auth1Meet Emily, she could be an intern at a software company or an assistant at a manufacturing facility that makes parts for the power industry. Unfortunately she is actually the sister of a person employed at a competitor company, and for the past two months has copied your passwords and forwarded your files from your system.

auth2Meet Billy, he comes over to your house to do homework with your teenagers in the evenings. His interests are football, sports cars and new gaming software. While you are out with the wife for an anniversary dinner, Billy is accessing your corporate accounting system from your home office using the entry password he captured weeks ago.

The largest threat faced by organizations is often not from external unknown sources, but from employees or those within a close circle of friends and colleagues. Damage from insider threats can cause financial losses, proprietary information leakage and even deadly equipment failure in manufacturing and infrastructure.

Meet Jimmy, he works as a cashier at a mailbox and shipping store. One of his customers stopped by to drop of some packages for shipping, the cost was $47.52 US which he paid by using his chip equipped debit card. When his work day ended he went online and with the customers information ordered $151.30 US worth of groceries for delivery.

Meet Mary, she was invited to a party with a friend last Saturday. The owners of the home were cooking in the back yard and using the pool. On a trip to the bathroom Mary went through a wallet and took a credit card, left the party and went to an electronics store. The charge for a new tablet appeared on the card holder’s account before they finished eating.

Financial transactions are initiated by a combination of a card, pin number or other authentication process using information entry on a website or kiosk screen. System weaknesses exist due to a lack of verifiable and shareable human identification, low vigilance by card holder’s and vendors, and endpoint systems that have no method to verify that person with the card or data is the registered account holder.

Persistent Identification builds a cyber DNA profile of the user from biometric testing and digital profile sampling at the initial point of introduction, a Cyber Identity is then created which can be continuously authenticated across any system. The Cyber Identity data is closely held on a recognized endpoint providing a low latency response, overcoming compliance and network issues with centralized data structures. Out of bounds behavior is immediately policed with challenge response techniques and forensic administrative tools. Threat detection and prevention is further strengthened by the addition of device identification and authentication technology that tethers an application to a specific endpoint, and information gathered from on-device actions can be used to monitor and control system or network activity without the need for directly handling sensitive information.

innerCore Persistent Identification relies on several proprietary technologies including non-linear conditions based DNA triggered encryption, ALIDS distributed data silos, Eidetic Data Exchange and Endpoint Verification Sensors. innerCore technology partner solutions are blended to provide facial and voice recognition, stress analysis and digital life profile data.  innerCore can configure the Persistent Identification solution for any application including cloud, consumer device, retail and embedded systems.