Return To Top

Prove Auth Solution

--

SOLUTION OWNER

Bill Fish

Slack : bill.fish
MFA With Behavior & Biometrics Use Cases
Kill OTP & Password Use Cases
A3 - Mobile Browser & AppA4 - Desktop
Gait & ID Scan for Extreme Risk Use Cases
A5 - Mobile Browser & AppA6 - Desktop
A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 A11 A12 A13 A14

A1Low Risk Authentication

Mobile App - Passwordless Login

Gait Auth Fact SheetSolution & Use Case FAQ

After the customer attempts to log in, Prove verifies the device is the same as was registered at first app login. The first time a phone is seen, Prove verifies the phone number with the mobile network operator (MNO) and authenticates the customer's identity in the background. If unable to use the MNO, fallback to Instant Link to complete the initial registration.

The user logged in without the need for
entering a password

Download The Full CX Flow


A2Low Risk Authentication

After the customer attempts to log in, Prove verifies  the phone number with the mobile network operator (MNO) and authenticates the customer's identity in the background. If unable to use the MNO, fallback to Instant Link to complete the authentication.

The user logged in without the need for
entering a password

Download The Full CX Flow


A3Low Risk Authentication

User is logging in to their account on a desktop or other secondary device.

If enabled, offer a Push Auth option to the user. If Push Auth is unavailable, fallback to Instant Link.

The customer approves the login attempt and accepts the push notification before Prove verifies the device was previously seen, if needed Prove verifies the phone number with the mobile network operator (MNO) and authenticates the customer's identity in the background if available.

The user is logged in to the website

Download The Full CX Flow

Pre-Fill enables consumers to frictionlessly complete applications

The customer wants to make a high risk transaction (HRT) like transferring funds to a friend.

After the customer confirms that they want to send money to their friend, Prove verifies the device is the same as was registered at first app login. If needed, Prove verifies the phone number with the mobile network operator (MNO) and authenticates the customer's identity in the background. Prove will also check the Trust Score to guard against fraud attack vectors. If unable to use the MNO to verify the number, fallback to Instant Link with Trust Score to complete the transaction.

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

The customer wants to make a high risk transaction (HRT) like transferring funds to a friend.

After the customer confirms that they want to send money to their friend, Prove verifies the phone number with the mobile network operator (MNO) and authenticates the customer's identity in the background. Trust Score is also called to defend against fraud. If unable to use the MNO, fallback to Instant Link or Push Auth to complete the authentication.

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

User is logging in to their account on a desktop or other secondary device.

If enabled, offer a Push Auth option to the user. If Push Auth is unavailable, fallback to Instant Link.

The customer approves the HRT and accepts the push notification before Prove verifies the device, or if unable to do so Prove verifies the phone number with the mobile network operator (MNO) with Trust Score and authenticates the customer's identity in the background.

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

A7Extreme High Risk - Authorization / Authentication

User wants to perform a Extreme Risk Transaction (ERT)

Prove verifies the device if previously registered or if required verifies the phone number with the mobile network operator (MNO) with Trust Score  and authenticates the customer's identity in the background using behavioral biometrics

Download The Full CX Flow

Pre-Fill enables consumers to frictionlessly complete applications

Pre-Fill enables consumers to frictionlessly complete applications

A8Extreme High Risk - Authorization / Authentication

Document Verification - Mobile

Gait Auth Fact SheetSolution & Use Case FAQ

Due to the extreme risk of the transaction, an additional verification is required. In this case, the scanning of an ID

Once the ID is scanned, a selfie is requested to ensure the ID matches the person

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

Pre-Fill enables consumers to frictionlessly complete applications

A9Extreme High Risk - Authorization / Authentication

Gait Auth - Desktop

Solution & Use Case FAQ

The customer wants to perform an Extreme Risk Transaction (ERT),such as transferring a large sum of money to a third party.

The customer is offered a selection of additional authentication options and  selects Push Authentication.

Prove verifies the user’s identity leveraging mobile device information

The customer confirms that they approve the transaction. Prove verifies the device if previously registered or if required  verifies the phone number with the mobile network operator (MNO) with Trust Score and authenticates the customer's identity in the background using behavioral biometrics

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

A10Extreme High Risk - Authorization / Authentication

Document Verification - Desktop

Solution & Use Case FAQ

The customer wants to perform an Extreme Risk Transaction (ERT),such as transferring a large sum of money to a third party.

The customer is offered a selection of additional authentication options and  selects Push Authentication.

Prove verifies the user’s identity leveraging mobile device information

The customer confirms that they approve the transaction. Prove verifies the device if previously registered or if required verifies the phone number with the mobile network operator (MNO) with Trust Score.

Due to the extreme risk of the transaction, an additional authentication factor is required. In this case, the scanning of an ID

Once the ID is scanned, a selfie is requested to ensure the ID matches the person

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow

A11Instant Link

The customer receives an Instant Link via SMS and clicks on it

The transaction is allowed to proceed if the proper person is authenticated

Download The Full CX Flow


A12SMS OTP

Mobile Or Desktop

Solution & Use Case FAQ

User receives SMS OTP

User types the SMS OTP Code and Prove completes the authentication

The user proceeds with their actions

Download The Full CX Flow

A13Voice OTP with Call Forward Detection

User receives Voice OTP

The customer enters the Voice OTP into their phone

The user continues with their activity

Download The Full CX Flow

A14Voice Biometrics

A repeat customer calls an institution's contact center with a question about their account. Because the customer has made a voice print in the past, authenticating them over the phone is a breeze.

The customer is asked to repeat a phrase. The new voice recording is compared to the previously recorded voice print. If the two voices match, the customer is authenticated.

Download The Full CX Flow


Prove Auth Rate Card

Prove Auth Documents