Ask or search…
K

Getting started

This section explains how to sign up with Kairos, upload documents manually, and use our API. We'll walk you through each step to show you how our system works. You'll learn about the signup process, how to upload documents for verification, and how to integrate our API into your system. This guide is meant to give you a clear understanding of how to use Kairos effectively.

Sign-up

Step 1: Head Over to the Kairos Website
Step 2: Enter Your Email Address
  • In the sign-up form, enter your email address in the provided field. Ensure that you use a valid and active email address, as it will be used for verification and future communications.
Step 3: Create a Password
  • Choose a strong and secure password. It should be unique to this account and meet the minimum security requirements.
Step 4: Agree to Terms and Conditions
  • Read the Terms of Service and Privacy Policy. Once you understand and agree to them, check the corresponding box to indicate your agreement.

Manual upload

Kairos can be used to manually verify identities using the interface in the product. If you are dealing with low volumes, selfie images and ID documents can be manually uploaded. No technical expertise is required to use this interface.
This is also Kairos' demo interface. If you would like to test the product simply register for a free account and either upload sample images or click on the demo images listed.
The output from the ID verification process will be listed on the same page in both table format and JSON output.

Using the API

Kairos API offers a powerful suite of facial recognition and verification capabilities designed to be easily integrated into various client applications via a REST-like interface. Whether you're developing a robust security system, enhancing user verification processes or creating personalized user experiences, Kairos provides the tools necessary to implement advanced image analysis and identity verification. With an emphasis on straightforward implementation, robust security features, and efficient handling of requests, Kairos ensures a seamless integration experience. This section will guide you through obtaining credentials, utilizing the API effectively, managing token security and understanding rate limits to maintain optimal application performance.

Bootstrapping the application

  1. 1.
    Create new application (optional) Navigate to the "Applications" section on the Kairos Dashboard. Create a new application or simply use the default one that had been created on startup.
  1. 1.
    Integrate into Application "App Id" and "App secret" pair is used to authenticate your application and make requests to the Kairos API. Be sure to store these securely and pass them as part of the configuration into your application.

Calling the API

The diagram below outlines the general flow for interacting with the Kairos API.
Request-Response flow
  1. 1.
    Capture Document & Face The process begins with the Client Frontend capturing the document and the user's face. The client sends captured inputs to the Client Backend.
  2. 2.
    Call Kairos API Client Backend receives the data and makes a corresponding POST HTTP request to the Kairos API passing in the required parameters.
  3. 3.
    Queue The request gets queued and a "Request UUID" is returned.
  4. 4.
    Poll As the AI verification is happening, the Client Backend periodically polls Kairos API until the request is processed. An HTTP response with a 404 status code means the request is still being worked on and a 200 status code signifies that processing has completed.
  5. 5.
    Handle result: The Client Backend takes the appropriate actions based on the Kairos API results which are passed onto the client usually being an "Accept" or "Reject".

Token security

API tokens should never be embedded or used directly in the frontend code of your application, such as in JavaScript files or HTML pages. When tokens are placed in front-end code, they are easily accessible to anyone who views the source code of your webpage making your application susceptible to attacks, such as unauthorized access to your API and data breaches. The secure way to use API tokens is to keep them on the server side. Regularly review and audit token usage to detect any unauthorized access or anomalies in their usage.