

USPTO Patents
US-007663614-B2
US-008004492-B2
Advanced. Robust. Simple.
A patented biometric identity authentication solution that controls access to files and information through MFA in one product. It works on all devices using HTML5.
-
Requires no hardware or software downloads and authenticates users with a four-character password.
-
Blends amazing biometric technology with the password format users are comfortable with.
-
Provides real-time warning of potential data crimes in progress.
BSI's BioSig-ID solution uses a simple interface that works on a computer, tablet, mobile phone, or any other device capable of taking the user's input through the use of a finger, stylus or mouse.
Our advanced algorithms look at the speed, direction, rhythm, sequence, and duration that it takes to enter the password, and compares it to a reference for authentication.
The PIN variation, with four input cells, has over 192 billion possible combinations... that means that only one human in the world can reproduce the password; the one person who created it.
BSI biometric technology is
not like the others...
BSI's CVL technology gives BioSig-ID a unique advantage over other multiple factor authentication (MFA) solutions.
Some solution providers meet ONE of the "something I am", "something I have" or "something I know" requirements.
BSI's solutions meets all three in one instance.
In addition, BSI's CVL technology requires the user to authenticate in a way that only one person can do; the one who generated the credentials.

Advanced
MFA
Meets all factors in one action.
This factor relies on behavioral biometrics. The user's mind and thoughts are the "am", which can' be stolen.
This factor is met by knowing the password, or symbols used to generate the credentials.
This factor is met using an ubiquitous personal device like cellphone, computer, or like device.
Other solution providers meet one or two factors.
Physical Biometrics
To meet this factor, other technologies require the use of expensive and highly specialized equipment.
If the "special" device is broken or lost, this factor can't be met.
Technology Users
This factor is met by knowing the password, or symbols used to generate the credentials.
Usually easily lost or stolen because it is in ASCII format.
Hardware Providers
This factor is met using an ubiquitous personal device like cellphone, computer, or like device.
They use it...




