FB pixel

Prove launches Identity Graph for tokenized identities

Categories Biometrics News  |  Trade Notes
Prove launches Identity Graph for tokenized identities
 

Prove has unveiled the Prove Identity Graph, a new identity infrastructure designed to help enterprises instantly verify and recognize customers across borders, devices and channels.

The Prove Identity Graph connects verified individuals to tokenized representations of their national IDs, devices, phone numbers, emails and authentication keys.

At its core is the Prove ID, a cryptographically-rooted identity that updates in real time as users change devices or telecom providers.

This allows businesses to maintain a continuously accurate and secure view of their customers, Prove claims, without relying on slow one-time verification methods like document uploads or selfies.

“As companies expand their digital reach, they need a foundation that makes security stronger and seamless,” says Rodger Desai, CEO and founder of Prove.

“The Prove Identity Graph turns identity from a fiction point into a growth engine. Each verified identity not only prevents fraud but also fuels trust and business performance globally.”

Covering over 90 percent of digital consumers in 227 countries and territories, the graph offers certified coverage of more than 10 billion verified devices, distinguishing real users from bots and synthetic identities through deterministic signals and integrations with telecom carriers and identity issuers.

Prove says the Identity Graph enables instant onboarding, persistent user recognition and real-time fraud defense including protection against account takeovers, SIM swaps and synthetic identity attacks. It also supports personalized engagement by helping businesses tailor offers and loyalty programs to verified users with long-standing, trustworthy digital footprints.

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events