Mobile Framework/SDK

Flexible and Secure Mobile Authentication

 

Capture FaceDaon’s IdentityX Mobile Framework/SDK allows customers to take advantage of a broad assortment of authentication options, right from their smartphones and tablets.

Our Mobile Framework/SDK lets you integrate IdentityX into your mobile apps to incorporate:

  • Something you have (your unique mobile device)
  • Something you know (a PIN/ passphrase)
  • Something you are (multi-modal biometrics such as face and voice)
  • And even somewhere you are (GPS)

Multi-factor fusion ties all of this together to attain the greatest authentication fidelity available today. The Mobile Framework/SDK functionality is typically embedded within your organizations own application to prove identity when performing online transactions, whether on a home computer or a mobile device.

Powerful Out-of-Band Security

If the user is accessing a protected application from their laptop, then the Mobile Framework/SDK uses a separate out-of-band (OOB) communication channel to validate their identity. Depending on how much security is desired for a specific action, the user may be asked to use their phone to enter a PIN, take a picture of their face for image matching, or speak a short phrase for biometric voice comparison.

Simultaneously, cryptographic keys ensure the validity of the user’s registered mobile device while the user’s location is approved (e.g., close to corporate headquarters or within a certain legal jurisdiction).

Powerful Embedded Security

Daon’s IdentityX Mobile Framework/SDK is especially powerful when dealing with transactions made directly on the mobile device. Some competitors simply rely on the second OOB communication channel to authenticate the user by sending an approval request to the user’s mobile phone. This approach is dangerous if the consumer is authenticating on the same mobile device being used to request the transaction.

IdentityX Mobile Framework/SDK

The Mobile Framework/SDK provides powerful alternatives for mobile transactions through its many available security layers. An organization might choose to allow the user to select “Accept” on their mobile phone if they initiated the transaction on their home computer, while requiring either a picture of their face or a sample of their voice for transactions made directly on the phone.