Download PDF version Contact company

In the age of sophisticated identity fraud, including fraud enabled by artificial intelligence (AI), it’s of paramount importance to establish a comprehensive and highly diverse verification process to enable as many identity checks as possible.

Face recognition technology

Multi-phase authentication that comprises document and biometric checks makes it possible to spot forgery more effectively, while face recognition and liveness detection play a crucial role in ensuring that a person is real and the rightful owner of the identity documents, and that no fraudster is trying to bypass the identity verification process.

Regula’s global survey has confirmed the importance of these capabilities: 27% of organisations consider face recognition to be the most effective at combatting identity fraud among other methods of verification.

Redesigning face liveness detection technology

The updated liveness check is intuitively clear and convenient for the user and is completed within a second

Regula Face SDK's redesigned face liveness detection technology offers a balance between a simple UX and high reliability by using the zero-trust concept.

Every session has its unique parameters that cannot be reused by fraudsters for tampering, so the enrolment process is more accurate and fraud-resistant. 

Exhaustive sets of checks are executed on a backend to protect against different attack vectors: printed photo, mask, screen replay, and so on. At the same time, the updated liveness check is intuitively clear and convenient for the user and is completed within a second.

Face Image Quality Assessment

Reliable enrollment with image quality assessment. Thanks to the addition of a new feature called Face Image Quality Assessment, Regula’s solution instantly validates a digital photo against predefined standards that can be either unique to a company to comply with its internal standards or compiled into the desired combination of over 45 parameters of the ICAO Standard or the ISO/IEC 19794-5:2011 Standard. 

Also, there is an option to choose an out-of-the-box preset for photo validation according to ICAO, Schengen visa, or US visa standards.

Checking photo validity 

The Face Image Quality Assessment feature is perfect for checking photo validity for official documents, like visas, permits, etc., both in governmental and commercial organisations.

However, it also has a more general application, as it elegantly solves a rather frequent problem that companies in all industries come across the tiresome and time-consuming manual assessment of photos that are used for onboarding clients, issuing permits, granting admissions, and so on.

Real age verification

Regula Face SDK reliably predicts the age range of a user right from their photo

Regula has enhanced the automatic age verification capabilities in its Regula Face SDK. The updated techniques employ neural network functionality, so instead of just outputting "adult" or "child" after the analysis, the solution reliably predicts the age range of a user right from their photo.

Everything is done in the blink of an eye, and completely automatically.

Extensive facial attribute evaluation

Regula Face SDK automatically identifies whether the person in the photo is wearing a medical mask, glasses, head covering, etc. All users need to do is upload an image and receive a list of facial attributes.

With the help of facial attribute evaluation, users can define whether the eyes are occluded, closed, or open; whether the facial expression is neutral or emotional; and whether or not there is a smile, glasses, sunglasses, head covering, medical mask, headphones, etc.

Enhanced face identification

The updated Regula Face SDK offers significantly improved face search among a variety of photos in a client’s database. Using only photos of faces, companies can double-check the identities of their clients to make sure they’re dealing with legitimate users.

Also, the solution facilitates biometric access control, as it empowers organisations with handy tools to compare a person with the photo they provided and automatically grant or restrict access when the check is complete.

Assigning multiple photo attributes

The solution’s architecture allows for unlimited registration of persons and supports infinite horizontal scaling

All this is possible due to the ability to assign multiple attributes to a photo. Each photo can be assigned certain parameters from a client’s database, like the name of the person, their age, gender, driver’s licence number, credit score, etc.

The solution’s architecture allows for unlimited registration of persons and supports infinite horizontal scaling. 

No matter how many incoming requests there are or how many records are stored in the database, the search mechanisms in Regula Face SDK can meet even the most elevated demand while continuing to provide high performance.

Biometric verification

We never stop improving our identity verification solutions to empower businesses with new opportunities as major processes rapidly become digital."

"With these new features, Regula Face SDK offers a comprehensive approach to biometric verification for a broader variety of tasks, be it fully remote client onboarding, KYC checks, access or border control, and much more,” says Ihar Kliashchou, Chief Technology Officer at Regula.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?