Create a smooth and safe login experience.

Invisible two-factor authentication secures your customers’ accounts without sacrificing design, speed or safety. Supplement or even replace the need for passwords by recognizing authorized and trusted mobile devices, laptops and tablets.

abstract dots

Stop account takeovers and protect your customers.

Plus, you’ll have the security of knowing that every login is safe because our device recognition technology identifies both authorized and high-risk devices.

abstract dots

Avoid unnecessary challenges.

Normal changes to a customer’s location or device present absolutely no challenge to ClearKey. Set your own acceptable risk levels and our fuzzy matching technology will adapt to those changes over time.

abstract dots

Here’s how ClearKey works.

iovation's device recognition technology uses hundreds of device attributes to instantly identify whether the device trying to connect to you is known and trusted, or questionable.

Transparent Authentication

Still using passwords? Strengthen security using a customer’s device as a transparent, second mode of authentication.

Customer Registration

Confirm customer identity by matching device ID with known customer devices.

Selective Device Linking

Customers choose which devices they want linked to their account, with option of not linking devices for additional privacy.

Easy Device Unpairing

Unpair lost, stolen or retired devices from a customer’s account with one click, eliminating the need to reset an account.

Device Change Tolerance

All devices change over time but our fuzzy logic technology insures that device changes are within configurable tolerances.

Minimal Data Collection

Recognize and register devices using deep digital intelligence without needing to collect and store personal information.

Proof of performance.

Password-based attacks such as credential stuffing aren't much of a concern. We know fraudsters aren't getting around ClearKey at login.

Toby Ceselski Business Data Analyst III

Here’s what you get with ClearKey Device-Based Authentication.

iovation connects you to our team of support service specialists to help you quickly integrate ClearKey into your system and customize it for your needs.

  • Don’t redesign a thing: it’s easy to add ClearKey to your existing login process.
  • Results in real-time: in about 100ms, iovation recognizes a device, determines if it’s evading detection, checks for risk signals and runs all of the transaction risk checks you’ve specified.
  • 99.9% uptime: our distributed SaaS “always-on” infrastructure supports the largest transaction volumes in the world with an average response time of 100 milliseconds.
  • World class customer support: our team of experienced and certified Fraud Examiners are here to help. We work with you to solve challenges and get a swift ROI.
  • On board training: comprehensive training on how to optimize ClearKey to meet your specific business needs, effective evidence placement and more.
  • Ongoing education: we also provide continued training on new features and functionality through our help portal, eLearning webinars and our active user community.

Questions? We’ve got answers.

All kinds of people have asked all kinds of questions about ClearKey. We’ve answered a few of the most popular.

Get in Touch

Can you deploy ClearKey as the sole method of authentication?

Yes, you can deploy ClearKey as the sole method of authentication. ClearKey provides a solid method of authenticating users that is most often deployed within an existing authentication process as a second, transparent factor for additional assurance without adding customer friction. Stronger authentication such as a biometric check or a one-time password can be used when the customer is conducting higher risk transactions. ClearKey is typically employed at login, but you can also employ it at checkout or post-login for assurance at any point in the customer online journey.

Does ClearKey decide which transactions are allowed or denied?

No. ClearKey simply checks to see if the device a customer is using has been paired as authorized with the account they are logging into. ClearKey will examine the device and account pairing and return a status of Match, No Match, or None Registered. And the Match status will also tell you the amount of change (None, Low, Medium) according to tolerances you have specified. Then your system can decide whether to allow the transaction, deny it outright, or forward it for step-up authentication.

What is a device fingerprint and how does ClearKey use it?

When you register a device, or check for registration, your system calls an iovation service via an API. We use a unique multi­layered and pattern-matching approach to device recognition which yields high accuracy. We collect over 100 device attributes such as OS version, screen resolution, and others. We then match not only individual attributes, but groupings of attributes, and apply fuzzy matching algorithms that allow for certain device attributes that logically change over time. The device fingerprint checks for risk signals and whether the device matches any devices that are registered to the account.

What is ClearKey’s device capture rate?

Capture rate​ is determined by our ability to collect the attributes needed for us to recognize or identify the device. Our capture rate exceeds 98% which means that we capture those attributes 98% of the time. Our high capture rate is due to our multi­domain recognition (MDR) capability. With MDR we capture those attributes even when 3rd party script is being blocked.

As with all security technology, no solution is 100% effective at recognizing devices. And fraudsters often employ tactics in an attempt to evade detection. That’s why evasion detection is an equally important component of iovation’s strategy for recognizing devices. We use technologies like IP proxy piercing, VM and emulator detection, and checks for device data integrity, among others, to find evidence of fraudsters attempting to defeat recognition technology.

Our experts weigh in on ClearKey, authentication, fraud and more.

Ready for the next step?

In just minutes, we’ll show you how to improve your customer authentication experience, stop fraud and save money.