Bulletproof your ID and it can’t be stolen.

Secure your identity without passwords.


…BPID changes that!

The reason identity and security are exploitable vulnerabilities is they both rely on static tokens. Server stored static tokens such as passwords and user credentials are easily mimicked. This problem exists because everyone believes the only way to identify a user or device is if they have an immutable static identity token – like a device serial number or unique name for example – and security needs a password.

They are very wrong.

Matching these tokens is a huge hole in security, one which BPID plugs with incredible elegance and strength. Everyone who uses static tokens knows it is the primary vulnerability; still the digital world depends on them because they can’t invent a better way than storing these credential tokens.

Bulletproof ID (BPID) knows a far better way than stored credentials to secure identity.

The reason everyone uses static tokens and passwords are irreplaceable is because they believe security must reside on the the device being accessed.

They are very wrong.

Because there are two points in any online communication, both ends can share in the identity process. It is actually a simple matter to “share identity validation”. The process only works by employing random numbers. Because static tokens are the weak link, randomizing identity creates unpredictably so that no identity is reusable. This results in the TOTAL ELIMINATION of stored credentials. Both ends participate. And as the old saw goes “two heads are better than one”, so it goes that two endpoints using different algorithms produces better security than one.

1: BPID completely eliminates user names and passwords. There are no stored credentials on the device or server. None. By eliminating the user name and password, rogue agents can’t purchase access to a BPID secured server using credentials. That’s because there are no credentials. There is nothing for them to mimic and no identity to steal.

Imagine, a world without passwords!


2: Security is revolving, not static. Because BPID uses random numbers as a source of identity and security, there is no reuse or duplication of any user activity. That random number set is discarded after use. Every login is unique.




3: Random numbers provide one-time-use verification. Employing a one-time-use system secures each identity login in its individual security cocoon. When coupled with contemporary encryption communications methods even MIM attacks are ineffective because every handshake is different. No intrusion can anticipate the next numerical set or successfully reuse a previous one and therefore can’t clone the user identity or compromise credentials.

it is that simple, and it works.


4: Simplification and automation make it uncompromisingly secure and easy. Users no longer need to remember a hundreds of password credentials, The system is automatic, processing the random numbers with very little user intervention. Users are freed from the burden of remembering passwords and services are freed from the burden of securing credentials and the liability issues associated.

Users don’t know that their identity is different each time they logon; they don’t need to. They just need to know it is bulletproof, their identity is safe and it is easy.



Total elimination of passwords and static tokens for identity and security is the touchstone for digital security. BPID makes that a simple task.

Further, all contemporary security methods assumes that server security must be processed on the server. Further they believe that device security is processed at the device, both ends operating independently.

That is simply not true.

BPID offers a far more robust security option. Sharing security with and between endpoints, each handling a portion of the identity process cooperatively, then validating each other’s activity, any falsification attempt will always be immediately identified by one end or the other. Its instant!

It is as if they ‘compare notes’ using a one-time-use pad. That’s because it is precisely what they do. If the one time key doesn’t resolve at either end, BPID knows immediately that the identity is fraudulent. Random numbers provide the ideal one-time use-pad.

Any attempt to falsify identity quarantines the digital fingerprint of the source, marks the communication as fraudulent along with the source (I.P.) and the type of intrusion attempt. Once the fraudulent activity is identified and logged (nanoseconds) then defense action is immediately initiated. BPID captures and logs all logins, valid or invalid. No device will process any rogue attempt without both end points confirmation and when verification is missing the login simply doesn’t work. It initiates defenses. It’s simple, cheap and better.

BPID is not just bulletproof.

It’s game changing technology.