Binds the vetted claimed identity to the individual (through biometrics) -- and thereby enables you to verify the identity of a customer remotely, without the need for a full KYC.
Only a glance at the camera needed. Delivers the same seamless user experience for biometric authentication across all channels.
Maintain the integrity of a customer's account in protecting it against account takeover. Identify handover of an account to a third person or prevent it from happening.
Transform the operational costs of your product or service with a solution that requires no full KYC to verify the identity of a customer (after the initial onboarding).
State-of-the art biometrics technology
A digital identity and advanced face biometric for binding of a person and connected devices to it as well as authentication thereof.
Proprietary algorithms for certified passive liveness detection, face authentication and identity document scanning. Progeny's solution compares the picture from the identity document and the selfie submitted (checked for liveness) by your customer, creating a digital identity in case of matching and passing liveness detection.
The digital identity of the customer stored in a hash encrypted with a key only known to Progeny. Enables binding of one or more connected devices to such identity - and to verify the identity of the customer within your applications remotely at any time.Learn more ..
Biometric authentication against the digital identity created for a customer during enrolment -- based on the photo extracted from a validated identity document (either by means of ID Analysis or through submitting a photo from previously completed KYC check). Safeguarded by Progeny's biometric gatekeeper (for passive liveness detection), checking the selfie submitted by the user in your application at re-verification of the customer to confirm the user's identity and to protect against spoofing attacks.
Ultra-secure, certified and based on a single 2D image - no user interaction required, a quick glance at the camera is sufficient.
Fully automated process for identity document analysis, consisting of classification (defines the ID family, such as type, country, and version), image and text extraction (binarization, noise removal, zoning, OCR, etc), and ID verification (by means of a forensic authentication process incl. visual and textual ID data). Determines if an ID is authentic and belongs to the user.
Note: Use is optional. If the customer has been validated previously, it is possible to utilize the image extracted from the submitted ID (as part of the full KYC check) and submit for creation of a digital identity without performing an additional ID Analysis.Learn more ..
Login & account recovery
Confirm an end-user’s claimed identity independent of a user's device for a seamless, secure login. Or at account recovery
Use the secure biometric identity of a person to authorize transactions (online and in-store) and to combat fraud.
Digital identities (DIDs)
Bind a digital identity to a person or a connected device so only authorized identities can interact with your product or service.
Remote identity verification
Validate the identity of a person through facial liveness to combat fraud in the usage of services
Identity verification and binding
Binding the vetted claimed identity to the individual through biometrics to prevent fraud following the initial remote onboarding by re-verifying customers.Learn more ..
Documentation at http://docs.progeny.tech
API reference at https://docs.progeny.tech/our-apiLearn more ..
Customer authentication all taken care of
Progeny Link, our front-end API for end-user authentication, gives you access to friction-free authentication and fraud prevention & detection for your users. All with a few lines of code.Try our demo