The World's First


aiThenticate's aiDX3 biometric technology does everything Apple's Face ID does...

Only... it does it a lot smarter, it does it a lot better, it does a lot more

And it does it on any device


Using advanced (proprietary) deep science techniques, computervision researchers from aiThenticate Cognitive Computing Labs successfully managed to develop a revolutionary new biometric: Neural Biometric

aiThenticate’s Neural Biometric mimics human cognition - how the human brain naturally and instinctively recognises people

The ability of the human brain to process information and to make sense of things, far exceeds the most advanced supercomputer that can even be imagined...

Biometric conventions such as fingerprint, facial recognition, voice recognition, iris and retinal scans... all employ simple geometry that reference only a very limited number of key points (minutiae, facial landmarks...) in 2D space to try and estimate the identity of an individual

aiThenticate’s Neural Biometric on the other hand references the full range of physiognomic features visible in the human face in 3D space to determine a person’s unique idiotype

The result is an authentication standard that far outperforms common biometric conventions when measured in terms of accuracy, robustness, reliability and usability...

Neural Biometric


Conventional biometrics have long since passed their ‘sell-by’ date

Our post-9/11 world wherein we are able to connect with anyone anywhere at any time in any number of different ways, demands and authentication technology that extends beyond the conventional

And aiThenticate’s next generation Neural Biometric does exactly that!

- Mr Graham Croock

Director, IT Audit, Risk & Cyber Lab


The technology, code-named ‘aiDX3’, answers five of the most important, five of the most challenging and five of the most urgent questions of our time:

  • Is someone actually who he says he is?” (Authentication)
  • Who is this someone?” (Identification)
  • Is this someone and actual, real/live person?” (Liveness/Proof-Of-Life/Anti-Spoofing)
  • Does this someone match his/her identity credentials?” (Verification)
  • Did the right person authorise/sign/approve/agree to a contract/document/application/agreement...?” (Authorisation)

aiThenticate’s aiDX3 Neural Biometric technology is entirely a proprietary technology initiative developed and owned by aiThenticate Cognitive Computing Labs - no third party technologies, functions, processes, procedures or libraries are used

aiThenticate’s Neural Biometric  recognises that we are each so much more then just a few whorls, arches and loops at the end of a fingertip, and that we are each so much more than just a few landmark points or a number of dots projected onto a person’s face...






Digital aiD

aiThenticate’s Neural Biometric assimilates and processes the vast amount of physiognomic information visible in the human face which it then mathematically expresses as a complex, anonymous, irreversible, de-identified ‘crypto hash’ (or ‘Digital aiD’) that can be used either to confirm (i.e. authentication) or to determine (i.e. identification) the unique identity of a person

Synonymous with other biometric conventions ( fingerprint, faceprint, voiceprint, iris print, retina print...), the Digital aiD is a unique representation of a person’s identity

However, because of the vast amount of

physiognomic information that is

available in the human face, a

person’s Digital aiD is a far more

reliable, a far more secure and

a far more robust representation

of a person’s identity

aiThenticate's aiDX3 neural algorithms mathematically 'translate' an image (either digital or non-digital photographs, even

photographs that

are dated) into

a Digital aiD

Virtual aiD

aiThenticate’s aiDX3 Neural Biometric uniquely makes the absolute ideal possible...

the 'Virtual aiD'

The Virtual aiD renders all identity conventions and value tokens (identity books/cards, driver's licences, passports, bank credit/debit cards, loyalty cards, access control cards, keys, passwords, OTP's...), completely redundant!

The Virtual aiD securely and conveniently replaces all these 'necessary inconveniences' with the one device we all carry with us all over all the time: a standard, off-the-shelf mobile phone (any phone) that's been enabled for aiThenticate's aiDX3 auth technology



When computervision scientists at aiThenticate Cognitive Computing Labs decided to develop the next generation biometric, they broke with convention to pursue a ground-breaking new field of research in the study of cognitive computing instead

Several key factors were considered in the decision to pursue a cognitive approach instead:


In a marketplace that's  become almost saturated with any number of different biometric solutions from different vendors who are willing to make highly questionable (and highly spurious) performance claims, aiThenticate’s aiDX3 Neural Biometric can be distinguished from all other offerings in a number of ways...

