# Use cases

## Two-factor authentication

Confirm a user's claimed identity independent of a user's device or add a second security layer to payment authorization.

#### Use cases

* **Login** - seamless, secure login across any device with a simple glance at a camera
* **Payments -** Authorize payments by looking at any device's camera

#### Benefits

* Strengthens authentication and reduces fraud
* Reduces friction in the user experience
* Platform agnostic
* Available on both web and mobile platforms, platform agnostic

## Anti-spoofing

Prevent spoofing attacks via facial liveness detection to confirm that a biometric is of a live, real person.

#### Use cases

* **Remote customer onboarding** - biometric matching of a photo on government-issued Id with selfie&#x20;
* **Verified user accounts** **-** verify whether a person is the holder/user of a specific account
* **Scam** - prevent account access/takeover or fund transfers in case of phishing attacks and other scams
* **Abuse** - prevent the handover of an account to another person(s) operating under the same account or the use of multiple accounts by the same person
* **Captcha** - make sure it's a real person interacting with a website

#### Benefits

* Reduces fraud and abuse
* Improves security and accurate biometric matching
* Alerts fraudsters that they are being checked

## Remote identity verification

Validate the identity of a person through facial liveness to combat fraud in the usage of services.

#### Use cases

* **Know Your Customer** (KYC) - onboarding using biometric matching (see above)
* **Remote service delivery** - verify whether a person claiming to be the service deliverer is a person assigned to the task
* **Remote access management** - verify whether a person requesting remote access to a data asset is the employee working from home / remote location

#### Benefits

* Decreases the costs of identity verification
* Speeds up onboarding and identity verification processes
* Combats fraud in remote onboarding, service delivery, and access management

## Physical access authentication

Manage (restricted) access to a facility or area based on a range of parameters.

#### Use cases

* **Building access control** - control access throughout an entire facility, single, or multiple areas to authenticated users only
* **Age verification** - prevent access to specific areas for people under a specified age
* **Females/males only** - provide access to areas reserved for a specific gender only
* **Ticketing** - make sure the identity of the person who bought the ticket matches the ticket holder and provide for faster check-in

#### Benefits

* Increases the security of physical access, without adding layers to the authentication process
* Delivers fast, touch-free, and secure verification
* Provides entry to authenticated users only

## Identity verification and binding

Binding the vetted claimed identity to the individual through biometrics.

#### Use cases

* **Account takeover** - prevent access or takeover of an account (see above)
* **Account recovery** - maintain the integrity of a user's account by adding the user's face as a recovery option
* **Booking & check-in** - tie verified identity to booking for ultra-fast check-in at a separate 'fast track' terminal/kiosk without the need for an Id check
* **Account re-verification** - prevent fraud following the initial remote onboarding by re-verifying customers in the background

#### Benefits

* Protects against account takeover through phishing and other credential-based attacks
* Allows for simple account recovery
* Enables significantly faster check-in
* Customer can be re-verified at any moment, even in the background

## User-rights control

Manage access control and permission management for data in critical business areas or at point of service.

#### Use cases

* **Role-based access control** - restrict access to systems and data
* **Audits and ratings** - provide access to specific confidential information as part of a quantified assessment
* **Security check** - prevent hacking when moving funds between hot and cold wallets
* **Access to patient information** - where access is required for urgent care at point of service

#### Benefits

* Improves the security of access control and permission management processes
* Ensures seamless and frictionless process
* Reduces the risk of hacking

## Payment

Use the secure biometric identity of a person to authorize transactions (online and in-store) and to combat fraud.

#### Use cases

* **Authorization** - enables the authorization of payments on web, mobile, and in-store with a simple glance and by entering bank details only once
* **Strong Customer Authentication** (SCA) - adds a second security layer to payments

#### Benefits

* Provides a frictionless and fast payment process
* Reduces the risk of chargebacks
* Offers a highly secure second layer for SCA

## Continuous authentication

Adopt biometric facial security as authentication for chatbots, virtual assistants, mobility services, and real-time chat interfaces

#### Use cases

* **Customer service** - use mobile-friendly authentication to retrieve a customer's account information and perform transactions directly in conversational interfaces
* **Perform active and passive authentication** - use a device camera for one-off authentication or use the same device to provide continuous authentication in the background with or without user interaction

#### Benefits

* Not required to force customers to switch channels
* Frictionless and highly secure, with the ability to run in the background to monitor an entire session, journey, etc
* No passwords required

## Call centre fraud

Prevent bad actors from beating knowledge-based authentication (KBA) when pretending to be someone they aren't.

#### Use cases

* **Customer support** - prevent account take-over attacks when someone calls pretending to be a valid customer

#### Benefits:

* Enables highly accurate caller authentication
* Strengthens security and reduces fraud costs
* Reduces agent time spent on KBA
