Multilayer security. Zero stored credentials.

Entry uses hardware identity, application, and biometric information to construct single-use keys that are destroyed after every transaction.

How Entry verifies a human.

Entry combines multiple layers of verification into a single authentication event. Each layer reinforces the others, ensuring that access is granted only when the system is certain a real, authorised human is present.

Device identity

Entry creates a cryptographic fingerprint of the device hardware, OS, and configuration. Requests from unregistered devices are rejected.

Liveness detection

iBeta Level 2 certified. Active and passive challenges confirm a live, present human — defeating photos, videos, masks, and deepfakes in real time.

Biometric verification

The live capture is matched against the user's enrolled biometric profile, stored in secure, individually encrypted accounts.

Single-use key generation

A unique AES-256-GCM encrypted key is generated for the specific transaction — bound to the verified identity, device, and action. Destroyed immediately after use.

Transaction binding

Each key is tied to a specific action — a payment, a login, an access request. It cannot be reused for a different transaction type or amount.

Forensic audit trail

Every verification generates a complete, tamper-proof record: who, when, what device, what transaction. Geo-location logging is available where configured by the calling application.

Independently verified.

iBeta Level 2

ISO 30107-3 compliant liveness detection, independently tested against presentation attacks.

AWS FTR

Foundational Technical Review for security, reliability, and operational excellence.

GDPR - POPIA Compliant

Full compliance with applicable data protection regulations. Data processing agreements available for all deployments.

See the architecture in action.

Book a demo to see Entry working in your environment.

Book a Demo