Authentication methods based upon passwords were invented at a time when computing power was limited, expensive, and centralized. Veridex delivers authentication solutions that take advantage of today’s technology capabilities.

A Veridex user credential, by itself, cannot be used to identify any user and is useless to a hacker. The credential becomes useful only when compared to a hash that is independently generated by an authentication server. Characteristics observed through this comparison are used to uniquely identify a specific user.