Keyless Protocol
Keyless provides 1:1 authentication using a unique decentralized approach based on our patented Zero-Knowledge Biometrics (ZKB) technology. ZKB uses a cryptographic technique known as secure Multi-Party Computation (sMPC) that allows two parties to compute a function without revealing their own private inputs, ensuring complete privacy. As an organization that pioneered this technology for biometric authentication, Keyless can process biometric data in a zero-knowledge form, without accessing or storing the actual biometric data or Personally Identifiable Information (PII). This addresses previously intractable privacy concerns around biometric authentication.
During the authentication process, a ZKB biometric sample (taken for authentication) is compared against a pre-existing ZKB biometric template (created during enrollment).
This is how it works:
Enrollment: During enrollment, a biometric sample (e.g., a selfie) is processed on the user’s device and transformed into a zero-knowledge biometric template using sMPC. This template is then sent to the Keyless backend, where it is securely stored in encrypted format. No biometric information can be extracted by Keyless or by any other party from the zero-knowledge biometric template
Authentication: For authentication, the user’s current biometric sample is processed on their device and transformed into a zero-knowledge biometric sample. The resulting data is sent to the Keyless backend, where it is compared to the stored biometric template using our proprietary sMPC algorithm. During this process, Keyless does not have access to the user's biometric data. The result of this comparison is a decision indicating whether the sample matches the stored template.
This process ensures that no biometric data is ever exposed in its unencrypted form while the data is in transit, at rest, or in use. This allows Keyless to maintain privacy and security while enabling accurate 1:1 authentication.
In addition to an authentication decision (accept/reject), our matching algorithms output a cryptographic key that can be set during enrollment and used for various activities post-authentication. These activities include, but are not limited to, transaction signing, data decryption, and step-up authentication.
Keyless is used throughout the customer lifecycle—from enrollment and login to payments, step-up actions, and account recovery—to provide the highest level of biometric protection against account takeover fraud and phishing attacks, while also reducing customer support costs and improving the user experience.
Last updated