π‘Learn about the fundamental concept of Face Access.
Face Access Authentication
While our full ID Verification flow can be completed in about a minute, with the scanning of an ID document, review of data, and live face capture, the Face Access platform allows the re-authentication of a user within seconds.
The user needs to perform live face capture to do this. The userβs liveness is checked, and the face is matched against either their previous verification record in the IDKit Enterprise platform or against a face image you may already have, such as from a government source or your database.
Authentication flows have many use casesβthey could be used for account access, password resets and profile updates, high-volume payment transfers, SIM card swaps, and more. In summary, they make for a great multi-factor authentication method.
Note:
For more information of how the Face Access authentication works, please see here.
Why Face Access?
π±ββοΈπ¨πΎβπ¦±π§ Zero Bias
You can use our Face Access to authenticate Anyone, Anywhere, and Anytime.
π Secure & Scalable
Our Face Access has robust security measures and unparalleled scalability, allowing for a secure user authentication process.
π¨βπ» Serverless with No Data Retention
Our Face Access operates using AWS and microservers, ensuring boundless scalability to create a seamless user authentication experience.
Why is it a Superior Form of Authentication?
Our Face Access solution offers the most superior form of authentication compared to:
- Security Questions which can be researched or guessed, social engineered or overheard.
- Voice Biometrics which can be replicated easily with AI.
- One-Time-Codes which can be intercepted by email or SMS.
- Passcodes and Authenticator Codes which can be stolen, researched, or guessed.
- Device Based Biometrics which can be compromised or fall back to lesser methods.
- Captcha Codes which can be compromised using deepfake.
How to Access Face Access?
Face Access can be accessed in two ways:
Through IDKit Enterprise
If you have an IDKit Enterprise environment, you can utilise the "Authentication" API within the suite. By providing a previous "transactionId" completed by the customer or an image of the user's face, the API generates a link that the user can open through redirection, QR scanning, or webview. Once the user presents their face, the authentication is completed, and they are redirected back to your system.
Directly / Standalone
Upon request, the Authentication product can be used standalone for high-volume clients and partners. The process remains the same, accessed through a direct API instead of the IDKit Enterprise API suite. The API documentation is included in this specification.