BSI for Blockchains
By writing your password instead of typing, you create a powerful biometric security to your password. Simple yet highly secure, without revealing personal information.
A Biometric Like No Other
Decentralized Identifiers (DIDs) are new ways to verify identity in a decentralized manner stored on blockchains. However, DIDs cannot detect compromised credentials and this is a huge issue.
At least two new safeguards - auditability, (detect unauthorized authentication events) and privacy, (prevents adversaries from linking an authentication to the user and service provider) are being researched.
However, the use of BioSig-ID’s written passwords that cannot be lost or stolen can solve these issues if added to the blockchain ID authentication flow.
Public key management.
Access to your cryptocurrency is managed by a highly valuable public key. If you lose it, you lose all access.
BSI's CVL technology allows blockchain users to generate public keys that are as easy to remember as "your signature". Since you created your signature, only you can recreate it. This stops others from accessing your assets.
The security of BSI generated credentials is both simple yet highly secure without revealing your personal information.
Blockchain data entry protection.
The value of your blockchain is in the data or currency contained in it. A change in theses assets is immutable and permanent. It is therefore critical that all changes are carefully monitored to ensure the dataset in the blockchain is not corrupted.
By using BSI generated credentials, miners working a blockchain leave a permanent mark in the chain that is unquestionable.
Because credentials can't be shared, any and all changes can be traced back to the actor/miner; rather than to anyone who had gotten hold of their credentials. Users need to gain identity sovereignty at the same time protecting their privacy – BioSig-ID is an answer!
Protect your public key's integrity.
Our patented behavioral biometric technology protects your customers' online and real world identity. It links online digital access to the presence of a single authorized user, not to their credentials. It does this without collecting, transferring, or storing any personal identifiable information. It provides Advanced Multi-Factor Authentication (AMFA) in a simple and reliable authorized user experience that no AI/ML algorithm or cyber criminal can replicate.