Data captured is converted through a non-invertible one-way process, the end result of which is a proprietary template.  These templates recreate algorithmic versions of the face or voice matcher that is ‘in place’ at the time the data is captured.  

Templates are not able to be utilized with other versions in use nor are vendors able to share templates between each other, as they’re entirely proprietary and unique to each vendor.

A template cannot be used to recreate any approximation or facsimile of source data. 

It’s simply designed as a useful tool to see if the incoming data ‘matches’ its enrolled data, and has no purpose or role otherwise.  Therefore, hacking our platform is useless.   

To frame it clearly, if hackers successfully accessed our platform layers and obtained a template, it’s effectively useless without stealing our servers and all of the software on them, and then there’s nothing the they can do with it.  

Bad actors cannot recreate faces or voices from a template, this ensures end user data is secure and remains private. 

Securing end user data from any incursion is ‘baked into’ IdBase’s platform layers as our mission is to facilitate a better identity management solution wherever identity is mission-critical.