interface for a written password

BSI's BioSig-ID solution uses a simple interface that works on a computer, tablet, mobile phone, or any other device capable of taking the user's input through the use of a finger, stylus or mouse.

Our advanced algorithms look at the speed, direction, rhythm, sequence, and duration that it takes to enter the password, and compares it to a reference for authentication.

The PIN variation, with four input cells, has over 192 billion possible combinations... that means that only one human in the world can reproduce the password; the one person who created it.
 

BSI biometric technology is
not like the others...

BSI's CVL technology gives BioSig-ID a unique advantage over other multiple factor authentication (MFA) solutions.
 

Some solution providers meet ONE of the "something I am", "something I have" or "something I know" requirements. 

BSI's solutions meets all three in one instance.

In addition, BSI's CVL technology requires the user to authenticate in a way that only one person can do; the one who generated the credentials.

Advanced
MFA

Meets all factors in one action.

I am...

This factor relies on behavioral biometrics. The user's mind and thoughts are the "am", which can' be stolen.

I know...

This factor is met by knowing the password, or symbols used to generate the credentials.

I have...

This factor is met using an ubiquitous personal device like cellphone, computer, or like device.

This factor is met by reproducing the credentials by writing, or gesturing them as only one user can do.

Other solution providers meet one or two factors.

I am...

Physical Biometrics

To meet this factor, other technologies require the use of expensive and highly specialized equipment.

 

If the "special" device is broken or lost, this factor can't be met.

I know...

Technology Users

This factor is met by knowing the password, or symbols used to generate the credentials.

Usually easily lost or stolen because it is in ASCII format.

I have...

Hardware Providers

This factor is met using an ubiquitous personal device like cellphone, computer, or like device.

They use it...

mica-logo-square.png
coahoma.png
nmls.png
LM2.png
ICHS.png
AdobeStock_295722879.jpeg

Patented. Tested.
Used by Millions.

15

Years of Experience

250

US Customers

2M

Current Users

100M

Qtrly Uses

44

Patented Claims

bottom of page