IT Consulting Services Procurement – Closed

IT Consulting Services Procurement – Closed

STATUS: CLOSED Scope of the procurement: IT Consulting Services ProcurementShort description: functional specification of Identyum NOW AI algorithms, architectural design of technological stack and algorithm coding.Publication date: 04.08.2021.Deadline for sending...
B LIGHT – IDENTYUM NOW

B LIGHT – IDENTYUM NOW

Full project name IDENTYUM NOW Project partners HAMAG BICRO – Lead beneficiary Identity Consortium d.o.o., Croatia – Lead partner Info3 d.o.o., Croatia – Partner Bancard Kft., Hungary – Partner About the project The project is funded by the...
Authentication

Authentication

Whatever your business case is – if end users login into your web pages, you can use Identyum to securely and frictionlessly authenticate the end user and let her in. By using powerful and secure 2-factor or even 3-factor authentication of your choosing (from...
Gaming

Gaming

Avatars and alternative profiles, combined with gamers’ high demand for anonymity, are a “standard feature” embedded deeply in the online gaming industry from its start. However, at the same time, online gaming platforms want to reduce the number of fake gaming...
Age verification

Age verification

Most countries have laws about age limits under which the consumers are not allowed to view certain content (i.e. adult industry) or use certain features or services (i.e. gambling). ID document check is commonly used at entrance in bars, while web sites usually...