Use cases
Some typical use cases for Progeny's service offering
Two-factor authentication
Confirm a user's claimed identity independent of a user's device or add a second security layer to payment authorization.
Use cases
Login - seamless, secure login across any device with a simple glance at a camera
Payments - Authorize payments by looking at any device's camera
Benefits
Strengthens authentication and reduces fraud
Reduces friction in the user experience
Platform agnostic
Available on both web and mobile platforms, platform agnostic
Anti-spoofing
Prevent spoofing attacks via facial liveness detection to confirm that a biometric is of a live, real person.
Use cases
Remote customer onboarding - biometric matching of a photo on government-issued Id with selfie
Verified user accounts - verify whether a person is the holder/user of a specific account
Scam - prevent account access/takeover or fund transfers in case of phishing attacks and other scams
Abuse - prevent the handover of an account to another person(s) operating under the same account or the use of multiple accounts by the same person
Captcha - make sure it's a real person interacting with a website
Benefits
Reduces fraud and abuse
Improves security and accurate biometric matching
Alerts fraudsters that they are being checked
Remote identity verification
Validate the identity of a person through facial liveness to combat fraud in the usage of services.
Use cases
Know Your Customer (KYC) - onboarding using biometric matching (see above)
Remote service delivery - verify whether a person claiming to be the service deliverer is a person assigned to the task
Remote access management - verify whether a person requesting remote access to a data asset is the employee working from home / remote location
Benefits
Decreases the costs of identity verification
Speeds up onboarding and identity verification processes
Combats fraud in remote onboarding, service delivery, and access management
Physical access authentication
Manage (restricted) access to a facility or area based on a range of parameters.
Use cases
Building access control - control access throughout an entire facility, single, or multiple areas to authenticated users only
Age verification - prevent access to specific areas for people under a specified age
Females/males only - provide access to areas reserved for a specific gender only
Ticketing - make sure the identity of the person who bought the ticket matches the ticket holder and provide for faster check-in
Benefits
Increases the security of physical access, without adding layers to the authentication process
Delivers fast, touch-free, and secure verification
Provides entry to authenticated users only
Identity verification and binding
Binding the vetted claimed identity to the individual through biometrics.
Use cases
Account takeover - prevent access or takeover of an account (see above)
Account recovery - maintain the integrity of a user's account by adding the user's face as a recovery option
Booking & check-in - tie verified identity to booking for ultra-fast check-in at a separate 'fast track' terminal/kiosk without the need for an Id check
Account re-verification - prevent fraud following the initial remote onboarding by re-verifying customers in the background
Benefits
Protects against account takeover through phishing and other credential-based attacks
Allows for simple account recovery
Enables significantly faster check-in
Customer can be re-verified at any moment, even in the background
User-rights control
Manage access control and permission management for data in critical business areas or at point of service.
Use cases
Role-based access control - restrict access to systems and data
Audits and ratings - provide access to specific confidential information as part of a quantified assessment
Security check - prevent hacking when moving funds between hot and cold wallets
Access to patient information - where access is required for urgent care at point of service
Benefits
Improves the security of access control and permission management processes
Ensures seamless and frictionless process
Reduces the risk of hacking
Payment
Use the secure biometric identity of a person to authorize transactions (online and in-store) and to combat fraud.
Use cases
Authorization - enables the authorization of payments on web, mobile, and in-store with a simple glance and by entering bank details only once
Strong Customer Authentication (SCA) - adds a second security layer to payments
Benefits
Provides a frictionless and fast payment process
Reduces the risk of chargebacks
Offers a highly secure second layer for SCA
Continuous authentication
Adopt biometric facial security as authentication for chatbots, virtual assistants, mobility services, and real-time chat interfaces
Use cases
Customer service - use mobile-friendly authentication to retrieve a customer's account information and perform transactions directly in conversational interfaces
Perform active and passive authentication - use a device camera for one-off authentication or use the same device to provide continuous authentication in the background with or without user interaction
Benefits
Not required to force customers to switch channels
Frictionless and highly secure, with the ability to run in the background to monitor an entire session, journey, etc
No passwords required
Call centre fraud
Prevent bad actors from beating knowledge-based authentication (KBA) when pretending to be someone they aren't.
Use cases
Customer support - prevent account take-over attacks when someone calls pretending to be a valid customer
Benefits:
Enables highly accurate caller authentication
Strengthens security and reduces fraud costs
Reduces agent time spent on KBA
Last updated