Uploaded on Mar 25, 2022
Anonybit protects your privacy and secures your assets with game-changing decentralized biometrics. Read this blog to know about Deciphering the Decentralized Biometrics Landscape
Decentralized Biometrics Landscape
Deciphering the Decentralized Biometrics Landscape
DecipheDreicnipgh etrhineg tDhe cDecnetnrtarallizedd B iBomioemtriecst Lraicndss cLaapnedscape
A storrmmi sisb brerwewinigngin inth ethied eindteitnytiintyd uisntdryu. sItriys. bIte iinsg bceaiunsge dcabuysaedtr ibfeyc ta torfifefacctoar sof-
fcaoncstuomrse r- dceosinresufomr emro rdeecsoinretr ofloorv emr othrei rcpoenrstoronla lodvaetar, tnheeveir epnedrisnogndatl adbarteac, hnees vaendr
elanckdionfgt rudsattian bourer aincshtietust ioansd’ albaiclikty otof tsreucusrte inan douprr oitnesctitouutriopnerss’o naabl iilditeyn ttitoie s.eOcuthrer
atrnendd sparroetealcsto coouarle spcienrgs-ornealeln tildesesnrtiisteieosf. diOgithaleirn tetraecntidonss ,aerme eraglesnoc ecoofaWleesbc3i,nNgF T-s
raenldencrtyleptsosc urrriesnec ieos,f anddigtihtae l usientoefrablcotcikocnhsa,in etemchenrogloegnycien goefn erWaletbo3s,t oNreFaTsn d ahnosdt
cdirgyitpatloccruedrreenntiaclise.sT,o agentdh etrh, eth euysea roef dbrilvoincgkcuhnapirne cteedcehntneodloggroyw itnh gaendnearcacle ptota nscteoroef
abinodm ehtroicsta sdtihgeitiarrl efcurteabdlenlitnikalbse. twTeoegnetahpeerr,s otnhaenyd tahreeir idreinvtiintyg. Thuenpqurescteiodneinstneodt
gwrhoewthtehr, bauntdh owac, tcoedpetpalnoycebi oomfe tbriicosminethtreiclasr gearsc otnhtex tirorfeidfuentatibtylem alninakge mbentwt. een a
pWeer’vseonp uatntodg etthheeirr tihdeetnatbiltey.b Telhoew qtouealsigtinonst aikse hnooldt ewrshoenththeer, dbifufetr ehnot wde, fitnoit idonespalonyd
bmieotmhoedtorliocgsie isnt hthate clanrgberc coonsnidterxetd o, fp aidrteicnutlaitryly masarnealagtesmtoendte.centralized identity and
Wdeece’vnetr aplizuetd tboiogmeethtreicrs .tIht ies btyabnolem beeanloswex htaou satilvige,nr asthtaekr,eithios lmdearnst otonc rtehaete dainffaenrcehnotr
donefithneitmioonstsi mapnodrt anmt teetrhmosdtohalotgariesc ritihcaltf orcsaynst embed ecsiognsthidaet reendha, ncpeasrotviceurallal rsleyc uraitsy
raenldapterost etcots pdercsoenatlrparliivzaecyd. identity and decentralized biometrics. It is by no
means exhaustive, rather, it is meant to create an anchor on the most
iFmeepl ofrreteatnotc otnetramctsu sthwaitth anrye sucgrigteicstaeld faodrd istiyonssteomr e ddites.sign that enhances overall
security and protects personal privacy.
Feel free to contact us with any suggested additions or edits.
Term Description Anonybit Relationship
Concepts and Frameworks
MPC is a technology that gives different parties
to a relationship the ability to compute data and Anonybit’s core architecture uses MPC to enable
arrive at a mutually desired result without Multi-party Computing (MPC)
requiring parties to the transaction to divulge
decentralized storage and processing of personal
data, including biometrics and other digital
their private data. MPC also uses complex assets.
encryption to distribute computation between
multiple parties or network nodes.
