BioShare

Digital identity management
Made in Germany

In the digital world, trust is the most important factor, and digital identities are the foundation of that trust.

Corporate security is becoming increasingly important. Hacker attacks are increasing, while new policies and laws require swift implementation. The management of digital identities is particularly critical: Who has access to which data? Who should no longer have access? Where can I get an overview of all users?

BioShare solves these challenges by centrally managing all digital identities and providing a user-friendly MFA app. This saves you costs, meets legal requirements and increases security.

With an intuitive interface, you keep an overview and recognize abnormalities. Extensions such as password reset or working time recording are available. BioShare supports biometrics, TOTP, pass keys and more – flexible and easy to integrate.

Identity Management Suite

The basis for the use and management of digital identities

You have the overview

Via the user-friendly interface of our dashboard, you can see who has authenticated when and any abnormalities can be tracked in a targeted manner.

Increased flexibility, safety, ease of use and cost savings

Flexible, simple, safe, efficient! In the toolbox of authentication and identity, BioShare is what is in the "right" toolbox of the screwdriver with the interchangeable heads! Password reset, access monitoring, management of digital identities, time tracking or blood donation – BioShare can be optimized for almost any use case that has something to do with (biometric) authentication. BioShare brings all the security benefits – and still makes processes easier.

Flexible building block for biometric solutions

To combine biometrics as a safety factor with another, the Authenticator app is ideal. No matter how many users need to access how many applications – with just one digital identity, the app brings all the security benefits of multi-factor authentication and can also be combined with existing "one-factor applications".

Because BioShare is the answer to all your questions

You can mimic or steal a key, a password can be forgotten or spied – but biometric features just (quasi) not. The "being" factor, i.e. the proof of an identity with the body’s own characteristics such as fingerprint, hand vein, face, voice or the like, makes every authentication more secure – and also user-friendly. With BioShare, biometric authentications can be easily docked to existing login methods – it is easier to get security upgrades anywhere.

Mutual trust

Leading companies from very different industries have been relying on the advantages of BioShare for many years. We are proud that so many great customers with diverse fields of activity have chosen us and our solution and are so satisfied with our service.

BioShare is THE tool for managing digital identities.
With BioShare, logins, permissions, password resets and all other access-related operations of different applications can be centrally managed, viewed and tracked in one system. BioShare can integrate almost any use case, is user-friendly, cost-effective and, above all, extremely safe.

Customer-owned systems

BioShare

SSO

And more...

Possible BioShare authentication procedures

TOTP

FIDO2

RFID

And more...

More information on the subject

Success stories, datasheets and FAQs

Multifactor authentication

One lock can be cracked, two locks with different keys are already much more difficult. Not only are multifactor authentications significantly more secure because they combine two different "key factors" such as "knowledge" of a password and "being" (biometric authentication), but they are already mandatory in many areas and will become more and more so in the near future.

 

To combine biometrics as a factor with another, our Authenticator app is perfectly suited. No matter how many users or how many different applications are affected, with BioShare you only need a digital identity and still enjoy all the security benefits of multifactor authentication. Existing single-factor solutions can be easily connected to BioShare and a very individual solution can be created without the existing system having to be changed. Having to log in to the system only once and being able to access all relevant applications directly is the pinnacle of user-friendliness – but also a potential source of danger. Because the one password cracked or spied, attackers are the door open.

 

This is why an MFA is particularly useful for such single sign-on solutions – and biometrics is definitely the most useful factor because it offers the greatest security advantages and can also be easily integrated with the Authenticator app. Such multi-factor authentication is maximally secure with the FIDO2 standard – and that is exactly what is now possible with BioShare. To put it simply, special encryption prevents, for example, the biometric feature from being intercepted in the digital communication between the device on which it is authenticated (for example, a smartphone) and the corresponding service, because the information does not even leave the corresponding device.

Mobile working - but safe

Hardly any development in the world of work has taken place as rapidly in recent decades as the increased conversion to mobile work, home office, remote work and other models. If you have to introduce something like this quickly and "preferably already yesterday", as was the case in the Corona pandemic, among other things, however, important aspects often fall by the wayside. In this case, above all: (data) security.

