Progeny Docs
Search…
Use cases
Some typical use cases for Progeny's service offering

Two-factor authentication

Confirm a user's claimed identity independent of a user's device or add a second security layer to payment authorization.

Use cases

  • Login - seamless, secure login across any device with a simple glance at a camera
  • Payments - Authorize payments by looking at any device's camera

Benefits

  • Strengthens authentication and reduces fraud
  • Reduces friction in the user experience
  • Platform agnostic
  • Available on both web and mobile platforms

Anti-spoofing

Prevent spoofing attacks via facial liveness detection to confirm that a biometric is of a live, real person.

Use cases

  • Remote customer onboarding - biometric matching of a photo on government-issued Id with selfie
  • Verified user accounts - verify whether a person is the holder/user of a specific account
  • Scam - prevent account access/takeover or fund transfers in case of phishing attacks and other scams
  • Abuse - prevent the handover of an account to another person(s) operating under the same account or the use of multiple accounts by the same person
  • Captcha - make sure it's a real person interacting with a website

Benefits

  • Reduces fraud and abuse
  • Improves security and accurate biometric matching
  • Alerts fraudsters that they are being checked

Remote identity verification

Validate the identity of a person through facial liveness to combat fraud in the usage of services.

Use cases

  • Know Your Customer (KYC) - onboarding using biometric matching (see above)
  • Remote service delivery - verify whether a person claiming to be the service deliverer is a person assigned to the task
  • Remote access management - verify whether a person requesting remote access to a data asset is the employee working from home / remote location

Benefits

  • Decreases the costs of identity verification
  • Speeds up onboarding and identity verification processes
  • Combats fraud in remote onboarding, service delivery, and access management

Physical access authentication

Manage (restricted) access to a facility or area based on a range of parameters.

Use cases

  • Building access control - control access throughout an entire facility, single, or multiple areas to authenticated users only
  • Age verification - prevent access to specific areas for people under a specified age
  • Females/males only - provide access to areas reserved for a specific gender only
  • Ticketing - make sure the identity of the person who bought the ticket matches the ticket holder and provide for faster check-in

Benefits

  • Increases the security of physical access, without adding layers to the authentication process
  • Delivers fast, touch-free, and secure verification
  • Provides entry to authenticated users only

Identity verification and binding

Binding the vetted claimed identity to the individual through biometrics.

Use cases

  • Account takeover - prevent access or takeover of an account (see above)
  • Account recovery - maintain the integrity of a user's account by adding the user's face as a recovery option
  • Booking & check-in - tie verified identity to booking for ultra-fast check-in at a separate 'fast track' terminal/kiosk without the need for an Id check
  • Account re-verification - prevent fraud following the initial remote onboarding by re-verifying customers in the background

Benefits

  • Protects against account takeover through phishing and other credential-based attacks
  • Allows for simple account recovery
  • Enables significantly faster check-in
  • Customer can be re-verified at any moment, even in the background

User-rights control

Manage access control and permission management for data in critical business areas or at point of service.

Use cases

  • Role-based access control - restrict access to systems and data
  • Audits and ratings - provide access to specific confidential information as part of a quantified assessment
  • Security check - prevent hacking when moving funds between hot and cold wallets
  • Access to patient information - where access is required for urgent care at point of service

Benefits

  • Improves the security of access control and permission management processes
  • Ensures seamless and frictionless process
  • Reduces the risk of hacking

Payment

Use the secure biometric identity of a person to authorize transactions (online and in-store) and to combat fraud.

Use cases

  • Authorization - enables the authorization of payments on web, mobile, and in-store with a simple glance and by entering bank details only once
  • Strong Customer Authentication (SCA) - adds a second security layer to payments

Benefits

  • Provides a frictionless and fast payment process
  • Reduces the risk of chargebacks
  • Offers a highly secure second layer for SCA

Continuous authentication

Adopt biometric facial security as authentication for chatbots, virtual assistants, mobility services, and real-time chat interfaces

Use cases

  • Customer service - use mobile-friendly authentication to retrieve a customer's account information and perform transactions directly in conversational interfaces
  • Perform active and passive authentication - use a device camera for one-off authentication or use the same device to provide continuous authentication in the background with or without user interaction

Benefits

  • Not required to force customers to switch channels
  • Frictionless and highly secure, with the ability to run in the background to monitor an entire session, journey, etc
  • No passwords required

Call centre fraud

Prevent bad actors from beating knowledge-based authentication (KBA) when pretending to be someone they aren't.

Use cases

  • Customer support - prevent account take-over attacks when someone calls pretending to be a valid customer

Benefits:

  • Enables highly accurate caller authentication
  • Strengthens security and reduces fraud costs
  • Reduces agent time spent on KBA
Last modified 1yr ago