Downloadable computer software specifically for biometric identity verification using palm vein, facial recognition, and liveness detection technology; Downloadable software for cryptographic key pair generation and management for identity authentication; Downloadable mobile application software for passwordless authentication using device-specific fingerprinting and zero-knowledge proofs; Downloadable software development kits (SDKs) specifically for implementing multi-factor authentication with mobile threat detection capabilities in banking and financial services applications
Electrical and Scientific ApparatusIdentity verification services for financial transaction authorization; Fraud detection services specifically for banking and financial services; Electronic verification of identity for payment processing and financial compliance; Authentication services for preventing financial fraud in banking transactions; Issuance, acceptance and orchestration of digital identity credentials and attestations for use via electronic wallets; Generation and management of QR-based credentials and communications for customer engagement within electronic wallets
Insurance and FinancialSoftware as a service (SaaS) featuring software specifically for biometric identity verification and anti-money laundering (AML) compliance in regulated financial industries; Platform as a service (PaaS) featuring software for know-your-customer (KYC) verification using government document authentication and liveness detection; Providing temporary use of non-downloadable software for creating cryptographic private-private key pairs for deterministic authentication; Identity verification services using biometric technology for banking and financial services compliance; Identity intelligence platform that provides an aggregate view of identity events across an ecosystem, providing visibility into user behavior and risk; Orchestration of identity events and workflows across consumer lifecycles in an organization, incorporating verification and authentication; Provision of continuous identity assurance through ongoing identity authentication and risk signals monitoring; Providing a secure communication protocol that creates a secure, encrypted communication tunnel between electronic devices, facilitating trusted interactions
Computer and Scientific