top of page

Banking

Protect company and employees, onboard customers, strongly verify identities, provide automated banking self-services, prevent AML, secure cash deposit & withdrawals while complying with strictest data privacy laws and PSD2, DORA, NIS2 regulations.

bank-entrance_edited_edited.png

Main Use Cases

Account opening, update and recovery​

  • Automate bank account opening and update in agencies by verifying passports/ID cards through the use of official document readers 

  • Re-activate bank account access by performing 3D facial verification in agency or though laptops with 3D webcam​ 

Bank self-services in agencies

  • Bring secure banking self-services through interactive kiosks such as account log-in, cash deposit or withdrawal,  national or international payments, account update, loan subscription or document signature.

Cash deposit or withdrawal at ATMs

  • Secure ATM operations like cash deposit or withdrawal by strongly verifying the customer, preventing AML frauds such as making small cash deposits in many locations the same day.

Electronic Signature

  • Enable customers to digitally sign contracts, or validate transactions by strongly verifying user's identity in agency or at home (through Premier Keys solution)

Secure access to safety deposit boxes

  • Enable customers to securely access safety deposit boxes by performing 2-factor authentication including  3D facial biometry and verifying bank card 

Secure log-in to electronic account on laptop

  • Secure web log-in to bank account through 2-factor authentication including 3D facial verification (Premier Keys solution) and prevent session hijacking 

Secure video-conferencing with customer

  • Establish secure video communication session between customer and banker by strongly verifying both parties with 3D facial verification. Enable document electronic signature during the video session. 

Secure access control 

  • Secure access control to staff, directors and partners by strongly verifying who is getting-in/out of the bank premises. 

  • Secure access to bank applications, laptops and server logins by using FIDO2 3D facial biometry solution and 3D webcam on laptops/servers (Premier Keys solution)

Key Benefits

User Experience

200 ms authentication journey, whereas standing at 35 or 100 cm distance from 3D camera.

No smiling, no head movements, no eyes blinking, no password, no pin code, no OTP, no security questions. 

Premium Security

Two-factor authentication relying on device - 3D facial biometry with >99.99% genuine identity assurance.

 

Resilient to photo/video deep fakes.

Strict Data Privacy

Comply with strictest data privacy laws including CNIL 2019-type 1, GDPR, nFDPA and CCPA where user totally controls her biometric template.

 

No biometric database. 

Integration

Low integration effort: solutions for laptops, servers, tablets or kiosks run on Windows, Linux and Android and connect to legacy systems such as access control, visitor management, HR, identity management, ERP systems through APIs.  

Sovereignty

Swiss software solutions,  technologies and company.

​

No foreign Cloud Act dependency.

​

Hardware solutions comprising key components manufactured in Europe.

Low TCO

Fixed licensing model per kiosk/month or per user/month with unlimited authentications.

 

Fast ROI in weeks or even days, with lower call center costs, FTEs, onboarding/authentication failures, setup fees.

Compliance

EU-PSD2-logo.png

Payment Services Directive 2 - EU 2015/2366

Strong Customer Authentication (SCA)

  • Multi-factor authentication (what you have + who you are)

  • Resistance to spoofing and replay attacks (photo-video deep fakes)

KYC and Identity Verification

  • Reliable customer identification and verification against trusted identity documents (passports, ID cards)

  • Secure onboarding process

  • Anti-spoofing, prevention against synthetic or fake identities through "3D live" detection

Data Privacy & Protection 

  • Encryption of irreversible biometric mathematical model template

  • Secure storage such as secure mobile application with data vault, Desfire Ev3 badge, encrypted QR code

  • CNIL 2019/01 - type 1 and GDPR strict compliance

  • No biometric database, no personal data

Auditability & Traceability

  • Secure access to payment services

  • Logging of enrolment and authentication events

  • Tamper-resistant audit trails

Fraud & Risk Management

  • Real-time detection of impersonation, spoofing and deep-fake attempts

  • Transaction monitoring with strong authentication of parties 

DORA-logo.png

Digital Operational Resilience Act - EU 2022/2554

ICT Risk Management

  • Secure control of physical and logical access to systems

  • Strong authentication for users, administrators, and operators

  • Segregation of access rights based on roles

Identity & Access Management (IAM)

  • Centralized and consistent identity verification across services

  • Strong authentication for critical systems and operations

  • Lifecycle management (onboarding, changes, revocation)

Operational Resilience & Availability

  • Reliable authentication even under stress or high load (unlimited scalability by design)

  • Reduced dependency on manual processes and human intervention

  • Support for on-premise and controlled environments

Incident Prevention & Detection

  • Reduction of identity-based attacks (credential theft, impersonation)

  • Protection against social engineering and account takeover

  • Early detection of abnormal authentication behaviour

Logging, Monitoring & Evidence

  • Event (JSON) logs suitable for incident analysis and regulatory reporting

  • Proof of authentication and access decisions

  • Support for audits and supervisory inspections

Third-Party & Supply-Chain Risk Control

  • Controlled physical and logical access for external users, contractors, and partners

  • Strong identity verification before granting system access

  • Reduction of shared credentials and unmanaged access paths

NIS2-logo.png

Network & Information Security Directive - EU 2022/2555

Secure Access Control Measures

  • Strong 2FA authentication for access to networks, systems, and services

  • Prevention of unauthorized physical and logical access

  • Elimination of weak credentials and badge sharing

Identity Verification & Trustworthiness

  • Verified identities for employees, visitors, and third parties

  • Assurance that access is granted to the right individual (not a device)

  • Protection against impersonation and forged identities

Risk Management & Secure Policies

  • Identity and access control integrated into security risk management

  • Elimination of human-factor vulnerabilities

  • Full automation to reduce operational errors

Incident Prevention & Impact Reduction

  • Limitation of attack surface through biometric-based access

  • Prevention of credential compromise and misuse

  • Faster containment through precise user identification

Monitoring, Logging & Accountability

  • Traceability of access to critical systems and locations

  • Logs usable for incident investigation and compliance checks

  • Clear accountability for access events

Data Security & Privacy Protection

  • Protection of personal and biometric template

  • Encryption and secure processing of identity attributes

  • Compliance with GDPR principles required by NIS2

bottom of page