You do not need any application or installation whatsoever to try out Circle Access Lite. It uses HTML5 to store and manage cryptographic keys on your mobile phone for authentication purposes.
You need the Circle Access Mobile App in order to leverage the on-device cryptographic capabilities of Circle Access Mobile and Digital Trust use cases.
Note: Circle Access Mobile also includes Circle Service, so you gain all of the Data Protection, Privacy and Control capabilities of Circle Data at the same time.
You need Circle Access Desktop:
This installs Circle Service in order to leverage its unique and powerful functionalities that run on the endpoint device.
In this demo, you can experience each frictionless UX one at a time. Or just try what you prefer.
In this simple demo, you can create a flow for approving payments from 3 different people with different weights for each.
The Circle Access Authorization APIs give developers the means to create any kind of authorization / approval workflow for a distributed workforce, with biometric verification of users and the option of cryptographic enforcement of actions that are granted.
This demo shows:
Most encrypted emails system claim to be secure since they leverage an external key store to hold the keys that were used to encrypt and decrypt the email. The problem is, when the message needs to be displayed, the ‘server’ needs to ask the external key store for the decryption key; which means that while the server doesn’t store the key locally, it can still get it.
Go to our demo page for video recording of an integration with Microsoft Outlook along with code samples and explanations of how to implement.
The demo illustrates two capabilities of Circle:
This is a video recording of an integration with Microsoft Sharepoint. Click on the icon to play.
The demo illustrates the following areas of functionality.