Home > FAQs
FAQs
Helpie FAQ
We never require our customers to use the dashboard UI. It's more efficient to do an API integration for high photo volume.
Yes, the entire Attestiv team has been trained and certified to ensure all health data remains safe and protected.
Attestiv provides self-service quotes/inspections and validates the authenticity of photos, videos and documents through real-time digital fingerprinting and forensic analysis, thus reducing fraud. AI is also used to automate the processing of digital media through text extraction and object recognition which improves speed and accuracy.
As photographs and videos became digital the inherent controls in the former processes were lost. Hackers and fraudsters quickly jumped in. Attestiv helps its customers ensure they are using “business quality” data derived from photos, videos and documents.
Each of the models analyzes a different aspect of the media.
Metadata will look for any metadata anomalies that may indicate editing or tampering.
Provenance looks for traces left behind in the file by many photo editors.
Integrity evaluates whether the file structure is valid.
Photo of photo looks at whether the image may be a photo of a screen.
Quality determines if the file has potentially been modified to hide detail by lowering the quality.
Reverse Search looks for matches of the image on the internet potentially indicating the image is not original and has been downloaded.
No, the Attestiv platform utilizes web links that can be sent to a mobile device via SMS or email. The user then clicks the link and then is taken through a guided workflow.
We offer a variety of self-service photo workflows (or we can integrate our technology into pre-existing apps) that companies can submit directly to users. Attestiv uses AI and blockchain technology to validate the authenticity of photos through digital fingerprinting and forensic analysis in real-time, reducing risk of fraud. Attestiv also uses AI to analyze photos and provide a comprehensive tamper score.
Our AI-trained database supports a variety of document types that include store receipts, appraisals, reports, insurance DEC pages, pdfs, and most barcodes.
No, the fingerprint is a unique cryptographic representation of the media data and metadata.
No, the data can be kept in the user’s network. The fingerprint can be generated via APIs on the user’s network. Attestiv only manages the fingerprints that are stored on the blockchain.
A fingerprint is a unique signature that represents the contents of a digital asset. Attestiv distributes a library so that customers can generate fingerprints of their assets at the source. These fingerprints are sent to the Attestiv platform, where they are collected and written to an immutable blockchain. At any point, you can regenerate and compare the fingerprints of your assets to the original versions. If a file has been altered, the fingerprint will no longer match.
Very recently, technology to manipulate photos and videos using AI has begun to proliferate, with results getting more difficult to detect. Unless you are using technology to detect media manipulations, chances are you may not realize the presence of fakes. Regardless of whether your organization has experienced fraud in the past, it now makes sense to build in Attestiv into any processes using digital media.
Attestiv is a platform with products building upon its foundation of tamper-proof media. While most of our products are turnkey solutions, developers can use Attestiv APIs when building new products. Please contact us if you are interested in building products using our APIs.
Attestiv has a ledger agnostic architecture that plugs into virtually any ledger. We support default public ledgers for customers who do not have specific ledger requirements. Contact us for details.
Attestiv offers the option to store your data on secure cloud storage, but can also store the data on existing enterprise storage, without affecting regulatory compliance, security and disaster recovery requirements for organizations.
There is no need for any personal data to be stored on the ledger. Some applications may store non-identifiable context metadata for media files.
Attestiv registers fingerprints on distributed ledger and uses heuristics an AI to track anomalies. Because the ledger is decentralized, there is no central authority that can alter the fingerprints and the insider and outsider attack threat is exponentially reduced.
We are not cryptocurrency. We use blockchain technology in addition to other advanced technologies in the space of Artificial Intelligence, Mobile, Cybersecurity.
Attestiv provides APIs that integrate into your existing apps that work across a number of mobile and other OS platforms.
Attestiv can import the images based on their baseline state to prevent future alterations, or can import them after a forensic scan. In either case, validation will differentiate the status between authentic, imported and imported & scanned.
Yes, Attestiv can intake documents as well, albeit unlikely media files, Attestiv can only validate the baseline state of the document when it is registered (as opposed to traceability from point of creation.
Our combination real-time approach is unique because it includes fingerprinting, triage and deep scan which doesn’t exist elsewhere. We have the best solution on the market.
No, Attestiv stores a fingerprint of each media asset on the ledger, which can be validated any time thereafter without changing the rendering of the media file.