IamMe

Partner & Enterprise Overview

Don't have access? Return to iamme.ai

Partner Overview

The IamMe Platform

How it works, who it protects, and how to integrate — everything you need to evaluate IamMe for your organisation.

How It Works

Trust delivered in milliseconds

Before the phone rings, the recipient already knows who you are. No apps to open. No steps to take.

Step 1

Caller signals intent

Before dialing, the caller — an enterprise system or enrolled individual — sends a cryptographically signed token to the IamMe network.

Step 2

Network signs and delivers

IamMe validates the caller's identity, signs the token with ES256, and pushes a notification to the recipient via APNs or FCM — ahead of the call.

Step 3

Recipient sees the truth

A native notification appears on the locked screen before the call arrives. The phone rings normally — with verifiable context already visible.

Threat Landscape

The phone has become the attack surface

Caller ID is trivially spoofed. AI can clone a voice in seconds. IamMe makes identity unforgeable — regardless of the threat vector.

AI Voice Impersonation

Generative AI clones a voice from seconds of audio. Attackers impersonate executives, family members, and officials in real time.

A cryptographic token cannot be faked by any voice model. The signature is hardware-bound to the caller's enrolled device.
Voice Phishing (Vishing)

Attackers call posing as banks, the IRS, Medicare, or tech support — convincing victims to transfer funds or share credentials before the call is answered.

IamMe's verification state displays before the call is answered — before any social engineering can begin.
Government & Authority Spoofing

Fraudsters spoof the SSA, IRS, FBI, and local police — creating fear that bypasses rational thinking. Victims are conditioned not to hang up.

Verified government agencies display "is verified" in green. Spoofed calls display "not verified" — instantly.
Emergency & Crisis Fraud

"Your grandchild needs bail money." Emergency framing disables skepticism. AI voice cloning makes it indistinguishable from a real family member.

When someone you know calls from an enrolled number, their contact name shows alongside "is verified" before you answer.
Customer Uncertainty

Legitimate businesses pay for fraud they didn't commit. Customers ignore calls from banks and health providers because they can't distinguish real from fake.

Enterprises on the IamMe network restore the answer rate. A green "is verified" banner means the call is genuinely from that organisation.
Business Phone Compromise

Attackers call employees posing as executives or IT, instructing wire transfers or credential resets. High success rate. Low detection. Growing fast.

L3 audited enterprise entities cryptographically verify that the call is genuinely from that organisation — not a spoofed number.
Parallel verification — a fundamentally different approach

Traditional fraud defenses are reactive — they analyze patterns after the fact or flag numbers after victims have already been harmed. IamMe runs in parallel with every call, delivering cryptographic proof of identity before the phone rings. Every threat above requires faking an identity that cannot be faked. The token is unforgeable, hardware-bound, and verified in milliseconds.

Enterprise

Your calls get answered.
Your brand gets trusted.

When customers see your name before you call, answer rates rise and fraud exposure falls. One API call before you dial — no telephony changes required.

No SDK required to start
A single POST before every outbound call. Works with any existing telephony stack or CCaaS platform.
Embed in your own app
Integrate the IamMe SDK and verification appears inside your branded experience.
L3 Audited — green from day one
Enterprise entities receive the highest trust level. Recipients see "is verified" in green immediately.
Request enterprise access
🏦
Financial Services

Account alerts, fraud warnings, loan officer calls. Every outbound call from your institution arrives verified. Customers answer. Trust is restored.

🏛️
Government & Public Sector

Benefits agencies, revenue services, public health — citizens are conditioned to distrust government calls. Verified identity restores credibility at scale.

🏥
Healthcare

Appointment reminders, care team follow-ups, prescription notifications. Patients answer verified providers. Missed appointments fall. Outcomes improve.

Individuals

Your calls stand out.
For the right reasons.

Enroll once. Every call you make shows your verified identity to the recipient — before their phone rings. You get answered. They feel safe answering.

Enroll in minutes
Phone verification, biometric key generation — identity cryptographically bound to your device.
Contacts stay on your device
Used to show familiar names when calls arrive. Never uploaded. Never stored. Never transmitted.
Trust grows over time
Your verification level rises with confirmed call history — from Enrolled to Confirmed.
Enrollment in 4 steps
1
Verify your phone number
OTP confirms you own the number
2
Set your display name
What recipients see when you call
3
Create your device key
Face ID or Touch ID — key stored in Secure Enclave
4
You're in the network
Start placing verified calls immediately
C
Cindy P
End-to-end encrypted
Hey — free for a quick call at 3?
Cindy P · 2:47 PM
Yes — verifying now, calling in a sec
You · 2:48 PM
Got the notification. Answered 👍
Cindy P · 2:49 PM
Message encrypted
Secure Messaging

The same identity.
End-to-end encrypted.

Device keys established at enrollment unlock more than verified calls. IamMe's secure messaging uses the same hardware-protected keypairs to establish end-to-end encrypted channels — without a separate key exchange.

Keys already on device
Enrollment generates hardware-protected keypairs. No separate key exchange needed.
Identity-verified threads
Every message comes from a verified sender. No spoofed senders. No impersonation.
Seamless for enterprise
Open encrypted channels directly with enrolled customers — verified, auditable, HIPAA-friendly.
Trust Model

Trust is earned, not assumed

Verification levels reflect real-world trust. Enrollment is the start — confirmed history and institutional auditing earn higher standing.

L1
Enrolled
Verification in progress
"[Name] is being verified"

Phone ownership verified. Biometric device key generated. Trust is building through call history.

Earned by: Completing enrollment
L2
Confirmed
Earned trust
"[Name] is verified"

A history of confirmed calls — real interactions with real people. The network has seen this identity behave consistently.

Earned by: Confirmed call history
L3
Audited
Institutional trust
"[Org name] is verified"

Reserved for enterprises, government entities, and institutions. Identity verified through audit — the highest level of trust in the network.

Earned by: Enterprise registration + audit
Developers

One API call.
Before you dial.

Enterprise integration is a single POST request before every outbound call. Your telephony stack doesn't change.

Get API credentials
Before dialing
# Before every outbound call
curl -X POST https://api.iamme.ai/v1/attest \
  -H "Authorization: Bearer <your_api_key>" \
  -d '{
    "from_number": "+18005551000",
    "to_number":   "+15551234567",
    "comm_type":   "call",
    "purpose":     "account_verification"
  }'

# Then dial normally
{
  "status":      "delivered",
  "expires_in":  60,
  "delivery_id": "del_a1b2c3d4"
}

Ready to be trusted?

Whether you're evaluating enterprise integration or exploring the API — we'd like to hear from you.

Or reach us at hello@iamme.ai