Biometric Privacy Architecture

Your Fingerprint Never Leaves the Card.

A plain-language explanation of how VerifiedKnock handles biometric data — designed for law enforcement leadership, union representatives, and legal counsel.

The Direct Answer

VerifiedKnock does not transmit, store, or have access to any officer's fingerprint — ever. The fingerprint is processed entirely within the physical card's secure chip. What leaves the card is a cryptographic signature, which is mathematically impossible to reverse into biometric data.

What Actually Happens at the Door

Step by step, from finger to verified — with no biometric data ever leaving the card.

Step 1

Officer Touches the Card

The officer places their finger on the fingerprint sensor built into the ATKey.Card. The sensor reads the fingerprint and the card's internal processor compares it to the enrolled template stored in the card's secure element — a tamper-proof hardware chip that cannot be read externally, even by the manufacturer.

All processing happens inside the card. Nothing is transmitted at this stage.
Step 2

Card Produces a Cryptographic Signature

If the fingerprint matches, the card uses its private key — stored permanently in the secure element and never extractable — to sign a challenge. This produces a cryptographic assertion: a string of characters that proves the card holder is who they claim to be. This is the FIDO2 standard, the same technology used by the US Department of Defense and major financial institutions.

The signature contains zero biometric data. It cannot be reversed into a fingerprint.
Step 3

Signature Is Transmitted to the App

The officer's phone receives the cryptographic signature via NFC. The app sends this signature to the VerifiedKnock system, which verifies it against the officer's registered public key. A public key is mathematically paired with the private key on the card, but cannot be used to recover the private key or any biometric data.

Only the signature and public key are involved. No biometric data is ever transmitted.
Step 4

Homeowner Is Notified: Verified

Once the signature is verified, the homeowner's app receives a notification showing only: the agency name, visit reason, reference number, and verification status. No officer name, badge number, photo, or any biometric data is ever shown to the homeowner. The officer's identity is protected throughout.

Officer PII is never exposed to residents. Only organizational credentials are shown.

What VerifiedKnock Stores

A complete, transparent breakdown of our data architecture.

What We Store

  • Officer's public key (cryptographic, not biometric)
  • Agency name and organization credentials
  • Visit records: timestamp, reason, reference number
  • Verification status (pass/fail)
  • Device registration identifiers

What We Never Store

  • Fingerprints or any biometric templates
  • Officer names, badge numbers, or photos
  • Private cryptographic keys (stay on-card only)
  • Location data or GPS coordinates
  • Any data that could identify an officer to a resident

Legal & Compliance Framework

Why our architecture was designed this way — and the legal protections it provides.

BIPA — Illinois Biometric Information Privacy Act

BIPA imposes fines of $1,000–$5,000 per violation for unauthorized collection or storage of biometric data. VerifiedKnock's match-on-card architecture means we never collect or store biometric data — making BIPA liability structurally impossible, not just contractually avoided.

FIDO2 / WebAuthn Standard

The ATKey.Card is certified by the FIDO Alliance — the same international standards body whose specifications are used by the US Department of Defense, major banks, and government agencies worldwide. FIDO2 was specifically designed so that biometric data never leaves the authenticator device. This is not a VerifiedKnock policy — it is a requirement of the standard itself.

Police Union Protections

VerifiedKnock's system is designed to protect officer identity from public exposure. Homeowners receive only the agency name, visit reason, and verification status — never the officer's name, badge number, photo, or any identifying information. This design directly addresses concerns raised by police unions regarding officer safety and privacy.

Have More Questions?

We welcome scrutiny from law enforcement leadership, union representatives, and legal counsel. Our technical team is available to walk through the architecture in detail.