From team setup to verified action — a complete walkthrough of every step, in plain language.
< 5 min
Setup time
10–30 sec
Verification time
2 people
Parties required
Out-of-band
Channels used
Phase 1 — One Time
Enroll your team once. Takes under 5 minutes per person.
Install LiveLock and invite team members by email address
Admin (IT or CFO)Works like Slack or Microsoft Teams onboarding — enter each person's work email and they receive an invite link. No IT department required.
Download the app and register their device
Each Team MemberEach person installs LiveLock on their phone or laptop. Their device is cryptographically registered — this is the "something you have" factor that AI cannot replicate.
Complete one-time identity binding
Each Team MemberA short video selfie, SMS confirmation, and optional PIN ties their real identity to their registered device. This is the anchor that makes the challenge words meaningful.
Approve members into the Trusted Network
AdminOnly admin-approved members can send or receive verification requests. The result is a closed, verified team roster — like a corporate contact book where every entry has been identity-verified.
Phase 2 — Every High-Risk Action
A push notification — not a phone call — on a separate channel AI cannot reach.
Is about to take a high-risk action
Sarah (Requester)Examples: approving a wire transfer, granting system access, signing a contract, authorizing a personnel change. Any action that cannot be undone.
Opens LiveLock and starts a verification request
SarahIn Model A, Sarah manually opens LiveLock before the action. She selects who to verify with (e.g. Marcus, CEO) and what the action is (e.g. Wire Transfer — $180,000).
Receives a silent push notification on his registered device
Marcus (Approver)The request travels through LiveLock's encrypted channel — completely separate from email, phone, or any channel an attacker might control. A deepfake on a video call cannot intercept this.
Phase 3 — 10 to 30 Seconds
Two-round asymmetric challenge. Both parties verify each other.
A live session begins — both phones show the same session ID
Both open LiveLockThe session is time-limited and one-time. The challenge words are generated fresh for every session and expire immediately after use.
Round 1: Sarah's app shows "SAY: FALCON." Marcus's app shows "YOU WILL HEAR: FALCON."
Sarah (speaks first)The requester always speaks first. This lets the approver verify the requester's identity before they see or approve anything. Marcus confirms he heard the correct word.
Round 2: Marcus's app shows "SAY: COBALT." Sarah's app shows "YOU WILL HEAR: COBALT."
Marcus (speaks second)Now Sarah verifies Marcus — confirming she is not talking to a man-in-the-middle or a deepfake impersonating her CEO. Neither party trusts the other until both rounds are complete.
Both tap Approve in the app
BothThe session is cryptographically signed with both parties' device keys and a timestamp. This creates a tamper-evident record that both parties were present and consented.
Phase 4 — Immediate
The action proceeds. The session is permanently logged.
Proceeds with the original action
SarahWith both identities confirmed, Sarah can now send the wire, grant the access, or sign the document — with full confidence she spoke to the real Marcus.
Writes an immutable audit log entry
LiveLockThe log records: who verified, who approved, what action was authorized, what challenge words were used, the exact timestamp, and both device IDs. This is your compliance and forensic record.
Integration Roadmap
Start with the standalone app. As your team grows, LiveLock meets you where you already work.
Team members connect via email invite inside LiveLock. Sarah manually opens LiveLock before any high-risk action. No integration with other tools required.
LiveLock lives inside Microsoft Teams or Slack. Verification requests appear as bot messages. Users never leave their existing workflow.
LiveLock exposes a REST API. Any software — QuickBooks, NetSuite, DocuSign, Salesforce — can trigger a verification request programmatically before releasing a high-risk action.