How Biometric Witness (BW) Works
We combine strict identification, explicit consent, and secure recording—so every step is understandable and repeatable.
-
Fast registration and profile setup
Create your profile and confirm your identity with an ID document.
Document data is read using a certified third-party KYC solution; if the document supports NFC, we can compare the chip data with the submitted data using your phone’s NFC reader.
At the same time, we create a facial biometric profile for secure future authentication.
-
Adding a fingerprint
Add your fingerprint (on your phone, tablet, or on the device itself).
It serves as a quick and secure signature—your “OK” before each recording session.
-
Linking an email address
Add an email for verifications, notifications, and reports. It also helps restore access if you lose the device. -
Linking a mobile phone number
Add a number for two-step confirmations, SMS notifications, and urgent alerts. -
Accepting the Terms of Use
Confirm the BW Terms of Use and data processing conditions.
The main principle: recording happens only with clear, traceable consent.
-
Consent before every session (always—before “Rec”)
Before the recording starts, BW shows you a summary of what exactly you are approving:
– video/audio recording,
– the use of your biometric data for identification,
– encrypted storage and processing of data in the cloud.
You confirm consent with your fingerprint/Face ID on the phone, tablet, or device.
Notification channels: in-app pop-up, SMS, or email (your choice). All approvals are timestamped and added to the session log.
-
Joint consent—for everyone present
If multiple people participate in the session, recording does not start until each participant has given their consent.
When 100% is “green light,” BW clearly indicates that we can begin.
-
Recording
Recording begins with the selected parameters (e.g., 360°/multi-camera mode).
During recording, BW creates a security chain (hash + timestamps) that helps maintain the integrity of the material and detect any attempt at manipulation.
After the session, you get access to the transcript, summary, and secure sharing links according to your access role.
Security and privacy by default
All data in transit and at rest are encrypted (industry-standard, e.g., TLS in transit and strong encryption at rest).
Data are sent to the cloud for processing (transcription, summaries, search, etc.).
Access to data happens only with your authorization; consent and activity logs are non-erasable and timestamped.
Pricing
Cloud data processing is subscription-based. Plans start at USD 19/month.
You’ll receive a detailed offer and limits individually, based on your monthly processing volume.
Before recording—clear consent. During recording—integrity. After recording, encrypted storage and convenient, controlled access. That’s modern security with classic discipline.