California-based Armor Scientific this week announced that it has emerged from stealth mode with an identity and authentication platform that combines wearable hardware and patent-pending middleware components.
The solution is named Armor Platform and it has been described by the company as a “stringent security system” that can be used in the law enforcement, military, government, finance, healthcare, and first responder sectors.
The Armor Platform’s main component is a digital identity token that uses biometrics, proximity and location for authentication. The token includes fingerprint biometrics and ultra-low-power GPS tracking.
Users can opt for a dedicated “no touch” token, a “touch” token, or they can use an application installed on their smartphone. These are the platform’s Air Armor components, which communicate with the Endpoint Armor components.
The Endpoint Armor is installed on connected devices and it listens for proximity-based communications from Air Armor gadgets and backend communications from Identity Armor. Identity Armor is a cloud or on-premises hub for endpoint connection, authentication and workflow execution.
A behavior analytics component leverages artificial intelligence (AI) and machine learning (ML) to calculate trust and risk scores both before and after access is granted. Proprietary blockchain technology and cryptographic keys are used to add users and devices as a node to an assurance domain.
Armor Scientific has emerged from stealth mode after five years in which it has tested and improved its products based on feedback from over 100 projects in the government, healthcare, banking and logistics sectors.
Use case scenarios described by the company include hands-free, proximity-based access to restricted point-of-care systems in healthcare organizations, automated login and proximity or location-aware access to critical enterprise or government systems, location tracking for first responders and law enforcement, an authorization mechanism for financial transactions, and geographically tying users to devices for identity assurance.