When you have to be sure, escalate to unspoofable human-in-the-loop identity verification

Now enterprises can activate delegated identity verification when needed for high risk use cases, contexts and user behaviors.

At the highest level, configure Circle-of-Trust in your policies engine to step up to unspoofable human-in-the-loop Identity Verification that is cryptographically fused to user authentication and device authorization.  Choose from flexible and configurable implementation options to meet your needs.
Register Now - It's FREE
Try the Demo

Level 1:  Cryptographic Human-in-the-Loop Authentication

Enables direct authentication between human users over traditional cloud resources for re-authentication and checks to ensure that the authorized user has control of his or her devices.

Developers can implement this end-to-end themselves with existing preferred cloud resources and services, or Circle offers optional hosted services.
Try the Demo
Circle of Trust
Circle of Trust Level 2

Level 2:  Unspoofable Human-in-the-Loop Identity Verification

For actions, events, and data requiring the highest level of security
At the highest level of security configuration, Circle-of-Trust operates entirely within Circles that are encrypted with AES 256, without any external avenues for attack. We are implementing this first: A turn-key hosted solution in order to ensure the integrity of the methods and system.
Contact Us for a Demo

Get Started

Deploy Level 1 Circle-of-Trust identity verification in just a few hours.   Also works together as an integrated step up escalation for platforms such as Auth0 and ForgeRock.
async function checkCircleServiceIsRunning() {
  let isRunning = await Circle.isServiceRunning();
  if (isRunning) {
    document.getElementById('runningResult').innerText = 'CircleService is running!';
  } else {
    document.getElementById('runningResult').innerText = 'Can not find CircleService!';

(function() {
Getting Started with Circle-of-Trust 
Get started with these guides and tips
You need Circle Service in order to execute Circle-of-Trust operations on endpoint devices
See a simple demo of Circle-of-Trust Level 1 integrated as a step escalation with Auth0

Learn More

Learn how you can deploy Circle-of-Trust can address the most fundamental question for high risk use cases:  do you know WHO the user is that is accessing a protected application, network, resource or IOT devices.
Undstanding Circle-of-Trust 
Learn more about the architecture and principles of Circle, and the amazing things it can do
Troubleshooting & Diagnostics
Check our FAQs and Troubleshooting tips, or post on our Forum

Integration Partners

You can add and deploy Circle-of-Trust effortlessly with one of our integration partners.

Stay tuned for more coming soon!
Integration Partners