+ All Categories
Home > Documents > Biometria - EN A4 - VU Security

Biometria - EN A4 - VU Security

Date post: 02-Dec-2021
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
5
Biometrics Solutions that authenticate peoples’ identities preventing identity theſt.
Transcript
Page 1: Biometria - EN A4 - VU Security

BiometricsSolutions that authenticate peoples’ identities

preventing identity the�.

Page 2: Biometria - EN A4 - VU Security

We use di�erent technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future.

Palm of the hand recognitionThe system can recognize unique features of the creases and circulation of the hand’s veins. It depends on the position of the hand and it only works if the user is alive.

Facial recognition Identifies key points within the face as landmarks, analyzes distances and depth, hair color and skin tones. Gestures such as a smile or a wink can be used to provide proof of life.

Voice recognitionAnalyzes the tone, cadence and volume of each individual’s voice to identify their unique features. It can also be used to provide proof of life.

Fingerprint recognitionRecognizes the fingerprint pattern, as well as the finger’s ridges and valleys depth, to identify the user.

Biometrics

How it works

Our biometrical solutions

Page 3: Biometria - EN A4 - VU Security

ExampleBiometrics are used to create a digital profile of the citizens, which allow them to make transactions and procedures, access their credentials and receive customized information.

Creatingdigital pro�le

Next

SmileFoto

Validation

The user starts the process signing up with a selfie and a photo of the

front and back of the ID.

Biometrics

Our biometrical solutions

VU has a framework with great integration capacities, which includes di�erent systems, such as Microso� and Cisco, among others.

It works with business intelligence technology, machine learning and Microso� Cognitive Services to optimize the onboarding process and reduce fraud.

Integration

Page 4: Biometria - EN A4 - VU Security

Biometrics

More than 200 million users around the world can make procedures and operations securely thanks to our biometrical solutions. These are some of the most significative cases:

Fraudprevention

Simplificationof procedures

Proofof life

Robustauthentication

Accountopening

NOSI

TOKEN

Modernization Secretariat, Presidency of the NationAllowed the Argentine government to enable new services for the citizens, such as 100% remote procedures and the possibility of carrying the driver’s license within a mobile app.

Buho BankThe solution adopted by Banco Hipotecario for their BuhoBank service allows clients acquire new services remotely through a secure digital identity validation process.

PrismaThe solution enables clients to make remote and secure operations anywhere in the world.

The biometrical solutions can be used as additional authentication factors, combined with other security measures such as digital signatures or tokens. They can be implemented for many uses in di�erent sectors.

Uses of biometrical authentication

Success stories

Page 5: Biometria - EN A4 - VU Security

Biometrics

VU is a cybersecurity company founded on the principle of providing trustworthy solutions for fraud prevention and identity protection, through user-friendly and frictionless experiences.

We developed a cybersecurity strategy based on the companies’ requirements, in order to help them handle successfully the security and fraud threats .

Fraud prevention. Through machine learning, the solutions detect, report and act in response to the dangers that might threaten the security of platforms, systems and apps. This way, the system prevents reputational damages and monetary losses.

Biometrics. We guarantee a frictionless experience thanks to the detection of voice and facial features, fingerprints and the palm of the hand. These unique features are used as robust authentication methods and can be combined with other factors such as mobile tokens or traditional passwords.

Risk management. Di�erent solutions guarantee the environment is protect through processes that identify, analyze and control threats that might put at risk the digital assets of the company.

Identity protection. Through Artificial Intelligence (AI), these solutions can validate the users’ identities to allow them operate digitally and remotely.

About us

Cybersecurity strategy


Recommended