BioTone produces fresh, policy-consumable proof that the right human is present, alive, on the right device, and authorizing the right action.
Account-takeover and synthetic-identity losses keep rising as generative tools lower attacker cost.
Agents can initiate sensitive actions at machine speed; approval now needs live human assurance.
Possession is not presence. Privileged activation, recovery, and data unlock need fresh evidence.
One compromised credential or session can still approve a wire, export records, or change policy.
Single-modality KYC vendors compete on one sensor. BioTone competes on policy-consumable proof: the right human, alive, on the right device, authorizing the right action.
A signed assurance claim with subject, tenant, device context, modalities, score, freshness, policy result, and audit metadata. The customer keeps policy authority; raw biometric data stays out of the relying workflow.
Entra, app, agent, file vault, or admin workflow requests proof.
QR, deep link, web SDK, or API starts enrollment or verification.
Palm, iris/periocular, voice, ear, liveness, and research factors.
Signed result, score, freshness, policy, and audit reference.
Allow, step up, deny, revoke, alert, or hold agent action.
App, IdP, console, file vault, or agent requests a specific assurance level.
QR, deep link, web SDK, or API starts the verification session on an enrolled device.
Palm, iris/periocular, voice, ear, and liveness checks run under tenant policy.
Policy decides which signals are required, optional, or veto gates for the action.
Relying party receives a signed, auditable claim; not a biometric template.
This is the product proof behind the strategy: a capture flow users can finish, an admin surface operators can audit, and a token/receipt developers can consume.
Enrollment, verification, fusion policy, model registry, quality calibration, signed claim, tenant audit, API keys, and owner/admin controls.
High-assurance external verification for privileged identity, account recovery, regulated workflows, and sensitive step-up.
Bind biometric assurance to managed device posture: the right person on the right device at the right time.
Feed fresh human-assurance events into Defender, Sentinel, Purview, Security Copilot, and customer policy engines.
Verify the human behind agent delegation, override, recovery, approval, and policy-change workflows.
Customer-hosted deployments can drive Azure infrastructure, Key Vault, confidential compute, storage, monitoring, and premium security attach. Not a per-login billing story.
Microsoft remains the policy authority; BioTone provides signed evidence when ordinary auth is not enough.
Hosted console/API/keystore for fast pilots, demos, SMB, and internal dogfood.
BioTone-hosted console with customer-hosted keystore nodes for privacy-sensitive enterprises.
Customer-operated console, API, keystores, storage, secrets, observability, and license enforcement.
Integrator tenants consuming BioTone through API keys and SDKs without a tenant console.
Current focus: onboard quickly in the deployment mode the buyer needs: BioTone Cloud for fastest pilots, or hybrid, self-hosted, and API-only paths when custody or integration requirements call for them.
High-risk sign-in, PIM activation, account recovery, and sensitive application access.
Human-lent authority for delegation, override, approvals, and recovery in agentic workflows.
Wire release, treasury actions, policy changes, and dual-control workflows.
Short-lived access to board packs, read rooms, sensitive files, and controlled datasets.
Palm and periocular verification today; voice, ear, quality, and PAD as demand matures.
Vestibule kiosk and sensor-constrained interior continuous auth as the long-term moat.
Known device and tenant session.
Bind assurance to posture and app intent.
Require explicit action context and audit.
Optional step-up or recovery.
Majority fusion with tuned FAR/GAR profile.
Strict profile or all-factor fallback.
Only when risk changes.
Challenge before release, export, or recovery.
Fails closed for agent delegation or wire approval.
Usually not needed.
Multiply residual biometric risk.
Use for treasury, break-glass, or admin danger zones.
D′, 3-utterance adaptive enrolment. VoxCeleb1-O, 40 unseen speakers.
Protocol C, 3-frame enrolment. UBIRIS v2 + UTIRIS-VIS, 64 unseen subjects.
Protocol C, 3-frame enrolment. palm-embed-v2 quad-warp ensemble.
Best documented Protocol C on UERC2023-test, using k=7 enrolment + flip-TTA. EdgeEar reports 14.3% EER.
Combined false accept probability ≈ 4.1 × 10⁻⁸ if all four factors must pass.
≥3/4 majority, combined FAR 0.000174% (~1 in 576k).
For treasury / privileged workflows. Combined FAR 0.000019% (~1 in 5.3M).
Rare high-risk events. Combined FAR 0.0000034% (~1 in 30M).
PIN, passphrase, or tenant challenge multiplies residual risk; a 1-in-1,000 secret makes Balanced ≈ 1 in 576M.
Field validation remains the next proof step: tester distribution, clean physical-subject IDs, PII vault controls, model cards, confidence intervals, and quality calibration.
Benchmark PII-vault data, deploy production, export customer records, publish model, or suspend tenant.
Human sees purpose, scope, dataset/action, execution mode, TTL, and risk warning.
Full BioTone step-up proves the approver is present, alive, and authorized.
Agent receives only the approved short-lived authority; not a dashboard session or raw key.
Every use is logged as agent activity delegated by a specific verified human.
The first internal proving ground is PII-vaulted benchmark access; the same pattern generalizes to enterprise agent approvals, data unlocks, and admin danger zones.
First-admin invite, tenant onboarding, assurance contract, owner audit, browser/mobile QA, Microsoft validation package.
Microsoft path, banking/treasury or healthcare workflow, API-only integrator, field capture evidence, support runbooks.
Plan/subscription state, tenant export, Key Vault, Azure Monitor, SDK polish, model cards, live billing when pulled.
SOC 2 readiness, enterprise pilots, hybrid keystores, self-hosted licensing, government R&D, FCL/SBIR/advisory runway.
Entra step-up, PIM, Intune-bound access, agent approval, or Azure-hosted customer deployment.
Assurance claim fields, freshness, policy result, audit event, and relying-party validation.
Policy trigger to BioTone verification to signed result to enforcement or audit decision.
Privacy, biometric custody, tenant isolation, security controls, and support/recovery model.
Identify technical sponsor, success criteria, customer/pilot path, and integration lane.
Which workflow should BioTone validate first: privileged identity, device-bound access, agent approval, account recovery, sensitive data unlock, or controlled facility access?
Who should own the next technical conversation: identity, endpoint, security operations, AI/security copilot, Azure, public-sector innovation, or a joint sponsor?
What evidence would make BioTone credible in 30-60 days: architecture review, live demo, privacy review, field data, tenant isolation, or customer-hosted deployment?
BioTone is building the assurance layer that proves the right human is present for the decisions that actually matter.