Platform

How the platform works.

What Biofy does, why it is safer than storing biometrics, and how it fits the systems you already run.

PROBLEM

The problem with stored biometrics

Every conventional biometric system reduces a capture to a reference template and stores it. That stored template is, from an information standpoint, close to the biometric itself. A breach of the template store is therefore close to a breach of the biometric — and a biometric, unlike a password, cannot be changed.

SOLUTION

The Biofy approach

Instead of storing a copy of the biometric, Biofy derives a revocable credential from the capture. What is stored cannot be reversed to reconstruct the original. If the credential is ever compromised, it is cancelled and reissued — from the same biometric, without re-enrollment.

PROP / 01

One-way

No path from stored data back to the original biometric, under any efficient attack the academic community has found.

PROP / 02

Reliable

Biometric captures vary between sessions. The platform handles that variation without affecting accuracy or requiring re-enrollment.

PROP / 03

Renewable

Different services produce unlinkable, pseudonymous credentials from the same biometric. No service can correlate a user across tenants, and compromise in one context doesn't affect others.

PROCESS DIAGRAM
Capture
⋮⋮
Feature extraction
Key derivation
Credential
Protected store
Integrations

The platform exposes standard protocols so teams don't have to rewrite applications around it. Connect via API or hosted endpoint.

FIDO2 / WebAuthn● READY

Replace platform authenticator with a Biofy biometric credential.

OIDC● READY

Standard OpenID Connect provider with biometric assurance level.

SAML 2.0● READY

Enterprise federation for existing SSO tenants.

eIDAS● READY

Recognition within the European trust framework.

FIDO2 / CTAP2● READY

External authenticator profile for regulated workstations.

SCIM● READY

User lifecycle sync with identity providers and HR systems.

Compliance posture

GDPR Article 9

Special-category data treated as such — minimised, protected, and lawful under healthcare and employment bases.

ISO/IEC 27001

Information security management aligned to international standard; certification in progress.

ISO/IEC 24745

Biometric information protection requirements — irreversibility, unlinkability, renewability.

NSM grunnprinsipper

Aligned with the Norwegian National Security Authority's basic principles for ICT security.