Authentication

Authentication

Whatever your business case is – if end users log into your web pages, you can use Identyum to securely and frictionlessly authenticate the end user and let her in. By using powerful and secure 2-factor or even 3-factor authentication (from token to biometrics), the...
Gaming

Gaming

Avatars and alternative profiles, combined with gamers’ high demand for anonymity, are a “standard feature” embedded deeply in the online gaming industry from its start. However, at the same time, online gaming platforms want to reduce the number of...
Age verification

Age verification

Most countries have laws about age limits under which the consumers are not allowed to view certain content (i.e., adult industry) or use certain features or services (i.e., gambling). ID document check is commonly used at the entrance in bars, while websites usually...
Medical industry

Medical industry

Collection of all personal and medical records needed for medical treatment of patients can be a long and cumbersome process. Mainly if the patient has visited several different doctors in different countries. Combining personal data in a patient’s digital ID...
Physical access

Physical access

Instead of using expensive custom solutions based on RF cards & readers for identification or, even worse, having security officers ask people for their identification documents at the entrance of secured premises (and writing those data manually in an access log...
Event registration

Event registration

Some events (like business seminars, fairs, football games, or concerts) require attendees to register for tickets with their name, or they even need more personal details (like age, residence, or similar). Currently, most online ticket-selling platforms do not have...