Circle Access 360 integrates:
The technical details of this are beyond the scope of this article, but we will try to summarize briefly here.
With CAM, your smartphone is you. It accomplishes this by securing two very strong factors:
CAD leverage cryptography to create something even more interesting: a Circle Secure Digital Capsule. These have several very powerful characteristics.
So, with CAD, the device on which a Secure Capsule is installed and authenticated to be controlled by YOU is your log-in. No credentials, zero friction.
Secure Capsules are themselves then bound to the device cryptographically - each capsule can only be opened and used on the specific device it was authenticated upon.
Secure Capsules can also be used to store biometric data. When you do this, then the capsules are bount do YOU independent of the device. That has many useful and powerful applications.
With Circle Access 360, an authentication process is conducted that enables your smartphone (with Circle Access Mobile) to securely communicate and control the secure capsules on your devices created by Circle Access Desktop. This delivers many important benefits:
This integrated capability then powers many other powerful capabilities across our product line. The bottom line is that 1 + 1 here equals far more than 2!
Understanding Circle
How Circle Access Mobile works
How Circle Access Desktop works
How Circle Access 360 works
Circle Use Cases
Creating userless passwords authentication flow for a website
What is a Circle Secure Capsule?
Add applications to Circle Access
How to install Circle Access on WordPress
Circle Access 360 documentation
Key concepts for Circle REST API
Developer forum
Circle Access Troubleshooting
Circle Access 360 FAQ for developers
Circle Access 360 demo