Zero-knowledge proof, also known as zero-
knowledge authentication, is a cryptographic Zero-knowledge proofs are used by Anonybit to
Zero-Knowledge Proof authentication protocol in which one party (the provide biometric authentication responses
prover) can prove to another party (the verifier) without recompiling or revealing the original
that a given statement is true without conveying
any additional information apart from the fact biometric data set.
that the statement is indeed true.
Personally identifiable information (PII) is
information that, when used alone or with other There is an increasing call to protect PII in the
relevant data, can identify an individual. There digital world because of the possible fraud
are various levels of personal information associated with compromising a person's
Personally Identifiable Information (PII) sensitivity within PII. Biometrics is a form of PII, personal information. Anonybit’s framework is
along with name, email address, device ID, designed to store all kinds of PII in a
location and other elements that are used to decentralized manner.
identify a person.
A distributed ledger is a peer-to-peer network
that doesn’t have a central administrator or
central database. This design is intended to Anonybit does not use distributed ledger or
increase network security and remove corruption
by replacing a single point of failure with a blockchain technology due to limitations around data processing, the need to be able to delete
distributed network of devices that work
Distributed Ledger (Blockchain) together to verify the accuracy of data. per privacy regulation, and performance issues. Rather, Anonybit’s patent-pending infrastructure
Distributed ledgers are usually associated with
blockchain technology but blockchain is just one relies on proprietary derivatives of MPC and Zero Knowledge Proofs to achieve the decentralized
use of distributed ledgers. Distributed ledgers are
very powerful to exchange trusted information storage and processing capabilities.
between unrelated parties while maintaining its
integrity, and possibly anonymity.
A digital wallet (or e-wallet) is a software-based
system that securely stores users' payment Anonybit provides a secure infrastructure for
information, passwords and other identity digital wallets and makes them accessible across
information, as well as cryptographic assets, devices. Anonybit also allows for the storage of
health information, and more. By using a digital the wallet’s contents in its decentralized digital
Digital Wallet wallet, users can complete purchases easily and asset vault and leverages biometric
quickly with near-field communications (NFC) authentication to protect the assets, ensuring
technology, present digital credentials, and share that only the right person is invoking them. This
their information at their own discretion. Digital reduces the risks of wallet takeovers by attackers
wallets are used by the payments industry, using stolen credentials (e.g. usernames and
cryptocurrency industry, self-sovereign identity passwords).
frameworks, and many more.
Decentralized identity
Decentralized identity, often used interchangeably with
“self-sovereign identity” (SSI), is an alternative to
centralized and federated identity infrastructures. With
SSI, credentials are managed in a digital wallet and are
verified using a public key that is anchored on a Anonybit secures the digital wallet where the SSI assets
distributed ledger. The SSI may be generated from an are stored. This ensures that the SSI is invoked only by the
Self-Sovereign Identity (SSI) issuer’s database (e.g., government, university, health authorized person and enables cross-device access to the
institution, social media account, etc.), but does not wallet’s framework. This is important if an individual gets
actually contain any personal information. The SSI can be a new device or is using a shared device.
used to interact with third parties at the sole discretion of
the individual. Personal data therefore does not need to
be transferred as individuals interact, however, the
issuer’s database may still be centralized.
Decentralized Identifiers and Verifiable Credentials make
up Self-Sovereign Identity. The DIDs are holders for the
Decentralized Identifiers (DIDs) and Verifiable Credentials digitized credentials themselves. When the VCs are Anonybit allows the issuer to associate a biometric to the generated by the issuing party, they are signed with a DID for use in downstream applications, ensuring that the
(VCs)
public key that is stored on the blockchain. When correct person is invoking it and allowing for easy someone wants to verify the authenticity/validity of the reissuance if the person gets a new device.
credential, they can check the blockchain to see who
issued it without having to contact the issuing party.
Decentralized biometrics is the process of splitting
biometric data into pieces and storing/distributing them
over different computers or nodes. Most decentralized
biometric schemes require that the pieces come back
together again for matching, which create performance
and security problems. As a result, the alternative has Anonybit leverages multi-party computing and zero-
been to use device-based biometrics which ensure no knowledge proofs in a proprietary manner to deliver fully
Decentralized biometrics central repository of the biometric data, but as noted decentralized biometrics and support both privacy and
elsewhere in this document and on the blog, this method security.
is easily circumvented. New breakthroughs
allow both the storage and the processing of the data to
be done in a distributed way, eliminating the tradeoffs and
problems seen with centralized and device-based
biometric approaches.
