PIDaas usage

The use of PIDaaS will change the scenario for authentication processes and user’s data management both for users and companies offering mobile and cloud services:

  • Users will be able to create securely bioidentities within their mobile devices.
    They will upload these bioidentities to the PIDaaS Server with the confidence that no biometric raw data is shared. Once the bioidentities are stored on the PIDaaS server, users will be able to select which mobile services are going to be authenticated through them to perform secure authentications.
    Users will be able to set expiration-dates for the validity of bioidentities as well as immediate cancellation of its use.
    All thes functionalities are enabled using the bioidentities provided by BTPS technologies, with the benefit of assuring the security and privacy of the data, and avoiding cross-matching between services. This control will be executed either from a PIDaaS User Control App in the mobile device or from a PIDaaS User Control Website.
  • for mobile/cloud services developers, PIDaaS will be an easy-to-integrate toolkit, which allows an effortless integration of biometric authentication, identity assurance and user’s personal data management within their process. This toolkit will give service providers the possibility of perform a biometric authentication processes themselves or delegate the authentication to a third party who has implemented the PIDaaS-verification service.

Target users

Two target users groups have been identified: end-users and intermediary entities (service providers). The first one refers to all the individuals using the PIDaaS system for authenticating themselves against an application or service using a smartphone; the latter one refers to all the web services providers that can potentially  integrate PIDaaS into their applications and systems.