Digital Identity

Easily verify and protect identities

Prevents phishing attacks, pharming and identity theft with a system of multi-factor authentication, biometrics, and credential management of both internal and external users.

Prevents phishing attacks, pharming and identity theft with a system of multi-factor authentication, biometrics, and credential management of both internal and external users.

Group (13) (1)
  • Validates identity remotely with active and passive proof of life and anti-spoofing filters
  • Optimizes technical and human resource allocation and cost
  • Supports inclusion by increasing user conversion in remote areas
  • Decreases users-side transaction costs
Group 4

Authentication Management

Protect your client’s information with a robust authentication strategy for remote access to applications, services, and transactions.

Identity and Access Management Server

bullet
Manages User Identity
bullet
Supports a combination of multi-factor authentication methods
bullet
Flexible, simple, and personalized on-premise and cloud-based integration
bullet
Centralizes user, password, and tracking policies
bullet
Avoids phishing, pharming, identity theft attacks, and more
bullet
Implementation may be done on any system or platform, regardless of language, through Web REST or SOAP services
bullet
Default methods allow you to: Enable and disable users and authentication factor types. Validate credentials. Eliminate users and user authentication types from the platform. Modify and assign passwords of users on the platform. Add Access Control Service groups Create, activate, validate, block, and unblock users. Deactivate authentication factors for specific users. Provide OTPs (one-time passwords). Monitor the status of a user. Analyze and validate transactions, events, and fingerprints.

Multi-factor Authentication

bullet
Integrate Authentication Management functionalities with Android and iOS mobile apps through our applications or with native, hybrid, and web SDKs.
DId2

Onboarding Management

Manage the lifecycle of a citizen in the digital transformation process. It is customizable and modular, enabling each user to select the functionalities that they want to incorporate into each stage of the process, adapting to each business model. Works together with identity theft protection and its remote authentication modules.
  • Facial
    Recognition

  • ID

  • Voice
    Recognition

  • Fingerprint
    Recognition

  • Conduct user authentication processes by evaluating unique facial features: distances, depth, shape, colours, and skin layers, among others
  • Authenticate identity by recognizing gestures and movements like a wink or a smile
  • Compare selfies with personal identification, evaluating in real time with 3D cameras to avoid forgeries
  • It can be run on a second level to avoid inconveniencing the user with complex validation processes
  • It is multi-platform and can be integrated with Microsoft and Cisco Systems
  • Can be used in websites, ATMs and both mobile and web applications without the need for an agent to install it
  • Authenticate user identity remotely with identity document scanning and a selfie
  • Manage the lifecycle of a citizen during the process of digital transformation
  • It is personalizable and modular, allowing each user to select the functionalities that they want to include in each stage of the process, adapting to each business model
  • It is a complete and scalable software solution that easily integrates with the client’s existing system
  • It integrated with government agencies to permit validation of certain aspects of citizen identities
  • It offers different options to integrate into applications, web portals, and chatbots
  • Guarantees that the person accessing the system or service is whom they say they are, is alive, and is able to identify themselves
  • Uses phrasal verification algorithms and identifies and produces proof for each operation
  • Applies MFCC and DTW for audio analysis. MFCC separates relevant sounds of the audio, discarding those that are counterproductive to recognition. DTW measures the similarity between two samples.
  • Extracts the user’s voice specifications using unique and unrepeatable phrases
  • Allows for the selection of a unique identifier phrase, repeated in various ways in order to recognize voice patterns
  • Fast and straightforward multi-platform implementation in any technology ecosystem with extensive integration abilities though SOA, Radius, Active Directory, or by using its own exclusive database
  • Includes a web console that allows for remote management
  • Simple and efficient integration interface
  • Uses fingerprints to authenticate identities remotely
  • Integrates with any technology ecosystem because of its multi-platform support
  • Supports different fingerprint formats: WSQ (standard used by the FBI), ANSI 378, and JPG
  • Ready to be used with Docker
  • Can cross-reference fingerprints with government authorities

Facial
Recognition

  • Conduct user authentication processes by evaluating unique facial features: distances, depth, shape, colours, and skin layers, among others
  • Authenticate identity by recognizing gestures and movements like a wink or a smile
  • Compare selfies with personal identification, evaluating in real time with 3D cameras to avoid forgeries
  • It can be run on a second level to avoid inconveniencing the user with complex validation processes
  • It is multi-platform and can be integrated with Microsoft and Cisco Systems
  • Can be used in websites, ATMs and both mobile and web applications without the need for an agent to install it

ID

  • Authenticate user identity remotely with identity document scanning and a selfie
  • Manage the lifecycle of a citizen during the process of digital transformation
  • It is personalizable and modular, allowing each user to select the functionalities that they want to include in each stage of the process, adapting to each business model
  • It is a complete and scalable software solution that easily integrates with the client’s existing system
  • It integrated with government agencies to permit validation of certain aspects of citizen identities
  • It offers different options to integrate into applications, web portals, and chatbots

Voice
Recognition

  • Guarantees that the person accessing the system or service is whom they say they are, is alive, and is able to identify themselves
  • Uses phrasal verification algorithms and identifies and produces proof for each operation
  • Applies MFCC and DTW for audio analysis. MFCC separates relevant sounds of the audio, discarding those that are counterproductive to recognition. DTW measures the similarity between two samples.
  • Extracts the user’s voice specifications using unique and unrepeatable phrases
  • Allows for the selection of a unique identifier phrase, repeated in various ways in order to recognize voice patterns
  • Fast and straightforward multi-platform implementation in any technology ecosystem with extensive integration abilities though SOA, Radius, Active Directory, or by using its own exclusive database
  • Includes a web console that allows for remote management
  • Simple and efficient integration interface

Fingerprint
Recognition

  • Uses fingerprints to authenticate identities remotely
  • Integrates with any technology ecosystem because of its multi-platform support
  • Supports different fingerprint formats: WSQ (standard used by the FBI), ANSI 378, and JPG
  • Ready to be used with Docker
  • Can cross-reference fingerprints with government authorities
DI3

Digital Identity

Digital Identity

DI3
Validate client identities remotely
Provide a wide array of methods to register, generate, and validate multiple authentication factors
Ensure the continuity of your security strategy in the event of the loss, theft, or the inability of the user to use their chosen authentication method
Prevent phishing, pharming, identity theft, and more

Learn more about VU's Digital Identity solution

Frame 3512

Digital Identity management of both internal and external users

VER MÁS
lightbulb 1

A complete and scalable software solution that easily integrates with your system

VER MÁS
agile 1

A simple, flexible, and customizable setup to implement a cloud-based second factor system on any device with internet access

face-recognition 1

Remote identity authentication with a selfie and an identity document scan including data extraction by way of a barcode, MRZ code, or OCR (ID, DNI, and credit card scan)

How does it work?

Remote authentication
Remote identity authentication through voice recognition, fingerprint scanning, or face recognition paired with an identity document scan.

Control
Mitigate risks by controlling access to your organization’s resources.

Double authentication
Transactions approval on devices, by combining a password with a second authentication factor: a token that the user can access via SMS, email, push notification, or a mobile app.

Integration
Integration methods with government entities to enable the proven validation of aspects of citizen identities across different countries.

Digital Identity's Main Features

Would you like to learn more about
Digital Identity?

Please fill out this form, so that we can provide proper advice.