Identity Management
Identity verification (IdV) is an approach for verifying and authenticating
Anonybit integrates with the identity verification flow to enhance overall the physical identity of individuals onboarding to a digital application.
IdV is sometimes used for step up verification as well. It uses knowledge- identity assurance levels downstream. The biometric data that is
Identity Verification based user attributes and document verification to confirm that a person captured during the onboarding process is sent to Anonybit for sharding
and distribution throughout the peer-to-peer network and this same enrolling a service is who they say they are in the physical world. Part of
enrollment data is used for subsequent authentication and account
the process involves matching the photograph on the identity document
to a live selfie. IdV is typically used for onboarding digital applications and recovery in all future interactions with the service.
for KYC and AML compliance.
Passwordless authentication is a method that allows a person to gain
access to an application or network without the use of a password or
other knowledge elements (pin code, personal questions) . In many
cases, passwordless authentication methods rely on a biometric Anonybit provides turnkey passwordless authentication via cloud-based
signature that is tied to a cryptographic signature which gets sent to the decentralized biometrics. Because Anonybit is cloud-based, there is no
Passwordless Authentication authenticating service. Almost always, the biometric signature comes device dependency and the solution can be linked to the onboarding
from a local template that is stored on a user’s device (PC, smartphone or process for added security in downstream applications including account
external security token). Except in very specific cases, the authenticating recovery.
service does not manage the user’s device or the biometric identity, and
the fallback in case of account recovery or other failure is typically a
password or other knowledge-based authenticator.
One of the biggest challenges for providers of online services is allowing a Anonybit addresses the online account recovery by giving providers a
secure and accurate account recovery process. The need for account
recovery is driven by users losing access to their original credentials biometric trust-anchor with the user, to which they can tie any access to
Online Account Recovery the service. By providing cross-device biometric authentication that is
(“forgot my password”), and must account for risks of fraudulent online
attacks, lost or stolen passwords, lost or stolen devices, or compromise connected to identity proofing and fraud resistant, account lock-out and losses are securely prevented.
from insider threats.
Zero Trust is a security framework requiring all users, whether in or
outside the organization’s network, to be authenticated, authorized, and
continuously validated for security configuration and posture before Anonybit provides accurate, secure, and private biometric authentication
Zero Trust Security being granted or keeping access to applications and data. Zero Trust for access to digital applications. This authentication process can be
assumes that there is no traditional network perimeter; networks can be invoked at any time within an application or central authentication facility
local, in the cloud, or a combination of hybrid with resources anywhere such as single-sign-on (SSO).
as well as workers in any location
Multi Factor Authentication (MFA) is a method of user verification that
utilizes two or more unrelated authentication modalities that includes
something the user knows (password, pin, knowledge), something the
user owns (device, token, cryptographic key), and something the user is
Anonybit uses multiple biometric authentication modalities within its
Multi Factor Authentication (MFA) (physical biometric traits such as face, iris, fingerprint, voice, etc., as well framework, which are combined with device binding to create
as behavioral biometric). It is possible to combine passwordless decentralized, passwordless MFA.
authentication methods with other authentication methods to make up
MFA.
Anonybit can serve as a common anchor of trust across organizational
trust-domains by ensuring users are authenticating at the same high level
Federated Identity Management is an arrangement between multiple of assurance. The high assurance level is achieved by incorporating the
organizations or online services that enables their users to use the same Anonybit authenticator into the federated authentication flow. Through
Federated Identity Management identification data (digital identity) to access across their networks. These that, the trusting organization receives a consistent level of assurance
partners are also known as trust domains. A trust domain can be an across all its federated partners against a consistent, biometrically proven
organization, a business unit, a smaller subsidiary of a larger organization, trust anchor. With the ability to securely manage identities with the
etc. and are trusted by a similar organization called the Relying Party. Anonybit network, the architecture can support Federated Identity
Management by protecting the user's personal information across
multiple trust domains.
Comments