top of page

privacy protecting
remote assessments;
and more.

Case Studyimage62_2x.png

So you can
deliver positive candidate

These are more than words to you, and to us as well.

Our technology is used by more than two million users, and is designed to protect their identity, respect their privacy, and provide irrefutable accountability of their actions through every step of their journey. 

BSI's technology is the digital thread that can reliably and safely connect your candidates to the exams you administer.





Technology that respects student's privacy

Other solutions...

  • Facial recognition data collected

  • Background review and inspection

  • Voice recording

  • Collect and transfer PII

  • Subject to racial & gender bias

  • Collect and store pictures /audio

  • Software client required

  • Hardware may be required

  • Facial anonymity

  • Background privacy

  • Audio level sensing

  • ZERO personal private Information

  • ZERO racial & gender bias

  • No pictures /audio collected

  • Hardware free

CSU vs. Ogletree was the watershed case. for distance learning in 2022. It established the fact that students have the right to privacy while being remotely proctored.

BioSight-ID protects and respects the privacy of students, while at the same time provides time efficiency tools for faculty members reviewing online exams.

IT departments love it as well, because it handles no personal information (PII), which is a burden on any cyber security plan.

Make it easy on your team. Select a tool that works without injecting additional legal risk to your day-to-day operations.

BSI biometric technology is
not like the others...

BSI's CVL technology gives BioSig-ID a unique advantage over other multiple factor authentication (MFA) solutions.

Some solution providers meet ONE of the "something I am", "something I have" or "something I know" requirements. 

BSI's solutions meets all three in one instance, while respecting the user's privacy rights. 

In addition, BSI's CVL technology requires the user to authenticate in a way that only one person can do; the one who generated the credentials.


Meets all factors in one action.

I am...

This factor relies on behavioral biometrics. The user's mind and thoughts are the "am", which can' be stolen.

I know...

This factor is met by knowing the password, or symbols used to generate the credentials.

I have...

This factor is met using an ubiquitous personal device like cellphone, computer, or like device.

This factor is met by reproducing the credentials by writing, or gesturing them as only one user can do.

Other solution providers meet one or two factors.

I am...

Physical Biometrics

To meet this factor, other technologies require the use of expensive and highly specialized equipment.


If the "special" device is broken or lost, this factor can't be met.

I know...

Technology Users

This factor is met by knowing the password, or symbols used to generate the credentials.

Usually easily lost or stolen because it is in ASCII format.

I have...

Hardware Providers

This factor is met using an ubiquitous personal device like cellphone, computer, or like device.


Patented. Tested.
Used by Millions.


Years of Experience


US Customers


Current Users


Qtrly Uses


Patented Claims

Other Applications

Privilege Access Manager (PAM) access.

It is not sufficient that the credentials to access a PAM are known; it is essential that only those with the proper training and need to access are granted access to the PAM.


When access must be controlled to a limited few, under tight constraints, BSI technology excels.


We restrict access to the human with both the knowledge and business need to access the PAM. 

Certified investment transactions.

If you must know "who" instead of "whose credentials were used" to execute an investment transaction; that is where our CVL technology excels.

Credentials generated with BSI technology can only be used by the same person that created them. This means that they can be used to certify who executed an investment transaction, or granted access to a record; without question.

POS signature transaction validation.

Beyond capturing an image of a signature to "show" in a receipt; imagine the power of adding a layer of security without adding a single step or incremental effort from every consumer.

BSI's CVL technology can be used in conjunction with most existing POS hardware so that while the consumer "signs" on the screen, a final identity check is completed, certifying that the person executing the transaction is the one and only person in the world who created the credentials and is the owner of the credit card.

Imagine the power and impact in stopping fraudulent transactions effortlessly.

Wet signature replacement.

Many "digital signature" solutions are a "certified true" picture of your mark. To be clearer, the picture of your signature adds no value; just psychological support.

BSI's CVL technology provides a level of security previously unavailable. We can assert that the signature that is shown was presented by the only person in the world that can recreate it; the person that originally created it.

  • PIN verification
  • Special transaction validation
  • Identity validation at brick-and-mortar locations
  • POS transaction validation.