  • 01 - Neural Biometric

    Instead of using an analytical approach based on simple geometrical patterns that references only a few distinctive facial landmarks in 2D space to estimate the identity of an individual, aiThenticate’s aiDX3 Neural Biometric instead employs a complex semantic model that references the full spectrum of physiognomic features visible in the human face to emulate human cognition to determine the unique idiotype of an individual in 3D space to unprecedented degrees of accuracy and convenience

  • 02 - Digital aiDentity

    aiThenticate’s aiDX3 Neural Biometric transcodes an image (any image) of a subject into a complex, anonymous, irreversible, de-identified ‘crypto hash’ that represents the unique idiotype (or ‘Digital aiDentity’) of an individual

  • 03 - Performance

    The staggering amount of biometric information which aiThenticate’s aiDX3 Neural Biometric is concerned with, significantly reduces the incidence of misidentification (false positives/false negatives)

  • 04 - Anti-Spoofing/Liveness

    aiThenticate’s aiDX3 Neural Biometric relies on a series of sophisticated (proprietary) algorithms that have been designed to detect an extensive array of different types of spoofing possibilities, without requiring the user to perform any invasive/embarrassing ‘liveness gymnastics’ (e.g. smile, blink, wave, nod, swipe, sneeze...)

  • 05 - Device Agnostic/Independent

    aiThenticate’s aiDX3 Neural Biometric does not require the user to have to invest in any particular device for its biometric features - any (certified) optimetric device with a digital camera is all that's required

  • 06 - Optimetric Solution

    aiThenticate’s aiDX3 Neural Biometric can be deployed on any device that’s equipped with a digital camera (mobile phone, tablet, desktop computer, notebook computer, webcam, ATM, kiosk...)

  • 07 - Session Monitoring

    aiThenticate’s aiDX3 Neural Biometric makes it possible for the identity of an authentic user to be monitored throughout the session: should the user abandon a session, or if anyone (other than the registered user) assume control of the session, then aiDX3 will promptly alert the host app that will typically end the session

  • 08 - Resilient To 'Feature Drift'

    As a biometric that mimics human cognition - how the human brain naturally and instinctively recognises someone, aiThenticate’s aiDX3 Neural Biometric is highly resilient to factors that tend to interfere with the ability of conventional facial recognition systems to perform over time due to ageing, weight gain/loss, ill-health...

  • 09 - Demographic Diversity

    With proper exposure to and experience of different demographic groups, aiThenticate’s aiDX3 Neural Biometric copes exceedingly well with different demographic/racial/ethnic groups: male/female, adult/adolescent, Caucasian/Asian/African...

  • 10 - Enterprise Solution

    While captured images are filtered, quality-checked and cropped on the user’s device, all authentication, searching... biometric algorithms are securely performed on high performance GPU process servers in the cloud where a subject’s Digital aiDentity is also stored

  • 11 - Business Rules

    Users of aiThenticate’s aiDX3 Neural Biometric have the unique ability to dynamically define a range of different business rules that determine exactly how the technology will behave in certain instances (e.g. relax the security threshold for all ATM transactions below $100)

  • 12 - 1aiDentity

    A single, universal user identity

    (Development in the works...)

  • 13 - Real-Time Analytics

    Using aiThenticate’s (proprietary) analytics tool (code-named “aiQ”), the true performance of aiThenticate’s aiDX3 Neural Biometric can be measured and tracked in real time using any modern browser over the Internet

  • 14 - Impostor Detection

    Not only does aiThenticate’s aiDX3 Neural Biometric automatically detect any attempt by anyone who tries to impersonate someone else, but the technology is furthermore able to identify the perpetrator

  • 15 - Duplicate Alias Detection

    aiThenticate’s aiDX3 Neural Biometric is uniquely able to detect all instances where a user already exists under a different alias(es)

  • 16 - Device Agnostic/Independent

    aiThenticate’s aiDX3 Neural Biometric does not require the user to have to invest in any particular device for its biometric features - any (certified) optimetric device with a digital camera is all that's required

  • 17 - Active Alerts

    Specified individuals (or groups) will automatically receive an alert (as a text message, email, push notification...) whenever aiThenticate’s aiDX3 Neural Biometric detects an exception event (e.g. an impostor or a spoofing attempt...)

