Here are some typical real-world applications of the Authoriti Permission Code® platform:

The Authoriti Permission Code Platform: Use Case Scenarios



  • Cybercriminals are attacking organizations' vendor payments process using elaborate Business Email Compromise (BEC) scams where bad actors will try to substitute payment information or submit phony invoices for payment.

  • Finance/accounts payable staff are struggling to ensure that funds are being directed to the vendor's legitimate accounts.  

  • The challenge is to eliminate the possibility of funds being inadvertently stolen by criminals perpetuating BEC vendor invoice fraud.


  • Vendors submit an Authoriti Permission Code® smart PIN with their invoice or payment change request.

  • The smart PIN contains the details of the transaction to prevent it from being misused, and guarantees that the invoice amount and payment details are digitally signed and originated from the original vendor and none other.

  • The Permission Code allows an organization to easily validate that the changes to payment instructions are authentic, and to validate an invoice before making payments. This provides absolute confidence and trust in the transaction regardless of the channel used (email, telephone, fax, online, etc.).



  • Banks challenge customers to prove their identity before executing a transaction, commonly using delayed “call-backs” to verify wire instructions above a certain amount or to a new beneficiary.

  • The confirmation call is a nuisance to the customer, and may well be rerouted if a fraudster is on the other end of the line.


  • Customers submit a Permission Code PIN with or as their transaction request. 

  • The smart PIN details transaction terms to prevent it from being misused, and guarantees that the wire transfer originates with and is authorized by the customer and none other.



  • Customers seeking assistance are regularly irritated by layers of automated system prompts, followed by a series of questions once they reach a real person.

  • Data collected for call analytics (e.g. call purpose) is usually entered manually by the call rep, wasting valuable time and creating the potential for error and bias.


  • With Authoriti, call center reps know the caller and the reason for his/her call before it rings. 

  • Calls can be pre-routed based on the call purpose, eliminating complaints about IVR menus. Reps don’t need to challenge customers to prove their identity.

  • Data regarding the reason(s) for the call is automatically captured for analytics, providing high quality data without post call handling.



  • Information privacy concerns across the digital landscape will require information owners to create detailed records of their authorization to share specific data.

  • Such records are more complicated when authorization is delegated to a 3rd Party acting on the owner’s behalf, often through channels and at times when the three parties are not in contact.


  • Information owners provide the 3rd Party with a Permission Code™ PIN that details the identity of the 3rd Party, the information to be shared, and time the information is to be available.

  • The 3rd Party presents the PIN to the data holder, who can validate that the 3rd Party is authorized by the owner to receive the information and release the data with confidence.



  • Real estate escrow accounts are exposed when fraudsters change wire transfer disbursement instructions to reroute money. Attorneys and title companies that manage escrow accounts are at risk.

  • $969 million was “diverted or attempted to be diverted” from real estate purchase transactions in 2017. (FBI data.)


  • Require Permission Code PINs from anyone providing new or changed wire instructions.

  • Using their smart phone, legitimate parties can easily provide secure payment details. The escrow holder can confirm the instructions are authorized and came from the correct party.



  • Independent physicians billing through the health system can duplicate bills, upcode, or bill for services not rendered.

  • This impacts both the health system’s insurance company as well as relationships with other insurance providers.


  • Patients give physicians a Permission Code PIN that explicitly authorizes the use of their information for insurance billing.

  • Authorization to bill provides confidence that services were rendered as described.



  • There is a need to share data for collaboration, but also to ensure that access isn’t over entitled.


  • The data owner generates a Permission Code that limits types of data that can be shared – what, when and where. The API or portal authenticates the third party and checks their code against the data requested. Restricting access to this necessary information limits potential leakage and harm.

Please reload

Copyright © 2018-2020, The Authoriti Network, Inc. All rights reserved. 
The Authoriti logo and the Permission Code® platform are registered trademarks of The Authoriti Network.
Eliminate Friction and Fraud™, Frictionless Security. Delivered.™

      and the Authoriti "A" mark are trademarks of The Authoriti Network.        

Contact | ResourcesPolicies 

  • LinkedIn Social Icon
  • Twitter
  • YouTube