 

Can you absolutely guarantee your customers that it is really only authorized employees who are currently working with customer data? Can you be sure that third parties are not able to view sensitive information? Whether by external hacking over public networks or a laptop left open?

 

If you are unsure about at least one of these questions, it is best to call us. Because data breaches can be really expensive. With the NewWorkKIT and the Call Center KIT from our BioShare family, the enormous security and convenience benefits of biometric features such as face or fingerprints will be easily used to optimally secure your customers’ data and meet all compliance requirements while giving your employees the flexibility they need.

Password Self-Service

On average, 34% of a company’s employees forget one of their passwords every month and have it reset or unlocked. A call to the internal service center is often followed by authentication via a personal feature such as e.g. the date of birth or similar and afterwards there is a provisional password, which often has to be changed again. This costs your company per reset up to 70 euros.

 

Such or similar processes are cumbersome, expensive and, above all, unnecessary. Because it is easier, safer, faster and better: What if the employee can simply authenticate himself in an app with his fingerprint or on the phone via voice and is thus able to reset his password himself and / or unlock his account? Without waiting time, without a security gap and without high costs? All right, right?! We also think so.

Data sheet

Time recording

Better than old-fashioned stamp cards, clearer than Excel files and above all safer and more convenient than other solutions: With the body's own biometric features such as face/hand vein or fingerprint, Your employees simply stamp themselves in and out, as the European Court of Justice requires.

 

This is (forgery)proof, hygienic (because contactless) and practical, because smartphones can also act as a sensor. A private doctor’s appointment, the longer dog walk or an extended business dinner? The system enables a clear distinction between work and leisure and stores the data in a tamper-proof manner.

BioShare TimeKIT

Electronic health records

Your health is the highest good. Not only in real life, but also in data protection technology. Therefore, it should be in your interest to protect the health data of your customers in the best possible way.

 

The electronic patient record (ePA) has been available since the beginning of 2021. It is a document in which history, treatment data, medications and other health data of the health insured are stored. This should not be hacked. The fact that the electronic health card already introduced by some insurance companies cannot be the only solution has been shown by abuse cases in recent months.

 

An "increased access protection" according to EU regulations is and will be indispensable. With the Authenticator-KIT of TWINSOFT biometrics, this can be easily implemented. The combination of several security factors such as a biometric feature (e.g. voice or fingerprint) with another factor such as a QR code ensures the health data of your customers optimally.

Donation management

Blood plasma donation is an important and (also for this reason) at the same time extremely (data) sensitive process. For each individual donation, various processes have to be carried out meticulously: donor acceptance, identification for multiple donations, release for donation, payment of expense allowance and archiving of documents. All this takes time, money, nerves and paper. But this is also faster, paperless and data secure.

 

After a single enrollment, the BioShare SpenderKIT recognizes the donor at each of his donations on the basis of a selected biometric feature and enables lightning-fast assignment of all information.

The data is collected and digitally archived in an audit-proof manner, informed consent is given by the "biometric signature" and the donor’s total stay in the donation center is reduced to the necessary minimum.

Data sheet

Settlement of talks

Arrange a non-binding discussion with us. Get to know our service and services. We are happy to assist you with advice and action.

Your data will be treated confidentially by us. We use their Data Only for contact

Identity Management in Industry

Who is really allowed into the hall with the production machines? Who can guarantee that the workplace in the home office is really only occupied by the employee? Who guarantees that third parties do not enter the room and take over the control of machines? For a long time, not only corporate IT has required special digital protection, but at least as much as the company’s Operation Technology (OT). A one-time login via password or a key that can be lost/found/stolen is not sufficient protection! A biometric authentication (recurring at irregular intervals) via e.g. Fingerprint or face scan, on the other hand, means an enormous security upgrade.

Success stories that inspire – Focus on our projects

Every successful project tells a story of innovation, collaboration and outstanding results.
Our selected success stories show how we master challenges together with our customers, set new standards and create sustainable success.

Download now and find out more!

SANDVIK relies on BioShare

PSE relies on the donor kit

Home Office - But Right

Amevida relies on BioShare

Your product. Your solution. Your future.

Every detail counts – and that is why our datasheets provide a clear and precise overview of the most important specifications, advantages and applications of our products.


