Biometric Proofing

Verified identities is a requirement in several industries and IndyKite offers state of the art biometrical verification with either passports or national ID cards. In matter of minutes a customer will have a trusted identity issued for use in your customer applications. Authentication is passwordless and biometric, easy and fast.


Digitize your Customer Identity Verification

NCF scanning of passport/ID card gives high quality input for both face recognition and collection of information. The ID papers are verified for authenticity and previous fraud attempts, and strong liveness detection prevent the usage of recorded videos or pictures being used as proofing.


Meets your Regulatory Requirements

IndyKite biometric verification and authentication meets requirements for Strong Customer Authentication under PSD2 directive and eIDAS regulation Level of Assurance Substantial.

Customer authentication workflow


Privacy by Design

The Biometric verification process will add high quality, verified information to Digital Twins in the Knowledge Graph. How that information is used, who it’s shared with, and for what purpose, is something the owner of the information has full control over. End user Data Privacy has been embedded in our design from the start.

Personal properties from the OCR scanning or NFC reading added to your digital twin at

Permission to access the properties of your digital twin managed by your personal consent manager at


A Graph-Based Identity Fabric

The relationship graphs that emerged in the beginning of the social web taught us identity is contextual, making “relationship-based access control” an elegant solution to an age-old security problem.

Do you want to learn more?

Talk to an identity expert.
Juan Bojaca
Trusted Onboarding and Verification

Onboarding and authentication

Bring your own identity provider or use IndyKite Authentication to securely onboard your customers.

Digital wallet

Identity Knowledge Graph

Accurately reflect your landscape of users, applications, machines and data types.

Trusted Authentication

Knowledge-Based Access Control

Advanced authorization driven by knowledge


From Corporate Identity to Business Asset

When we look at identity from the perspective of the relationships between things and humans instead of their individual attributes, we discover hidden insights that can help companies optimize personalization, recommend complementary products, and discover new business opportunities.

Lorem ipsum


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.