USPTO Patents
US-007663614-B2
US-008004492-B2
Advanced. Robust. Simple.
Used for automatic proctoring of online training and continued education programs.
-
Does not collect any biometric markers and protects the privacy of the user by blurring all recordings
-
Works seamlessly with the world’s leading learning management systems (LMSs)
-
Provides complete class and course analytics and guides instructors to find suspicious activity by the student.
Technology that respects student's privacy
Other solutions...
-
Facial recognition data collected
-
Background review and inspection
-
Voice recording
-
Collect and transfer PII
-
Subject to racial & gender bias
-
Collect and store pictures /audio
-
Software client required
-
Hardware may be required
-
Facial anonymity
-
Background privacy
-
Audio level sensing
-
ZERO personal private Information
-
ZERO racial & gender bias
-
No pictures /audio collected
-
Hardware free
CSU vs. Ogletree was the watershed case for distance learning in 2022. It established the fact that students have the right to privacy while being remotely proctored.
​
BioSight-ID protects and respects the privacy of students, while at the same time provides time efficiency tools for faculty members reviewing online exams.
​
IT departments love it as well, because it handles no personal information (PII), which is a burden on any cyber security plan.
​
Make it easy on your team. Select a tool that works without injecting additional legal risk to your day-to-day operations.
​
BSI biometric technology is
not like the others...
BSI's CVL technology gives BioSig-ID a unique advantage over other multiple factor authentication (MFA) solutions.
Some solution providers meet ONE of the "something I am", "something I have" or "something I know" requirements.
​
BSI's solutions meets all three in one instance.
​
In addition, BSI's CVL technology requires the user to authenticate in a way that only one person can do; the one who generated the credentials.
Advanced
MFA
Meets all factors in one action.
This factor relies on behavioral biometrics. The user's mind and thoughts are the "am", which can' be stolen.
This factor is met by knowing the password, or symbols used to generate the credentials.
This factor is met using an ubiquitous personal device like cellphone, computer, or like device.
Other solution providers meet one or two factors.
Physical Biometrics
To meet this factor, other technologies require the use of expensive and highly specialized equipment.
If the "special" device is broken or lost, this factor can't be met.
Technology Users
This factor is met by knowing the password, or symbols used to generate the credentials.
​
Usually easily lost or stolen because it is in ASCII format.
Hardware Providers
This factor is met using an ubiquitous personal device like cellphone, computer, or like device.