Skip to main content

Help us improve the Digital Marketplace - send your feedback

iProov Limited

iProov Remote Onboarding Solution

iProov Remote Onboarding simplifies secure citizen identity verification using face, fingerprint, and/or palm biometrics captured directly via a smartphone or web application. Palm and fingerprint modalities are optional add-ons that can be used individually or in combination with face biometrics.

Features

  • Certified to UK Digital Identity and Attributes Trust Framework.
  • Automated identity verification with ID + face, fingerprint, or palms.
  • Smartphone NFC verification of ICAO 9303 documents.
  • Presentation Attack Detection (PAD) and Injection Attack Detection (IAD).
  • WCAG 2.2 AA conformant and GDPR compliant.
  • Red-team tested to national security standards by Five Eyes government.
  • Active threat management and continuous cloud-based threat updates.
  • Web, Mobile Web, Native Mobile SDKs or no-code app.
  • Biometric and Device-based Multi-Factor Authentication.
  • Verifiable credential issuance (W3C or ISO/IEC 18013-5 mDL format).

Benefits

  • Remotely verify citizens and reduce administrative burden and human error.
  • Deliver accessible e-services with WCAG2.2AA conformance and active bias mitigation.
  • Provide secure, seamless access to e-services on web and mobile.
  • Boost account security with ongoing device and biometric-based authentication.
  • Mitigate fraud with advanced attack detection and active threat management.
  • Rapidly respond to attacks with ongoing monitoring and incident response.
  • Ensure resilience with internal and external red teaming.
  • Industry-leading face verification in-production completion rates of <98%.
  • Meet GDPR and DIATF compliance.
  • Mitigate evolving threats with automated cloud-based threat updates.

Pricing

£0.07 to £2.00 a transaction

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@iproov.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 0 9 8 2 0 0 5 2 9 9 4 1 1 1

Contact

iProov Limited Matthew Pearch
Telephone: +44 20 7993 2379
Email: contact@iproov.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
- eKYC
- IDV
- VPN access
- Authentication
- Identity Management & Access Management
- Document capture processes - contactless or optical
- Multi-stage Identity Verification processes
- Border Control processes
- Fraud & Risk Management systems
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Remote Onboarding with Face Biometrics requires devices with a user-facing camera that meets the system requirements.

Fingerprint and Palm Biometrics require devices with a rear-facing camera that meets the system requirements.
System requirements
  • IOS SDK: iOS 12.0 and above
  • IOS SDK: Xcode 14.1 and above
  • Android SDK: Android Studio
  • Android SDK: minSdkVersion API Level 21 (Android5 Lollipop) and above
  • API 31+ for compilation target, build tools, Android compatibility libraries
  • Android SDK: AndroidX

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are agreed within the chosen service package
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
See the iProov pricing document for details on the support level packages and their pricing
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Each customer gets assigned an onboarding manager who guides the customer through the iProov Customer Onboarding Plan which includes activities such as setup and configuration, access to our SDK and API documentation, and a dedicated portal. In addition, iProov delivers remote and onsite training as required, development support, implementation certification and pre-and post-go-live support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
This is covered as part of the Data Processing Agreement (DPA) that is agreed at the start of the contract.
End-of-contract process
At the end of the contract the verification service ceases. There is no legacy data or handover required, making switch-out painless for the Government customer.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile devices can either use the native app/SDK, or the mobile browser implementation. Desktops all use the browser. The native app generally performs more strongly, in-production results are iOS >98% and Web >95%.

Please note that only native applications have access to a mobile device’s NFC capabilities for document onboarding.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
IProov Remote Onboarding Solution is delivered via SDKs for iOS, Android and Web, with a customisable interface for the end user.

(See https://github.com/iProov/android#-configuration-options, https://github.com/iProov/ios#-configuration-options, and https://github.com/iProov/web#customisation).

The business user has access to an online portal to manage their service and view results, reports, and performance.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
IProov has carried out testing of compatibility with voice over tools (native for iOS and 3rd party apps for Android and devices using browsers).
API
Yes
What users can and can't do using the API
Included:

Authorised administrators have the ability to create/enrol, verify and delete users through their lifecycle.
Select appropriate risk profiles for enrolments and verifications.
Validate transaction results.

Limitation would be:

Authorised administrators are not able to define new risk profiles as this would be deemed a security risk.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The iProov SDKs are embedded within the service providers application and offer significant user experience customisation options details of which can be found at:

iOS: https://github.com/iProov/ios#-configuration-options

Android: https://github.com/iProov/android#-configuration-options

Web: https://github.com/iProov/web#customisation

Scaling

Independence of resources
IProov has active capacity management to ensure that provisioned capacity exceeds the forecast system load by a safety margin. Rapid provisioning to meet short-term load peaks is available. High peak capacity testing has been performed in the context of existing Government and private sector projects.

Analytics

Service usage metrics
Yes
Metrics types
IPortal is iProov's customer engagement portal: It is a secure platform giving our customers and partners a single point of access to carry out crucial purposes including; service metrics, user administration, automated service provisioning, integration, reporting, access to dashboards and raising support tickets.

