●
An easy to deploy and use cybersecurity solution based on unique humans, not passwords, devices or data
●
A proprietary cybersecurity protocol that is used across the enterprise and third-party software
●
Cyber credentials that require only biometric parameters, guaranteeing the user's anonymity while providing safeguards against any personal data leaks or thefts
●
A person-to-person live video interaction tool to remotely create and confirm user identity for customer, employees, contractors
●
A next-gen Azure-based system consisting of an admin panel, a desktop app for end-user login, a mobile app and cloud infrastructure based on an IaC approach
●
Decentralized microservices that allow for quick and easy scaling and incremental changes
●
Cloud infrastructure services, including face recognition, backend processing, message queueing and storage accounts to receive authentication requests, perform face recognition and verify the identity of users
●
Integration with Microsoft Face API implemented as the first recognition service due to its better training approach compared with other recognition services studied
●
User authentication only with Face ID via an enterprise-side app
●
Secure data storage: after the creation of a user account, the system generates associated records without storing user personal information linked to the actual account
●
Secure data transfer from an enterprise-side app to the system
●
A mechanism to provide unique configuration for an enterprise with security by design
●
CI/CD pipeline with a customized Gitflow branching model on Azure DevOps for a consistent process to build high-quality software and automate delivery to selected environments
●
Azure App Service for provisioning, monitoring, updating and testing software in the complex microservices-based environment to keep backend apps reliable, highly available and fault tolerant