Documentation Index
Fetch the complete documentation index at: https://developer.prove.com/llms.txt
Use this file to discover all available pages before exploring further.
Prove Human Assurance solution
Prove Human Assurance helps businesses treat human presence as a first-class signal: in real time, it separates genuine people from malicious automation before downstream cost and fraud. It passively evaluates whether a phone number behaves like a human authenticator tied to a credible device, contrasting typical consumer-phone behavior with patterns common to virtual machines, emulators, and IoT SIM–class endpoints that often show up in scripted or tolling abuse. Signals draw on phone reputation and activity, longitudinal tenure and authentication history, and device-oriented intelligence from Prove’s identity graph. It is not a substitute for your own controls, and it does not treat IP address or browser fingerprint alone as proof of a real human behind the interaction. Typical program goals teams pair with Human Assurance include:- Catching SMS pumping and toll-style abuse before you send large volumes of OTP or challenge traffic
- Slowing scripted signups and developer-style account abuse at the top of the funnel
- Surfacing low-tenure or suspicious numbers that lack credible human usage before you fully onboard or entitle an account
/v3/verify outcomes—including assurance level and policy-related fields interpreted through Global Fraud Policy—so your application can allow, step up, or block.
Human Assurance is available globally.

How fits together
At a high level, rests on Authenticate, Verify, and optionally Manage. They describe how the real-time product is structured, not a rigid checklist: your integration may combine or revisit them depending on channel, risk, and whether the customer already has a bound Prove Key.Authenticate (possession)
Authenticate means proving possession of the phone number. Your app integrates Prove’s Authenticate SDK (Web, iOS, or Android) so the customer can complete possession on the device. That establishes trust in the device and number before or alongside your server-side checks. End-to-end setup—including how your back end coordinates with Prove—is covered in the Authenticate guide.Verify
Verify is your back end callingPOST /v3/verify with the verification type and the inputs your flow requires to obtain a verification result and, when successful, identifiers such as proveId that you can persist for later calls, support, and linking to other Prove capabilities. End-to-end setup, Sandbox testing, and response handling are in the Verify guide.

