Press Release

Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key Infrastructure and eID Solution

Groundbreaking technology integrates Post-Quantum Cryptography and SSL security for the next generation of Face-based eID solutions and Face-protected Digital Public Key Infrastructure (DPKI)

Seventh Sense, a pioneer in advanced cybersecurity solutions, announces the launch of SenseCrypt, a revolutionary new platform that sets a new standard in secure, privacy-preserving identity verification. SenseCrypt introduces a first-of-its-kind face-based public key infrastructure (PKI) and electronic identity (eID) solution.

This cutting-edge innovation combines Post-Quantum Cryptography (PQC)* — designed to withstand the security threats posed by future quantum computing—with the trusted SSL technology that secures websites worldwide. As the demand for secure identity verification systems rises, SenseCrypt offers a comprehensive solution that tackles both privacy and security challenges.

Transforming QR Codes, Face Verifiable Credentials, and Face-protected Encryption

At the core of SenseCrypt is a fundamental shift in the identity paradigm to the realm of cryptography. Instead of traditional methods that rely on storing and matching biometrics, SenseCrypt eID utilizes acts of encryption and decryption for registration and authentication, with no public/private keys stored anywhere. 

This patented approach generates eIDs as encrypted raw bytes, known as SensePrints, which can be printed as QR Codes on various identification mediums including ID cards, documents, and birth certificates, or stored in NFC chips or databases. This unique feature allows for offline verification capability, making it adaptable to various environments.

Unlike other solutions available in the market, the QR codes generated do not contain any biometric data. This means that even in the event of compromised keys, no biometrics or personally identifiable information (PII) is at risk, significantly reducing the regulatory and compliance burdens associated with data breaches.

Unmatched Verification Accuracy

SenseCrypt has a verification accuracy that is unmatched in the industry, with a False Accept Rate (FAR) of 0 with a False Rejection Rate (FRR) of below one percent (<1%)**. For governments, ID providers, and security-focused organizations, even a FAR as low as one-in-a-million (1e-06) is unacceptable when performing millions of verifications daily.

The foundational features of SensePrints include:

  • Privacy-preserving and Non-biometric: No biometric data is stored
  • Biometrically verifiable: Only the eID holder’s live face can decrypt the eID attributes
  • Revocable and renewable: Multiple SensePrints can be generated from the same image and with the same metadata. While users cannot change their face, they can change their SensePrint
  • Offline verifiable: SensePrints can be verified completely offline
  • Incomparable and Unlinkable: No biometric data is stored, making it impossible to compare and link if two SensePrints belong to the same individual
  • Group verification capable: A single SensePrint can verify multiple users
  • Irreversible: The absence of biometrics prevents Hill Climbing or face regeneration attacks
  • Non-repudiable: Each SensePrint is signed by the issuer, allowing verification via the issuer’s root certificate public key

Advancing Security with Face PKI

While SensePrint eID requires the holder’s live face to be present at every transaction, Face PKI allows verifiers to conduct transactions without ever seeing the holder’s face or processing any biometrics. This is achieved through the generation of Face Certificates for specific purposes, such as login, eKYC, and more. These certificates are standard X.509v3 certificates that use a face-derived public key, signed by a trusted issuer. A user can have any number of Face Certificates, each with a unique public key for specific purposes.

Face PKI not only enhances traditional security measures but also unlocks new potential use cases such as file and document signing, encryption/decryption, eKYC, passwordless login, proof of presence, secure communication, and multi-factor authentication (MFA).

Decentralized Identity with Distributed Ledger Technology Protocol (DLT Protocol)

SenseCrypt Face PKI supports various scenarios but relies on a central root of trust. For those preferring a decentralized model and identity wallets (Self-Sovereign Identity), the SenseCrypt DLT Protocol brings all the capabilities of Face PKI to the blockchain. 

This innovative protocol enables issuers to verify wallet holders without transferring or storing any biometrics on the blockchain or inside wallets, ensuring user privacy through Zero Knowledge Face Proofs. Similarly, verifiers receive cryptographic proof that the wallet’s legitimate owner is making the Verifiable Presentation, not someone using a stolen wallet.

* With the NIST’s standardization of PQC published in August 2024, SenseCrypt Face PKI supports both FIPS 203 – ML-KEM Standard and FIPS 204 – ML-DSA Standard. https://www.whitehouse.gov/oncd/briefing-room/2024/08/13/fact-sheet-biden-harris-administration-continues-work-to-secure-a-post-quantum-cryptography-future/

** Measured on a proprietary identity dataset of >50 million

About Seventh Sense

Seventh Sense is a Singapore-based deep-tech company, tackling complex challenges at the intersection of machine learning and cryptography. Its mission is to deliver next-generation identity technology to governments and organizations, supporting both centralized and decentralized systems. The company’s stakeholders include government organizations and bodies from both Singapore and Australia.

For more information, readers can please contact:

  • Product Licenses: sales@seventhsense.ai
  • Careers: careers@seventhsense.ai
  • Investor Relations: ir@seventhsense.ai
Contact

Communications Manager
Shruti Singh
Seventh Sense AI
shruti@seventhsense.ai

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…

2 days ago

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…

2 days ago

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…

2 days ago

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…

2 days ago

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks

Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…

2 days ago

Beware! Fake Crowdstrike Recruitment Emails Spread Cryptominer Malware

CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…

2 days ago