How Private AV Works

Explore its zero-retention architecture, dual verification modes, and real-time compliance logic.

Input
No login or account needed
Verified
All data is deleted

Verification Process

Real-time estimation or full document review, with instant input deletion and anti-fraud analysis built in

Step 1: User Submission
User completes guided input with built-in quality checks
Selfie
or
Document
Step 2: Processing
System runs selected flow: AI Age Estimation or Document Verification
Facial Estimation + Liveness
Face-Based Age Estimation

Predicts user age from facial signals using trained models

Liveness Detection

Blocks still images and other non-genuine capture attempts

Spoofing Resistance

Protects against deepfakes and replay attacks with active analysis

15 sec
processing time
OR
ID Verification + Biometric Match
Document Validation

Extracts and confirms ID data with OCR and structure checks

Face Match to ID

Compares live selfie to document photo for identity assurance

Compliance Logging

Supports audit logs for payout, AML, or jurisdictional reporting

<60 sec
processing time
Step 3: Result & Wipe

Verification result is returned instantly. All biometric inputs are erased with no trace.

Seamless Emblem Integration

Built-in support for Emblem, the privacy layer behind regulator-approved tokenized checks.

Token-based flow with no data stored
Re-useable age token across sites
No added steps or setup required

Privacy-First Architecture

Engineered to eliminate retention risks. No biometric storage, no regulatory exposure, no breach surface.

Ephemeral Execution

Each request runs in an isolated environment that’s immediately destroyed

Volatile-Only Handling

Biometric inputs stay entirely in memory and are never written to storage at any point

Secure Data Destruction

Temporary assets are encrypted at rest and cryptographically shredded after use

Isolated Compute Enclaves

Verification sessions are fully sandboxed from other flows and customer environments

Private AV vs. Traditional Providers

See how our zero-retention architecture stacks up against legacy systems that store and expose user data

Feature
Data Storage
Data Deletion
Architecture
Encryption
Compliance
Processes in memory only, no personal data is stored at any point
All inputs are erased immediately after verification completes
Each session runs in an isolated container to prevent cross-session access
Real-time encryption secures all data in transit — no static files or writes
Fully aligned with global privacy laws including GDPR, COPPA, CCPA, and KJM
Traditional Providers
Often store PII and biometric data in long-term storage
Retain data for audits, rechecks, or backend profiling
Use shared infrastructure that mixes customer and session data
Rely on file uploads and backend writes with static storage
Introduce legal exposure by persisting sensitive user information

Built for Global Standards

Private AV meets regulatory requirements across the UK, EU, US, and other major jurisdictions

Policy-Aligned

Supports frameworks from Ofcom, Arcom, KJM, COPPA, and other enforcement bodies

Results Only

Outputs verifiable results without retaining personal or biometric data

Region-Specific Logic

Adapts by location — with built-in fallback handling, consent options, and minor protections

Future-Proofed

Designed to track and support evolving laws across Europe, the US, and Australia

Built for  compliance standards everywhere

SOC 2
ISO 27001
COPPA
KJM
CCPA
GDPR

Two verification modes. One compliant system.

Choose the level that matches your compliance, speed, and risk tolerance, or combine both as needed.
L1: AI Age Estimation
AI Age Estimation

Low-friction, low-cost face analysis for instant age screening. Can auto-escalate to document verification based on policy or risk.

15 sec
speed
Zero
friction
Frictionless Experience

No accounts, no document uploads — optimized for conversion.

High Level of Compliance

Approved for low-risk scenarios under COPPA, KJM, and similar frameworks.

Features
No ID upload required
Real-time liveness check
Optimized for best UX
Fallback to L2 when needed
L2: Document Verification
Full Document Verification

ID-based verification with face match, fraud screening, and audit-ready output — built for regulated and high-risk environments.

<60 sec
speed
Max
security
Maximum assurance

Combines government-issued ID validation, facial comparison, and liveness detection.

Full compliance

Supports GDPR, AML, and KYC obligations with traceable verification records.

Features
ID parsing and validation
Biometric-to-ID match
Compliance-grade audit logs
Multi-layer fraud defense

Dual-mode verification, built for flexibility

Use face-based estimation, ID-based checks, or both — depending on jurisdiction, content type, or risk profile. Private AV lets you adapt verification logic across flows, all within a privacy-first, zero-retention system.

L1 Mode

Frictionless Age
Check

L2 Mode

Secure, ID-backed verification

Enterprise-Grade Analytics With No Personal Data Stored

Monitor system usage, detect fraud patterns, and export audit logs, all without storing personal data
Operational Monitoring
Live Session View

Track active verifications, real-time outcomes, and liveness results in real time

Usage & Conversion Metrics

View submission rates, completion stats, and pass/fail breakdowns by flow type

Compliance & Reporting
Exportable Audit Logs

Generate structured logs to support GDPR, COPPA, KJM, and KYC audits

Jurisdictional Insights

Analyze verification traffic by region to support local compliance requirements

Fraud & Infrastructure
Abuse Pattern Detection

Identify device spoofing, high-frequency attempts, and repeat abuse patterns

API Health Monitoring

Monitor latency, uptime, and error rates across all deployed integrations

Ready to Deploy. Easy to maintain.

17.6KB SDK with full documentation, secure callbacks, and flexible setup
Compact SDK

Just 17.6KB, framework-independent, and compatible with major web stacks

Fast Setup

Integrates in under 5 minutes. Includes sandbox mode, test credentials, and full docs

Security Built In

Encrypted callbacks, strict isolation, and no storage of user data on your system

UI Control

Customize the verification flow to fit your UX and branding — layout, logic, and styling

Frequently Asked Questions

It defaults to L1 (face-only checks) and escalates to L2 (document-based) only when required — reducing friction and limiting data exposure.

Yes. You can configure rules for L2 escalation, minimum verification ages, and country-specific flows.

Standard protections include liveness checks, face-to-ID matching, and multi-signal fraud detection.

L2 captures and parses ID data, checks format and validity, and matches against a selfie — all in-session, with no data saved.

No. All processing is ephemeral. Inputs are deleted immediately after verification completes — nothing is retained.

Yes. Use the sandbox to run 100 test verifications with full webhook support. Production plans include 500 free live checks.

Private AV Chat Widget

💬 Chat with Private AV

Hi! I'm here to help answer questions about Private AV. How can I assist you today?
Just now