Back to All Solutions

Authentication

Protect against account takeovers, strengthen security measures and deliver dramatically higher levels of identity assurance with biometric verification technology.
image of woman holding smart phone projecting biometric lines on face.

Unlock the Identity of Your Users Automatically with Selfie and Facial Recognition Technology

How Jumio Biometric Authentication Works

phone

1. Acquire

When a new online account is created, Jumio captures an image of a valid government-issued ID (driver’s license, passport or ID card) and a selfie, from which a biometric identification template is created.

phone

2. Enroll

At enrollment, the selfie is automatically compared to the photo on the ID to reliably establish the digital identity of the new user. The algorithm uses key identifiers and biometric features to verify the user’s photo during the onboarding process.

phone

3. Authenticate

When future user authentication is needed, Jumio Authentication captures a fresh selfie, generates a new biometric template and compares it to the original biometric information to unlock the user’s digital identity in seconds for continuous authentication.

Jumio Biometric Authentication Technology in Action

rappi logo

"With Jumio, we can confidently verify the identities of our banking customers and delivery drivers almost instantly and without the need of human review. We have also been able to make our platform much more secure by authenticating our drivers before each delivery."

Juan Pablo Ortega, Co-founder, Rappi
woman with curly hair sitting on sidewalk holding a credit card and smart phone.

Solution Highlights

svg

Automated Anti-Spoofing Protection

Scare off fraudsters and protect against spoofing attempts with advanced liveness detection that has passed Levels 1 and 2 testing by NIST/NVLAP Accredited Lab iBeta for ISO Presentation Attack Detection, conducted in accordance with the ISO/IEC 30107-3 standard and in alignment with the ISO/IEC 30107-1 framework.
svg

Stronger Assurance

Face-based biometric security delivers a significantly higher level of identity assurance compared to other access management solutions including facial recognition systems, touch ID, fingerprint scanners, SMS-based two-factor authentication and knowledge-based authentication.
svg

Automated Authentication

Automate and speed up the authentication process and deliver a definitive match/no match determination in seconds. A selfie is one of the forms of biometric data that can deliver fast and accurate results without sacrificing the customer experience.
svg

Identity Proofing

Prevent identity theft and maintain compliance with KYC regulations by leveraging a government-issued ID and a selfie as trust anchors to know if the user is really who they claim to be.
svg

Cross-Platform Portability

Enrollment is easy. Users can take a selfie with a webcam and authenticate later from an Apple or Android device (and vice versa).
svg

Streamlined User Experience

Create an intuitive, user-friendly experience on all channels while providing an extra layer of security.
svg

Adaptive Learning

The identification system learns from each and every user authentication. This means the new biometric template is compared not only to the original template but all subsequent templates to improve authentication accuracy and reliability. Your authentication systems will improve over time with behavioral biometric solutions.
svg

Biometric Template Storage

Store encrypted user biometric templates on your own servers for a greater level of access control.

Biometric Authentication Use Cases

Prevent account takeovers during high-risk transactions
Biometric verification provides extra security during password resets, funds transfers and other high-risk transactions, helping to prevent fraudsters from taking over your customers’ accounts.
Learn More
Prevent account takeovers during high-risk transactions
Passwordless authentication
With biometric systems, users no longer have to input a password to access their bank account information. This functionality helps protect personal data while improving the user experience.
Learn More
Passwordless authentication
Secondary
(step-up) authentication
Using a secondary authentication method to verify a user’s identity can be incredibly helpful for providers handling sensitive information.
Learn More
Secondary
(step-up) authentication
E-learning and hotel check-ins
Instead of answering KBA questions, user’s can provide a selfie from their mobile devices.
Learn More
E-learning and hotel check-ins

Get Started

Let a Jumio expert show you how easy it can be to integrate our automated solutions into your existing processes.
image of man with facial hair smiling wearing a suit.