Download now and find out more!

BioShare TimeKIT

TWINSOFT BioShare SpenderKIT

BioShare NewWorkKIT

BioShare CallcenterKIT

Identity Management in Industry

SSO with MFA and BioShare

FIDO2 standard in BioShare

Password Self-Service

New-work-and-time bundle

Questions? Here are the answers!

We know that questions keep coming up. This is why we have created our FAQ section for you.
Here you will quickly and easily find the most important information about our products, services and processes.

What is biometrics?

The word "biometrics" is derived from the Greek "biometros" – bios is life, metros is the measure – so biometrics is literally the "measurement of life". In the specific and business sense, biometrics is not (only) the measurement of life or the body via various characteristics of the body such as the iris or the fingerprint, but also the analysis of specific behaviors of the person such as the gait or the typing behavior on a keyboard.

In an even more specific sense, biometrics could be defined as "automated recognition of individuals by their biological characteristics and/or behaviour".

Biometrics is based on a complex mix of life sciences, statistics, mathematics and computer science.

 

Biometric systems, such as those used by companies and/or individuals, consist essentially of:

  • A sensor (recording device, e.g. camera, video camera, microphone, IR scanner, ...) that records/scans the characteristic of the person
  • A feature extractor (software that extracts the feature from the raw data received via the sensor)
  • Features comparisons (software that matches the feature to an existing database)

 

Quality characteristics/requirements (for) biometric(r) systems are:

  • Technical feasibility in clearly distinguishing a correspondingly large number of individuals
  • Economic feasibility within the framework of the corresponding customer requirements
  • Outsmarting resistance to attacks/manipulation attempts by third parties
  • Acceptance by users

Because the need for higher security and protection e.g. in the banking sector, at the ATM or in mobile online and telebanking, but also when accessing buildings or accessing files in modern society continues to increase, conventional solutions are no longer enough on the market.

The potential that biometrics has in all these areas has been and is enormous because it is an easy-to-use, natural and efficient solution that significantly increases safety and optimizes operational processes.

We also recognized this at TWINSOFT and stored the TWINSOFT Biometrics due to the enormous potential of biometrics as its own company. Meanwhile, the TWINSOFT Biometrics for more than ten years with the different facets of biometrics.

The TWINSOFT-BiometricsThe team advises and supports companies in the selection of the optimal biometric solution for their specific needs – manufacturer-independent and individual, from concept to licensing and transfer of business. After all, not every solution is suitable for every application – and often individualized adaptations are desired and/or necessary.

As a long-term expert with excellent market knowledge and highly trained experts, TWINSOFT can Biometrics Provide the optimal overview in a largely still "new" field and tailor the customer's solution.

Authentication is the proof of the identity of a user to a system/application or a communication partner.

A distinction is made in "verification by a one-to-one comparison", i.e. the assertion "I am Person X" and the proof of this identity and the "identification by the determination of an identity in the 1:n comparison", in which, based on the presented feature, from a large number of deposited identities, the one to which the feature fits is selected.

An authentication can be done by three factors:

  • By knowing passwords and/or number codes
  • By owning tokens, chip cards or a specific smartphone
  • By being, i.e. providing proof of one’s own identity through a biometric feature such as the fingerprint
  • Fingerprint
  • Iris/Retina
  • Face
  • Hand vein
  • Voice
  • Typing behavior/keyboard stop
  • Manuscript/Signature
  • gait behaviour
  • iv.

In an increasingly digital world, the dangers are also becoming increasingly digital and complex. In recent years, serious cases of data theft, spying on passwords or simply stolen and lost access cards have increased.

Hackers have long since been able to "stole" entire identities – with fatal consequences. Hacking a social media account is only the beginning – sensitive (financial) data or highly private personal information is hardly secure in such cases.

Manipulated ATMs and manipulated online banking are other problem areas in which biometrics can score with its enormous security advantage.

BioShare As an intelligent biometric management suite, it is the middleware for the use of biometrics and the management of digital identities across different biometric processes – no matter which feature or infrastructure.

For this purpose, a user account is linked to the biometric characteristics of one or more different methods so that the same person is recognized, regardless of whether he is currently verified by fingerprint, voice or face recognition.

