BioID Facial Recognition App with face login
Forget passwords. Be recognized.
How it works
The BioID facial recognition app needs to know how you look.
You introduce yourself to BioID by using the app to take a few pictures of your face (called biometric enrollment). This is as easy as taking a few selfies.
Now you are ready to be recognized.
After enrollment, BioID is ready to recognize you ('verification'). To see if BioID recognizes you, simply press 'Verify' on the app and take a selfie just like enrollment. Don't worry, our patented Fake Defender prevents hijackers pretending to be you by using your picture—this is a big advantage over other face recognition software that can easily be faked with a photo. Optional challenge-response to protect against video attacks can be enabled in your BioID account.
And now comes the magic.
The BioID app can also be used by other apps (inter-App communication) or websites, allowing you to gain access exactly the same way by simply taking a selfie—this is the face login.
Designed for Privacy
We agree that software must be simple to use, conveniently designed and use the highest security level that is possible.
But when talking about your biometric data more important is the protection of your data privacy. We are a German company and meet stringent German data privacy protection requirements. We take the protection of your data extremely seriously. After all, our software has been trusted for years by banks, enterprises and military.
In addition to following industry best practices for data security, we designed our biometric service with three key characteristics:
Anonymous: Your biometric data is stored anonymously with no other personally identifiable information such as your name or email address. We don't know who we are recognizing!
Irreversible: Our BioID Web Service stores no photos, only a template—an irreversible mathematical representation of your unique features that cannot be reverse engineered to obtain a photo.
Revocable: If you ever suspect your biometric might be compromised, you don't need plastic surgery. The service provider simply deletes the old template and re-enrolls the user under a new anonymous ID.