  • 18 - Self Learning/Improving

    As with the human brain’s semantic memory that improves with increased exposure to a particular subject, aiThenticate’s aiDX3 technology automatically improves with increased use over time

  • 19 - Smart Capture Technology

    aiThenticate’s aiDX3 Neural Biometric applies a number of different on-device quality control measures and checks that ‘intelligently’ guide the user through the capture process to ensure that only ‘qualifying’ images are sent to the aiDX3 Cloud Service for processing, and that an image contains only the information that is of relevance to the aiDX3 biometric algorithms

  • 20 - Proprietary Technology

    Following nearly six years of research and development by computervision scientists from aiThenticate Cognitive Computing Labs, aiThenticate’s aiDX3 Neural Biometric represents entirely an original and unique work-of-art

  • 21 - Responsive Development

    aiThenticate recognise that different circumstances may require different levels of security, different user experiences... - for that reason, aiThenticate’s computervision engineers welcome the opportunity to consider and accommodate special requirements

  • 22 - Disruptive Possibilities

    aiThenticate’s aiDX3 Neural Biometric uniquely makes any number of highly innovational and highly disruptive product and services developments possible (e.g.: a ‘Virtual aiD’ that replaces all bank cards, access control cards, identity documents, passports, driver’s licences, keys... with the user’s own phone that’s been enabled for aiThenticate’s aiDX3 Neural Biometric...

aiThenticate's (proprietary) analytics tool, aiQ, constantly monitors and tracks all events to analyse and report on performance of the technology in real time in any browser over the Internet


In a marketplace that is literally awash with different biometric offerings that are backed by (highly questionable/spurious) performance claims, aiThenticate uniquely makes a service available to users of its aiDX3 auth technology that allows the performance of the technology to be measured and tracked in real time over the internet: aiQ

aiQ is furthermore able to trigger automatic exception alerts of threats and breaches

aiQ automatically sends alert notices to any person(s) or group as a SMS text message, email, push notice... in the event that an exception event is detected (e.g. spoof attempt)

vs. iPhone X

The chief flaw in Apple's Face ID technology (as is the case with every device-centric biometric deployment) is the fact that the biometric relies entirely on the user's own say-so:

"I am Joe and here's my faceprint/fingerprint...

So every time I present my faceprint/fingerprint, you better believe that I am Joe"

While Apple's Touch ID and Face ID are certainly more convenient than a password, both Touch ID as well as Face ID suffer from exactly the same weaknesses and vulnerabilities as the common password does

- Andrè L Immelman

Managing Director,

aiThenticate Computervision Labs

Passwords are our greatest security weakness

- CSO Mobile Security & Data Protection

The only real competitor to aiThenticate’s aiDX3 Neural Biometric, is Apple’s Face ID on their flagship iPhone X - the chief distinctions between the two technologies can briefly be summarised as follows:

Apple's Face ID

aiThenticate's aiDX3

Available exclusively on Apple’s flagship iPhone X, a $999 - $1,149 smartphone that represents only 4.6% of the overall smartphone market

Entirely device dependent/device resident

Intended purely as a way for a single user to unlock his/her iPhone X

Special infrared camera harmful to the human eye

Premised entirely on the (self-referentially fallacious) assumption that the faceprint registered by the user on a particular iPhone X, is authentic (ie Apple’s Face ID relies entirely on the user’s own say-so: “I am Joe ‘cause I say so”)

Apple’s privacy policy entitles Apple to access and use a user’s biometric data for Apple’s own purposes

No exception event detection possible

Can be deployed on any optimetric device: Android phone, iOS phone, Android tablet, iOS tablet, desktop computer, notebook computer, kiosk, ATM…

Device independent, enterprise technology deployment - this makes a host of other (and highly innovational/disruptive) use cases possible that require the identity of the user to be determined with absolute confidence

Suitable for large-scale, mission-critical commercial deployments

Any standard front/rear (~2MP) digital camera on a mobile device

aiThenticate’s Certified Programme ensures that every user actually is who he says he is - no credence is given to the user’s own testimony or credentials

A user’s Digital aiD is securely stored as a complex, anonymous, irreversible, de-identified ‘crypto hash’ that is utterly unintelligible to anyone

Impostors and fraudulent aliases are automatically detected, identified and reported

Disruptive Possibilities

aiThenticate’s aiDX3 Neural Biometric uniquely makes a number of highly innovational and highly disruptive use cases possible across a diverse range of different industries...

Copyright: aiThenticate Computervision Labs - 2018