[SAMPLE DATA]
Nametag's patented identity verification technology prevents AI deepfakes and injection attacks by design.
Look behind the scenes to learn more.
Click on any element to learn more.
A verification request is initiated via Nametag's self-service account recovery portal, prompted by a helpdesk agent, or created via automated workflow.
Nametag leverages the cryptographic security of Apple and Android themselves to prevent injection attacks and stop bad actors from using AI-generated deepfakes.
Every end-user is asked for their explicit, informed consent before collecting their data.
Nametag's proprietary AI models verify that the person's ID document is genuine. If an attacker tries to present a deepfake or counterfeit document, they won't get through.
AI-powered facial biometrics and proprietary spatial liveness detection models verify that the person's selfie is genuine, and that it matches the photo on their ID document.
Nametag only collects and analyzes the data needed to verify people and prevent fraud.
Companies can request location and other data for more security and assurance. If they do, end-users are first notified and asked for their consent to provide this information.
The verification request is completed.
Self-service users can proceed to recover their own accounts, while helpdesk agents, IT and security teams now have all the the information they need to resolve support tickets, investigate potential fraud, or supplement SIEM systems with rich new data.