What is a Biometric Credentialing Device and How Does it Eliminate Fraud?

Share on facebook
Share on google
Share on twitter
Share on linkedin

Credentials aren’t a new thing. 

Every website that asks you for a password is credentialing your entry. It’s a form of authorization to keep unwanted traffic out of sensitive spaces. It’s an essential part of security. And, it’s been pretty easy to hack because phishing fools people to give away their passwords unknowingly, very easily.

Enter the biometric credentialing device (BCD™), a new level of authentication which uses characteristics unique to each individual in order to allow access to sensitive information or payment systems like credit cards.

Why Biometric Technology?

Security hacking of networks goes back as far as 1903, believe it or not, when, “magician and inventor Nevil Maskelyne disrupt[ed] John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium’s projector.

Security hacking of private devices is a more recent phenomenon, primarily because private and personal device use is a recent social development. Security on those devices is increasingly important. Who can forget the 2016 escapade involving a San Bernardino terrorist and ousted security software founder, John McAfee? McAfee claimed he could unlock the phone inside of twenty minutes.

While his recommendation to the FBI included disassembling the physical phone, then, unpacking the code to discover where the password was hidden, the incident illustrates how accessible our personal information really is.

Dismantling a device isn’t even necessary to enter it. In fact, last year an article covered 6 Ways to Hack Someone’s Phone Without Them Knowing

Thus, to make leaps in advanced credentialing that will 100% protect our information and assets, we need technology that is in many ways unhackable. 

How the Biometric Credentialing Device Works

ITBiometric’s Biometric Credentialing Device or BCD™ does things no technology has combined before—it reads 10,000 points of interest on a fingerprint and correlates them to confirm the user’s identity. Additionally, it’s verifying life, reading both temperature and pulse so only a living user can be credentialed. 

The credentialing device itself uses a combination of sensors—skin capacitance, temperature, and pulse—and then quickly encrypts and synthesizes it into a signal or electronic signature.

“If you’re dead and your temperature is below 96°, the device simply won’t open,” shares our Founder, Howard Prager. He continues, “But, say you’re unconscious and someone tries to force you to open your device by pushing your finger down on it, they won’t know which finger you use for that device. We’ve even introduced a panic finger setting where, if the wrong finger is used to unlock the device, additional security measures kick in. 

“And say you lose your device, then you can use your ‘seed file” (a file that stores all your biometric data) to restore all your keys on a new device, restoring everything you had saved on the lost device with your correct fingerprint.” 

Every biometric credentialing, your encrypted identity location on a blockchain is confirmed, using a secure protocol developed by a consortium involving Google, Microsoft, Apple, all the credit card companies, most banks, called FIDO2.

The BCD™ Can Prevent Hacks and Fraud

Many large theft hacks occurred when hackers tracked highly trafficked public keys to find big money holders’ private keys worth hacking. With the BCD™ we systematically change the public key of high-volume users keeping them below the radar and out of harm’s way. This condition, prevalent wherever a cloud-based server is used as a custodian to protect people’s crypto holdings, is ameliorated with a BCD solution.

“Additionally, we’ve designed our systems so users will secure their capital from user error. Dyslexia has lost countless digital dollars. But our software could very easily prevent that problem by eliminating manual data entry by using the currency algorithm to set the private key.”

Anyone who’s ever suffered identity fraud (or anyone who doesn’t want to) will immediately see the value of this layer of security. 

By eliminating the need for physical credit cards, passwords for logging into websites, monitoring your public key, the BCD™ can prevent identity theft fraud. And make things way more convenient. Imagine logging into your favorite websites in only 0.55 of a second! Also using your Visa or Mastercard in only 0.55 of a second! In both cases, you won’t have to type any information like you are used to doing, because the BCD™ will have it, and deliver it for you, upon your fingerprint command! Because you can enter websites and make purchases so much more quickly, the convenience will mean more sales for the web hosts. And the consumer gets the benefit of preventing his identity from being stolen because there is no password to phish.

With this layer of security on all your apps and with many of your investments in banking, social, etc., it’s finally possible to have peace of mind about the security of your finances and your personal data.

If you’re interested in a BCD™ we highly recommend that you get on the waitlist on our website. In addition, if you’re an investor, we are conducting a Reg D investment opportunity on our entire product line, which you can learn more about on our investor page.  

As the world moves toward heightened personal security, technology will inevitably shift to personalized encryption based on our unique signature. We’re early to market with this technology, initially ready for the Android platform (Apple pending), and are currently talking to potential investors through our site. 


We’re happy to help! Contact us any time

More to explore

What is Liveness Detection?

Proof of life.  It’s verifying that biometric data is being provided by its living source, not mimicked in some way.  “It’s an anti-spoofing mechanism where

Read More »

This website uses cookies for functionality, analytics and advertising purposes as described in our Privacy Policy. If you agree to our use of cookies, please continue to use our site.