Dematerialize traditional forms of identity into a mobile identity badge.
Traditional forms of ID are costly and cumbersome to manage, and fail to prevent identity-based fraud and cybercrime because they are easily lost, stolen, and counterfeited.
Usher mobile identity converts traditional ID forms into a single identity “badge” that contains all of the credentials of the traditional forms of ID while avoiding their weaknesses.
Link the mobile identity to the owner.
Biometrically linked to the owner.
Usher links the mobile identity biometrically to its owner using the smartphone’s sensors as biometric readers. This ensures that the owner is the only person who can use the mobile identity.
Cryptographically linked to the phone.
Usher also links the mobile identity cryptographically to the specific phone, making it the only device that can offer a user’s identity to other people and systems.
Extend biometric mobile identities to every application and business process.
Extensive identity interactions.
Usher can extend the biometrically-validated identity to a wide range of enterprise systems, enabling users to validate IDs, access applications, unlock doors, and authorize transactions.
Usher’s unique out-of-band architecture never sends identities directly from the mobile device. Instead, users “present” their IDs by authorizing Usher’s secure servers to send their IDs through an encrypted channel.
Deliver identity as an enterprise-caliber utility.
A complete enterprise system.
Usher Vault, Usher Intelligence, and Usher Manager provide a suite of tools to monitor, control and secure the entire Usher system.
Building on existing identity repositories.
Usher connects to existing ID repositories and single sign-on systems, allowing enterprises to leverage their investments in those systems and to continue using them as their identity systems of record.