The mobile device acts as a data collection and analyzing device. It also acts as as a transceiver to prove proximity when interacting with another device.
A set of random and unique 384-bit tokens are generated for each authentication attempt. These single-use tokens are used to encrypt communications with the AIPA Cloud Layer.
If you are looking for partnership opportunities, please send us a note at partner@AIPA.com
Yes. Simply wrap your authentication functions in the AIPA API wrapper. AIPA will send back a boolean indicating if the user has sufficiently proven their identity and proximity.
We are constantly evolving our product and love hearing from our customers.