Service metrics will comprise performance-related metrics such as:

- number of verifications in the period;
- number of successful verifications in the period.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
No user data is collected that would require export. There are options for imagery/system of record integration for appropriately defined criteria.
Data export formats
Other
Other data export formats
No export appropriate
Data import formats
Other
Other data import formats
To be agreed between the parties.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
There is a documented remedy and liability process which is detailed in the service credit and performance appendix in the contract.

Bronze: 99.5%,

Silver: 99.9%,

Gold: 99.95%,

Pro Platinum 99.95%.

All service availability levels are measured over a 12-month period.
Approach to resilience
Availability is engineered by multiple layers of redundancy both within datacentre and across multiple locations running active/active. Further details are available upon request.
Outage reporting
Email alerts of outages are sent to nominated contacts within the Service Provider's organisation and service availability is included within the API.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Service Provider users authenticate using the iProov service by 2FA, two-way TLS, VPN and username or password can be used to access relevant parts of the service as authorised or required.
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is limited to authorised users nominated by the service provider.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Certification Europe (UKAS)
ISO/IEC 27001 accreditation date
20/03/2024
What the ISO/IEC 27001 doesn’t cover
Out of scope items are loading bays and outsourced development
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
11/07/2023
CSA STAR certification level
Level 2: CSA STAR Attestation
What the CSA STAR doesn’t cover
All 17 CSA STAR CCM domains (v4) were covered during certification.
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO/IEC 30107-3:2017 and ISO/IEC 19795-1:2006 compliant
  • NIST 800-63B compliant as reviewed by National Physical Laboratory (NPL).
  • Biometric verification ETSI EN319 411-1 and ETSI EN319 411-2
  • SOC 2 Type II
  • ISO 9001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
IProov in its entirety, including all products, is certified to ISO/IEC 27001(2013). Internal and external auditing is carried out on a regular basis with external audits taking place twice annually.

A member of the Senior Leadership Team (SLT) has specific responsibility for security and reporting is carried out through the SLT to the CEO and board.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Change management baselines are established via version control and via asset records. Where a change is requested or made the base line is evaluated and updated as needed alongside a record of the change. IProov's change management process requires approvals from relevant stakeholders before assets are changed or updated. IProov's risk management process is integrated with its change management procedure which includes all internal and external assets.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
IProov maintains high standards of vulnerability management. As part of our CSA STAR (certified CCM V4) compliance, we update detection tools and vulnerability detection processes regularly, ensuring robust security operations. We adhere to timescales defined in our SOC 2,eIDAS,IRAP AND ISO27001 certifications, and comply with NIS 2 guidelines. We conduct daily vulnerability scans using Nessus and Snyk, with performance reviews performed at least every 90 days. We utilise Crowdstrike for real-time malware detection on endpoints. Our response time for vulnerabilities range from 24 hours for critical issues to 90 days for low risk concerns.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Potential compromises are identified through both automated alerting and manual log review. Suspected or identified compromise response follows ISO27002:2014 section 16.1 which will result in immediate 24x7 initiation of an incident response team if required.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident processes and procedures exist for common events. Customers may report incidents by email, raising a P1 ticket of voice. Incident response and reporting follows ISO27002:2016 section 16.1

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

iProov's commitment to a corporate environmental framework is evidenced through the specialised component of our Carbon Reduction Plan inline with PPN 06/21 this is published on the website and updated regularly. iProov is committed to achieving Net Zero emissions by 2050.

Equal opportunity

Since the inception of iProov, we have dedicated ourselves to being an equal-opportunity employer. We have built an accessible workspace close to transportation to assist those who are disabled and created an environment that promotes accessible technology and facilities for those who are neurodiverse. As of 2022, we have committed to focusing on employees' wellbeing by providing mental health resources, growth, and learning opportunities and implementing training to continue to build an inclusive culture. We have focused on accessibility by creating guidelines and support with accessing adjustments, whether those are neurodiversity or physical adjustments. We have clear support mechanisms in place to ensure all employees have equal opportunities. We pride ourselves in having a wide range of employment and training opportunities, providing current and future talent within industries with known skill shortages or high growth. This range starts with Computer Vision Research Engineers to Threat Intelligence Analysts to Software Engineers and Product Managers, giving variety to the diverse skills that we have. By doing this, we are actively tackling inequality in employment, skills, and pay in the workforce, not only by providing opportunities but the ability to grow and develop. We utilise our apprenticeship levy funding across the company to provide all employees with opportunities to gain recognised qualifications to advance their careers. We have invested in a learning platform that gives all employees the opportunity to develop new skills and build expertise in areas that they excel in or in new areas (if this is what they choose to do). Alongside this, we have actively benchmarked all roles within the company to ensure pay fairness for all, regardless of gender.

Wellbeing

We have an established Diversity, Inclusion, and Belonging committee and one of our main focuses for 2024 is how we promote mental wellbeing at work and healthy work-life balance. We are doing this via several initiatives such as measuring workload quarterly via engagement surveys, putting in place guidance on mental wellbeing at work, and bringing in external expert speakers on wellness. Our goal is to ensure all employees have access to proper mental health support by giving them on demand care and resources to allow them to put their wellbeing first. We acknowledge that DEI is an area that we will continue to grow into, but we are proud of the impacts we have made and will continue to make.

Pricing

Price
£0.07 to £2.00 a transaction
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Free trial services include 250 transactions, available for 4 weeks.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@iproov.com. Tell them what format you need. It will help if you say what assistive technology you use.