iProov Limited

iProov Face Verifier

iProov Face Verifier uses Genuine Presence Assurance to securely authenticate a person’s face against a pre-enrolled biometric template. Assuring it is the right person (and not an imposter), a real person (using liveness detection), authenticating right now (using a one-time biometric). Contactless cloud-based solution, no requirement for specific hardware.


  • One-time biometric assures the genuine presence of an individual
  • Contactless, effortless, user-centric face biometric authentication solution
  • Passive patented face biometric solution for strong liveness assurance
  • Protects against known and currently unknown face biometric spoof attacks
  • Device and platform agnostic authentication. On Android, iOS and web
  • Cloud-based solution enabling rapid deployment
  • Supported by iProov Security Operations Centre, providing active threat management
  • Adaptive defences to protect against evolving threat landscape
  • Leverages the pre-enrolled biometric profile for authentication
  • Privacy firewall and strong encryption techniques protect highly sensitive data


  • Assures trust in the remote digital user. Success rates >98%
  • Quick, intuitive and reassuring secure identity authentication completed in seconds
  • Maximum inclusivity and usability. No requirement for specific hardware
  • Cloud-based removes need to re-enrol if device is lost/stolen
  • Conformant to ISO/IEC 30107-3 audited by iBeta
  • Compliant ETSI EN319 401, 411-1/2 as a TSSP
  • Interoperable - enrol on one device, verify on any
  • Operational cost reduction, authentication journey completed remotely, securely and automatically
  • Passive authentication can be used for multi-factor or step-up authentication
  • Deployed at scale, resilient to peaks, proven; multiple government deployments


£0.52 a user a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@iproov.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

2 2 4 9 5 8 8 1 2 9 2 0 3 2 3


iProov Limited Matthew Pearch
Telephone: +44 20 7993 2379
Email: contact@iproov.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
- Authentication, identity management and access management

- Single sign-on services

- Fraud & risk management systems
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
IProov Face Verifier is available on any device that has a user-facing camera that meets the system requirements.
System requirements
  • Android SDK: Android 5 Lollipop, API Level 21 and above
  • Android Studio
  • Android X
  • IOS SDK: iOS 10.0 or above
  • IOS SDK: Xcode 13.0 and above
  • Web SDK: supports Chrome, Firefox, Edge, Opera, Samsung, Safari browsers

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are agreed within the chosen service package
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
See the iProov pricing document for details on the support level packages and their pricing
Support available to third parties

Onboarding and offboarding

Getting started
Each customer gets assigned an onboarding manager who guides the customer through the iProov Customer Onboarding Plan which includes activities such as setup and configuration, access to our SDK and API documentation and a dedicated portal. In addition delivers remote and onsite training as required, development support, implementation certification and pre-and post-go-live support.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
This is covered as part of the Data Processing Agreement (DPA) that is agreed upon at the start of the contract.
End-of-contract process
At the end of the contract, the authentication service ceases. There is no legacy data or handover required, making switch-out painless for the Government customer.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile devices can either use the native app/SDK, or the mobile browser implementation. Desktops all use the browser. The native app generally performs more strongly, in-production results are iOS >98% and Web >95%.
Service interface
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
IProov Face Verifier is delivered via SDKs for iOS, Android and Web that contain an interface for the end-user.

This can be customised by the service provider, see: https://github.com/iProov/android#-configuration-options
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
IProov has carried out testing of compatibility with voice-over tools (native for iOS and 3rd party apps for Android and devices using browsers)
What users can and can't do using the API
- Authorised administrators have the ability to create/enrol, verify and delete users through their lifecycle.
- Select appropriate risk profiles for enrolments and verifications.
- Validate transaction results.

Limitation would be:
- Authorised administrators are not able to define new risk profiles as this would be deemed a security risk
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available
Description of customisation
The iProov SDKs are embedded within the Service Provider's application and offer significant user experience customisation options details of which can be found at:

iOS: https://github.com/iProov/ios#-configuration-options,

Android: https://github.com/iProov/android#-configuration-options,

Web: https://github.com/iProov/web#customisation


Independence of resources
IProov has active capacity management to ensure that provisioned capacity exceeds the forecast system load by a safety margin. Rapid provisioning to meet short-term load peaks is available. High peak capacity testing has been performed in the context of existing Government and private sector projects.


