An outstandingly simple online authentication experience for today’s customer, stakeholder or employee. Less friction, yet ultra-secure against even the most sophisticated attacks.

About

iProov Verifier solves the problem of securely authenticating online users, eliminating effort and complexity yet delivering extremely high levels of security. It is ubiquitous – any connected device with a selfie camera can iProov. Users love its easy, fun ceremony which demands nothing of them but delivers comfort and confidence that their data and applications are protected. Service providers buy it because it enables them to enhance the security of access to their systems and networks, yet makes no demands on users, eliminating friction and push-back. iProov uses face verification to authenticate users, with an innovative and unique user interface. They simply look at their camera for three seconds while the device screen flashes a sequence of colours. They do not have to do anything at all, remember anything or carry anything. It could not be easier. iProov’s patented security innovation is a unique way to prevent the use of copies, fakes, forgeries or replays. It thereby eliminates all the attack methods that have made face verification unsuitable for secure use up to now. iProov’s combination of three requirements – resemblance, solid human head form and real-time physical presence – together provide a unique level of confidence. It is resilient to compromised devices, man-in-the-middle attacks and phishing scams, and quickly detects and analyses new attack attempts. Features: Next generation face verification - iProov's face verifier uses the very latest artificial intelligence technology to deliver unbeatable performance in verifying users against their enrolled images. With very low false reject rates, users can rely on its reliability, even with makeup, beards, glasses or difficult lighting. Resists image attacks - iProov's patented spoof detection technology detects attempts to authenticate using photographs, tablet imagery or videos or other reproductions of the subject's face. So a user's account remains secure even if an image of the user's face has been stolen by attackers, who can't make use of it thanks to iProov spoof detection. Resists Replay Attacks - iProov's patented technology detects any attempt to replay previous authentication sessions. So a user's account remains secure even if the user's device is compromised by malware, or the user is victim of a phishing attack, or the session is subject to a man-in-the-middle attack. These attacks are amongst the most perilous to face verification, and iProov resists them effectively. Multi-platform - Verifier will iproov users on almost any device equipped with a front-facing camera. PCs with browsers supporting Flash can iproov without any kind of download. IOS and Android are supported either by a stand-alone app from the app stores, or by SDKs embedded in client mobile apps. Multi-channel - Verifer is able to iproov a user on their personal device, such as a smartphone, even if they are calling on another, such as a desktop PC. Or it can iproov them on their smartphone even if the contact is via a POTS call. Inbound or outbound. Simple, flexible integation - iProov offers a range of integration options, including Javascript libraries and app SDKs. Calls to the Verifier service are outbound only, simplifying network configurations.

Key Benefits

Delivers a superior user experience for your customers Outstandingly easy for your customer to use: nothing to do, nothing to remember, nothing to carry. It's accessible, simple, swift and reassuringly positive - designed for usability. Supports your customers across channels and platforms Serves your customer whatever their device - mobile smartphone, PC with webcam, tablet. And they can call on one device and authenticate on another. Total confidence in its security Unrivalled security performance strongly protects your customers, and provides confidence in compliance, even against sophisticated attacks and compromised devices Total confidence in its sustainability Server-based security protects you against future exploits and flaws now and in the future. Continuous attack monitoring, detection and adaptation evolve to stay ahead of the attackers.

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations