Real-World Flow

How LiveLock Works

From team setup to verified action — a complete walkthrough of every step, in plain language.

< 5 min

Setup time

10–30 sec

Verification time

2 people

Parties required

Out-of-band

Channels used

Phase 1 — One Time

Team Setup

Enroll your team once. Takes under 5 minutes per person.

A

Install LiveLock and invite team members by email address

Admin (IT or CFO)

Works like Slack or Microsoft Teams onboarding — enter each person's work email and they receive an invite link. No IT department required.

B

Download the app and register their device

Each Team Member

Each person installs LiveLock on their phone or laptop. Their device is cryptographically registered — this is the "something you have" factor that AI cannot replicate.

C

Complete one-time identity binding

Each Team Member

A short video selfie, SMS confirmation, and optional PIN ties their real identity to their registered device. This is the anchor that makes the challenge words meaningful.

D

Approve members into the Trusted Network

Admin

Only admin-approved members can send or receive verification requests. The result is a closed, verified team roster — like a corporate contact book where every entry has been identity-verified.

Phase 2 — Every High-Risk Action

The Trigger

A push notification — not a phone call — on a separate channel AI cannot reach.

E

Is about to take a high-risk action

Sarah (Requester)

Examples: approving a wire transfer, granting system access, signing a contract, authorizing a personnel change. Any action that cannot be undone.

F

Opens LiveLock and starts a verification request

Sarah

In Model A, Sarah manually opens LiveLock before the action. She selects who to verify with (e.g. Marcus, CEO) and what the action is (e.g. Wire Transfer — $180,000).

G

Receives a silent push notification on his registered device

Marcus (Approver)

The request travels through LiveLock's encrypted channel — completely separate from email, phone, or any channel an attacker might control. A deepfake on a video call cannot intercept this.

Phase 3 — 10 to 30 Seconds

Live Verification

Two-round asymmetric challenge. Both parties verify each other.

H

A live session begins — both phones show the same session ID

Both open LiveLock

The session is time-limited and one-time. The challenge words are generated fresh for every session and expire immediately after use.

I

Round 1: Sarah's app shows "SAY: FALCON." Marcus's app shows "YOU WILL HEAR: FALCON."

Sarah (speaks first)

The requester always speaks first. This lets the approver verify the requester's identity before they see or approve anything. Marcus confirms he heard the correct word.

J

Round 2: Marcus's app shows "SAY: COBALT." Sarah's app shows "YOU WILL HEAR: COBALT."

Marcus (speaks second)

Now Sarah verifies Marcus — confirming she is not talking to a man-in-the-middle or a deepfake impersonating her CEO. Neither party trusts the other until both rounds are complete.

K

Both tap Approve in the app

Both

The session is cryptographically signed with both parties' device keys and a timestamp. This creates a tamper-evident record that both parties were present and consented.

Phase 4 — Immediate

Action Released

The action proceeds. The session is permanently logged.

L

Proceeds with the original action

Sarah

With both identities confirmed, Sarah can now send the wire, grant the access, or sign the document — with full confidence she spoke to the real Marcus.

M

Writes an immutable audit log entry

LiveLock

The log records: who verified, who approved, what action was authorized, what challenge words were used, the exact timestamp, and both device IDs. This is your compliance and forensic record.

Integration Roadmap

Three Ways to Deploy LiveLock

Start with the standalone app. As your team grows, LiveLock meets you where you already work.

Available Now

Model A — Standalone App

Team members connect via email invite inside LiveLock. Sarah manually opens LiveLock before any high-risk action. No integration with other tools required.

  • Email invite onboarding
  • Manual trigger by requester
  • Push notification to approver
  • Full audit log
+Teams
Coming Soon

Model B — Slack & Teams Plugin

LiveLock lives inside Microsoft Teams or Slack. Verification requests appear as bot messages. Users never leave their existing workflow.

  • Slack bot integration
  • Microsoft Teams app
  • Inline approval workflow
  • Channel-based audit trail
Coming Soon

Model C — API & Webhooks

LiveLock exposes a REST API. Any software — QuickBooks, NetSuite, DocuSign, Salesforce — can trigger a verification request programmatically before releasing a high-risk action.

  • REST API trigger
  • Webhook callbacks
  • Signed approval tokens
  • ERP / accounting integrations

See it in action

Try the interactive split-screen demo — both sides of a live verification session, right in your browser.