Our patented technology creates tokenized identities (using a proprietary EgHash™ architecture) from any modality or source allowing comparison of like-modality templates from different sources, and breaking vendor lock-in.
Our immutable EgHash™ is created using a one-way transformation, isnot-PII and is “anonymized data” under legislation such as GDPR. Using our hashing to create digital identities protects against databreaches and allows controlled data sharing as only our AI can create a probabilistic zero knowledge proof as to whether two EgHash™ originated from the same person.
Our EgHash™ can also act as a pivot to unlimited externally stored data and using pivot tables, the linked data and access permissions can be changed to reflect changes in data needs and render data access “self-sovereign”.
Combined with proof of life and other presentation attack detection AI’s, our hashing process identifies duplicate and synthetic identities that pass siloed KYC/AML/onboarding processes.
The EgHash™ can be stored on-premises and/or in the cloud and/or in a blockchain or other distributed ledger, or even on the originating device. To counter fraud, the EgHash™ can be stored or copied to a shared Identity Lake™ and/or used to service zero-knowledge-proofs.
Whether you need to onboard new users, provide access to existing accounts, authenticate for higher risk transactions, identify persons-of-interest, or create identities for undocumentedor thin-file subjects, our hashing technology will work with your existing and future authentication modalities to provide an unparalleled level of efficiency and security for your identity programs.