❔
FAQ
Our answers to frequently asked questions
No, our anti-spoofing models detect these kind of attacks and block such authentication sessions.
Let's check high-level architecture diagram of Entry, focusing on the main concerns from the security and privacy perspective
- FaceDB: safe storage of personal sensitive data eliminates the risk of data leaks.
- User Management: user data (including PII) and user biometrics are separated.
- Clients and integrations: communications are encrypted and verified, all enterprise clients are compartmentalised.
.jpeg?alt=media&token=fb93697a-6e32-475b-ae2b-6194428ff6bc)
In majority of cases it is something simple - user id, email, name. User's biometrics never leave the vault at the back-end.
Even having full access to all databases does not allow a hacker to examine or steal someone else's biometric identity. One of the main privacy-preserving features is that you cannot trace individual biometric records to a particular person outside just by looking at the data. There are no credentials in the usual sense of the word, so there is nothing to steal from the DB that would potentially have value. The user management part stores external IDs that are meaningless by themselves — they merely provide the connection between customers and their hashed identification results.
There are plenty of them and while looking similar on the front underneath it is very different. First of all we do not use any special hardware, only webcam. Second is that face recognition is performed on the server. Third - it works on Android devices. You can read more about Entry tech [here](https://getxix.com/blog/how-xix-entry-changes-the-way-we-authenticate)
Sure, e.g. here is how we use it to authenticate into our gSuite
Last modified 8mo ago