Banking
Protect company and employees, onboard customers, strongly verify identities, provide automated banking self-services, prevent AML, secure cash deposit & withdrawals while complying with strictest data privacy laws and PSD2, DORA, NIS2 regulations.

Main Use Cases
Account opening, update and recovery​
-
Automate bank account opening and update in agencies by verifying passports/ID cards through the use of official document readers
-
Re-activate bank account access by performing 3D facial verification in agency or though laptops with 3D webcam​
Bank self-services in agencies
-
Bring secure banking self-services through interactive kiosks such as account log-in, cash deposit or withdrawal, national or international payments, account update, loan subscription or document signature.
Cash deposit or withdrawal at ATMs
-
Secure ATM operations like cash deposit or withdrawal by strongly verifying the customer, preventing AML frauds such as making small cash deposits in many locations the same day.
Electronic Signature
-
Enable customers to digitally sign contracts, or validate transactions by strongly verifying user's identity in agency or at home (through Premier Keys solution)
Secure access to safety deposit boxes
-
Enable customers to securely access safety deposit boxes by performing 2-factor authentication including 3D facial biometry and verifying bank card
Secure log-in to electronic account on laptop
-
Secure web log-in to bank account through 2-factor authentication including 3D facial verification (Premier Keys solution) and prevent session hijacking
Secure video-conferencing with customer
-
Establish secure video communication session between customer and banker by strongly verifying both parties with 3D facial verification. Enable document electronic signature during the video session.
Secure access control
-
Secure access control to staff, directors and partners by strongly verifying who is getting-in/out of the bank premises.
-
Secure access to bank applications, laptops and server logins by using FIDO2 3D facial biometry solution and 3D webcam on laptops/servers (Premier Keys solution)
Key Benefits
User Experience
200 ms authentication journey, whereas standing at 35 or 100 cm distance from 3D camera.
No smiling, no head movements, no eyes blinking, no password, no pin code, no OTP, no security questions.
Premium Security
Two-factor authentication relying on device - 3D facial biometry with >99.99% genuine identity assurance.
Resilient to photo/video deep fakes.
Strict Data Privacy
Comply with strictest data privacy laws including CNIL 2019-type 1, GDPR, nFDPA and CCPA where user totally controls her biometric template.
No biometric database.
Integration
Low integration effort: solutions for laptops, servers, tablets or kiosks run on Windows, Linux and Android and connect to legacy systems such as access control, visitor management, HR, identity management, ERP systems through APIs.
Sovereignty
Swiss software solutions, technologies and company.
​
No foreign Cloud Act dependency.
​
Hardware solutions comprising key components manufactured in Europe.
Low TCO
Fixed licensing model per kiosk/month or per user/month with unlimited authentications.
Fast ROI in weeks or even days, with lower call center costs, FTEs, onboarding/authentication failures, setup fees.
Compliance

Payment Services Directive 2 - EU 2015/2366
Strong Customer Authentication (SCA)
-
Multi-factor authentication (what you have + who you are)
-
Resistance to spoofing and replay attacks (photo-video deep fakes)
KYC and Identity Verification
-
Reliable customer identification and verification against trusted identity documents (passports, ID cards)
-
Secure onboarding process
-
Anti-spoofing, prevention against synthetic or fake identities through "3D live" detection
Data Privacy & Protection
-
Encryption of irreversible biometric mathematical model template
-
Secure storage such as secure mobile application with data vault, Desfire Ev3 badge, encrypted QR code
-
CNIL 2019/01 - type 1 and GDPR strict compliance
-
No biometric database, no personal data
Auditability & Traceability
-
Secure access to payment services
-
Logging of enrolment and authentication events
-
Tamper-resistant audit trails
Fraud & Risk Management
-
Real-time detection of impersonation, spoofing and deep-fake attempts
-
Transaction monitoring with strong authentication of parties

Digital Operational Resilience Act - EU 2022/2554
ICT Risk Management
-
Secure control of physical and logical access to systems
-
Strong authentication for users, administrators, and operators
-
Segregation of access rights based on roles
Identity & Access Management (IAM)
-
Centralized and consistent identity verification across services
-
Strong authentication for critical systems and operations
-
Lifecycle management (onboarding, changes, revocation)
Operational Resilience & Availability
-
Reliable authentication even under stress or high load (unlimited scalability by design)
-
Reduced dependency on manual processes and human intervention
-
Support for on-premise and controlled environments
Incident Prevention & Detection
-
Reduction of identity-based attacks (credential theft, impersonation)
-
Protection against social engineering and account takeover
-
Early detection of abnormal authentication behaviour
Logging, Monitoring & Evidence
-
Event (JSON) logs suitable for incident analysis and regulatory reporting
-
Proof of authentication and access decisions
-
Support for audits and supervisory inspections
Third-Party & Supply-Chain Risk Control
-
Controlled physical and logical access for external users, contractors, and partners
-
Strong identity verification before granting system access
-
Reduction of shared credentials and unmanaged access paths

Network & Information Security Directive - EU 2022/2555
Secure Access Control Measures
-
Strong 2FA authentication for access to networks, systems, and services
-
Prevention of unauthorized physical and logical access
-
Elimination of weak credentials and badge sharing
Identity Verification & Trustworthiness
-
Verified identities for employees, visitors, and third parties
-
Assurance that access is granted to the right individual (not a device)
-
Protection against impersonation and forged identities
Risk Management & Secure Policies
-
Identity and access control integrated into security risk management
-
Elimination of human-factor vulnerabilities
-
Full automation to reduce operational errors
Incident Prevention & Impact Reduction
-
Limitation of attack surface through biometric-based access
-
Prevention of credential compromise and misuse
-
Faster containment through precise user identification
Monitoring, Logging & Accountability
-
Traceability of access to critical systems and locations
-
Logs usable for incident investigation and compliance checks
-
Clear accountability for access events
Data Security & Privacy Protection
-
Protection of personal and biometric template
-
Encryption and secure processing of identity attributes
-
Compliance with GDPR principles required by NIS2