BioShare is modular, so it can be adapted for virtually any specific use case and then used. BioShare is based entirely on secure, open interfaces and established standards. This avoids a "vendor lock-in" and all components can be easily replaced from the sensor supplier to the database.

All communication is certificate secured via https. The certificate handling takes place within BioShareThere will be no separate certificate management or PKI is needed.

BioShare It greatly facilitates the integration and management of biometric processes in existing infrastructures, while at the same time providing all the security benefits of biometrics. BioShare makes biometrics flexible, user-friendly and cost-efficient.

With BioShare A digital identity is sufficient for all applications – a "large" authentication with biometric factors is so secure that further application-specific additional authentications are not necessary. Whether you want to use MFA, SSO, PW services and other solutions and applications.

  • Fast and uncomplicated implementation and commissioning
    • Through standard interfaces – connection to almost every system on the company side – universally applicable
  • Modular system for integrating new sensors and clients – connection of almost any sensor possible
    • Facilitating sensor exchange
    • Multi-Sensor Support/Multi-Template Possibilities
    • Manufacturer independent
  • Separate storage of biometric features and personal data
  • Simple and central management of sensors and clients by BioShare WebAdmin
    • Smart and modern dashboard
  • Investment security

Our specific BioShare-KITs are prefabricated processes that in many cases make the individual implementation of specialist applications superfluous or at least significantly easier.

 

Existing KITs already exist for completely different use and capture scenarios:

  1. Time recording on mobile and stationary systems
  2. Multi-level authentication in various application fields
  3. The workflow of history questionnaires for donor services
  4. Password service/reset via voice recognition
  5. Data protection-compliant authentication of employees in the home office
  6. Access authorization management in tool logistics

 

Already existing or new applications can be integrated or developed at any time.

Real people are represented by their digital identity in the virtual world. With a digital identity, people or objects can be uniquely identified by computers. Different (biometric) characteristics can be used to establish a digital identity.

Personal data must be consistent, constantly available and reliable in many companies. Various services, such as personal accounting or certain mail systems, rely on this data in order to function individually. However, such data is often sensitive and should ideally only be earmarked and encrypted and only available to authorized persons. In order to manage this data securely, sensibly and ideally centrally, well-thought-out digital identity management is required.

Enrollment:

In order to authenticate people on the basis of a feature, it must first be recorded in an enrollment process and read into the database. The result of this process is the "template".

Enrollment template:

  • A value created by complex mathematical algorithms and calculated from the extracted sample, which can be read out subsequently and unambiguously assigned to an identity
  • The calculated value is encrypted and edited to ensure that even when attackers get to the template, they are unable to reproduce the biometric feature and thus gain access or access.

Identification (see above):

  • Determination of identity
  • 1:n Comparison

Verification (see above):

  • Confirmation of identity
  • 1:1 Comparison
  • Second authentication factor required
    • SmartCard
    • PIN, Password (OneTime)
Four factors "qualify" a biometric feature:
  • Universality
    • As many people as possible have this biometric feature
  • Longevity
    • The feature changes as little as possible over a long period of time (for example, hair color is therefore not suitable)
  • Measurability
    • The quality or quality of the feature can be measured
  • Difference
    • The feature varies from person to person and is as unique as possible (for example, fingerprint)

Which biometric feature is best suited for your requirements cannot be answered in general. In a noisy factory hall, despite all the accuracy of microphones, which function as sensors in voice biometrics, the susceptibility to error during recording is quite higher than, for example, during hand vein scanning.

On the other hand, employees who have to wear gloves permanently or, for example, often have smeared and dirty hands should not have to authenticate with their hands, but instead perhaps rather via a face scan or the voice.

Each feature has its advantages and disadvantages, which we are happy to discuss with you in peace.

Forget the Password:
Expensive and expensive!

With our Password Self Service Save time, nerves – and relieve your IT team

  • Independent password reset around the clock
  • Secure, data protection compliant & user-friendly
  • Perfect for companies with high security demands

Inform now and drastically reduce the support effort!

Always stay up to date!

Subscribe to our newsletter and receive regular news about TWINSOFT – our services, products, events and exclusive insights.