iProov rebinding


The process of upgrading a mobile device is straight-forward when you have the original. But if your old device is damaged or stolen or lost, the process of ‘rebinding’ a new one to your apps and accounts can be difficult and time-consuming for the user. iProov enables organizations to make it easy for a customer to rebind, with Genuine Presence Assurance technology that securely authenticates their identity.

  • Securely rebind existing customers to new devices
  • Provide the simplest user experience
  • Protect against identity fraud
iProov face verification on mobile

Why is rebinding important?

The weak point in any device-based identity solution is that the device can be lost or stolen. iProov creates trust in the person holding the device rather than the device itself. If a user is trying to assert their identity on a new device, organizations can use iProov Genuine Presence Assurance® technology to verify that they are the right person, a real person, completing the process right now.


iProov face verification on web

Rebinding with iProov

  • Customer sets up a new device to replace a broken/stolen/lost one
  • Installs an organization’s app
  • Begins the effortless iProov rebinding process
  • Scans document using device to verify identity
  • Completes effortless facial scan
  • This confirms they are the right person, a real person, and authenticating right now
  • Genuine presence is assured
  • Device is connected to user’s identity


iProov technology for rebinding

iProov Face Verifier

iProov Face Verifier

With iProov Face Verifier you can authenticate a remote user’s face against a pre-enrolled biometric and confirm it is the right person, a real person, authenticating in real-time. It can be used as primary, multi-factor or step up authentication.

iProov Palm Verifier

iProov Palm Verifier

Palm Verifier provides Genuine Presence Assurance, confirming that a user is the right person, a real person, and authenticating right now. A contactless solution, it is hygienic, simple to use, and highly secure. It also requires no specialist hardware.

background 02 mobbackground 02

Contact Us

Get a demo