Service usage metrics
Metrics types
IPortal is iProov's customer engagement portal: It is a secure platform giving our customers and partners a single point of access to carry out crucial purposes including; service metrics, user administration, automated service provisioning, integration, reporting, access to dashboards and raising support tickets.

Service metrics will comprise:
-number of authentications in the period
-number of successful authentications in the period
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
No user data is collected that would require export.
Data export formats
Other data export formats
No export appropriate
Data import formats
Other data import formats
No data import required

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
There is a documented remedy and liability process which is detailed in the service credit and performance appendix in the contract.

Bronze: 99.5%,

Silver: 99.9%,

Gold: 99.95%,

Pro Platinum 99.95%

All service availability levels are measured over a 12-month period.
Approach to resilience
Availability is engineered by multiple layers of redundancy both within the datacentre and across multiple locations running active/active. Further details are available on request.
Outage reporting
Email alerts of outages are sent to nominated contacts within the Service Provider organisation and service availability is included within the API.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Service Provider users authenticate using the iProov service by 2FA, two-way TLS, VPN and username or password can be used to access relevant parts of the service as authorised or required.
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is limited to authorised users nominated by the service provider
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Certification Europe (UKAS)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Out-of-scope items are loading bays and outsourced development
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • ISO/IEC 30107-3:2017 and ISO/IEC 19795-1:2006 compliant
  • NIST 800-63B compliant as reviewed by National Physical Laboratory (NPL)
  • Biometric verification ETSI EN 319 401, ETSI EN 319411-1/2

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
IProov in its entirety, including all products, is certified to ISO/IEC 27001 (2013). Internal and external auditing is carried out on a regular basis with external audits taking place twice annually.

A member of the Senior Leadership Team (SLT) has specific responsibility for security and reporting is carried out through the SLT to the CEO and board

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes to all components of the service are managed through a change control process that forms part of our Information Security Management System. All changes require a specific security risk analysis with standard processes including requirements such as vulnerability assessments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Threats are identified through both automated systems and manual review. Patches are scheduled for a monthly patching window but can be expedited to the same day if required.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Potential compromises are identified through both automated alerting and manual log review. Suspected or identified compromise response follows ISO27002:2014 section 16.1 which will result in immediate 24x7 initiation of an incident response team if required.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident processes and procedures exist for common events. Customers may report incidents by email, raising a P1 ticket of voice. Incident response and reporting follows ISO27002:2016 section 16.1

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Equal opportunity

Equal opportunity

Since the inception of iProov, we have dedicated ourselves to being an equal opportunity employer. We have built an accessible workspace close to transportation to assist those who are disabled and created an environment that promotes accessible technology and facilities for those who are neurodiverse. As of 2022, we have committed to focusing on employees' wellbeing by providing mental health resources, growth and learning opportunities and implementing training to continue to build an inclusive culture. We pride ourselves in having a wide range of employment and training opportunities, providing current and future talent within industries with known skill shortages or high growth. This range starts with Computer Vision Research Engineers to Threat Intelligence Analysts to Software Engineers and Product Managers, giving variety to the diverse skills that we have. By doing this, we are actively tackling inequality in employment, skills and pay in the workforce, not only by providing the opportunities but the ability to grow and develop themselves. We have invested in a learning platform that gives all employees the opportunity to develop new skills and build expertise in areas that they excel in or in new areas, if this is what they choose to do. Alongside this, we have actively benchmarked all roles within the company to ensure pay fairness for all, regardless of gender.


One of our main focuses for 2022 is surrounding work/life balance by changing our policies and benefit packages to focus on our employees' wellbeing. Our goal is to provide proper mental health support for all employees by giving them on-demand care and resources to allow them to put their wellbeing first. We acknowledge that DEI is an area that we will continue to grow into, but we are proud of the impacts we have made and will continue to make.


£0.52 a user a year
Discount for educational organisations
Free trial available
Description of free trial
Free trial services include 250 transactions, available for 4 weeks.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@iproov.com. Tell them what format you need. It will help if you say what assistive technology you use.