FAQ's

How does Circle Access Desktop work?

With Circle Access Desktop, your device - PC, laptop, etc. - is you. As long as you are on that device, you can be authenticated and log-in completely friction free.

Circle Access Desktop works by leveraging cryptography to create something very powerful and useful: a Circle Secure Digital Capsule on each device - that has been authenticated and authorized. Anything can be stored in secure capsules, but in the case of credential-free authentication, we store.

As a result, CAD secures two very strong factors:

1. Something You Have

The PC, laptop or other device you work on every day. CAM leverages cryptography to bind a unique private key to your device, which only your device can have.

Devices can be stolen, or family members or work colleagues can get on to them when you are away, of course. So CAD support multiple ways to ensure that only the authorized user is logging in.

2. Something You Know

PIN codes and other secrets are a common method. They can be kept in your wallet, or in your brain.

3. Something You Are

Biometrics can be used as proof of you. Most new PCs and laptops have this these days, of course - or it is readily accessible accessory & upgrade. With Circle Access 360, the biometric scanning and continuous authentication of Circle Access Mobile can be leveraged to verify the identity of the user logging in, on the Circle Access Desktop. CAM can also be alerted every time there is an attempt to log-in by CAD.

The result of this is to provide completely frictionless cryptographic credential-free authentication that binds user access to authorized, registered devices. Unparalleled security with unrivaled User Experience. No Compromise.

Learn More