Technology

Technology that creates unique, irreversible hashed-tokenized identities and facilitates secure, interoperable identity proofing – anywhere in the world, online and offline

logos

Evergreen Hash

What

Irreversible, hashed-tokenized identities

Why

The effectiveness of all identity data is maximized when it is rendered safe to use, store, and share.

How

Deep neural networks convert any identifying data into a unique, non-PII Evergreen Hash

technology-new-2

Security

  • The hashing process is irreversible
  • The Evergreen Hash is anonymized data
  • No biometric images or templates are stored

Interoperability

  • The identifying data that is converted into the Evergreen Hash can be updated over time
  • The Evergreen Hash architecture is compatible with any biometric modality
  • The Evergreen Hash can act as a pivot to external data that can be changed to reflect changes in data needs and access

Process

+

1. Capture data

In existing use cases, a “secure-selfie” video is taken and tested for liveness

2. Transform data into the Evergreen Hash

Data is irreversibly transformed into the Evergreen Hash. No semblance of the source data remains

+

3. Associate external data via pivot points

Link the anonymized Evergreen Hash to any desired data (e.g.: username) to facilitate one-to-one matching for future authentication

The Identity Lake™

What

Secure, interoperable identity proofing

Why

Zero-knowledge authentication provides security beyond that of siloed, legacy authentication systems that are prone to sensitive data leakage and fraud

How

Probabilistic AI predicts whether multiple Evergreen Hash came from the same face, without the need to store or share sensitive information.

technology-new-3

Security

  • Each “identity” in the Lake is meaningless in absence of a matching Evergreen Hash. Data that is not there can not be leaked

Interoperability

  • All Evergreen Hash within a modality are comparable regardless of origin
  • Private Lake partners can benefit from shared access while protecting proprietary intelligence by submitting zero-knowledge-proof queries to other Lakes within a Consortium

Process

1. Create Evergreen Hash

Irreversibly transform identity data and add external pivot points

+

2. Store and de-duplicate in the Lake

Match the Evergreen Hash against all others in the Lake to determine fraudulent identities and authenticate existing users

+

3. Match against the Consortium

Match the Evergreen Hash against other Lakes to maximize risk-prevention and streamline the customer experience across partner entities