Technology & security for critical environments
DeepForgery combines explainable forensic AI, human forgery detection, protected temporary processing, and European governance to secure sensitive document workflows.
A processing pipeline with automatic deletion
Files may be stored temporarily in protected private storage during processing, then are automatically deleted at the end of the workflow.
Secure ingestion
TLS 1.3, format checks, and input validation before analysis.
Forensic analysis
Multi-layer detection with explainable scoring on your content.
Post-analysis deletion
In the standard workflow, uploaded files are automatically deleted once processing is complete.
How it works, simply
Your file follows a short lifecycle: upload, secure intake, scan, post-analysis deletion, then result delivery.
-
01 File upload
The user sends the document through the interface or encrypted API.
-
02 Controlled intake
The service receives the file, validates its format, and isolates it in protected processing storage.
-
03 Forensic scan
The engine detects fraud signals and computes an explainable score.
-
04 Post-analysis deletion
In the standard workflow, the uploaded file and temporary artifacts are automatically deleted after processing.
-
05 Response returned
The verdict and explanations are returned to the user; uploaded content is not retained beyond standard processing.
Keeps
Only the analysis result and strictly necessary technical metadata.
Deletes
The uploaded source file and temporary copies created during processing.
Returns
An actionable response: status, risk score, and explanation elements.
API Request (JSON)
POST /api/v1/analyze{
"endpoint": "POST /api/v1/analyze",
"payload": {
"file_name": "identity-card.png",
"mime_type": "image/png",
"content_base64": "iVBORw0KGgoAAAANSUhEUgAA..."
},
"storage_policy": "standard_temporary_processing"
}
API Response (JSON)
200 OK{
"analysis_id": "an_8Y1Q5",
"result": "completed",
"report_status": "available",
"file_lifecycle": "deleted_after_processing",
"metadata_scope": "technical_minimum"
}
Auditable decisions, robust architecture
XAI explainability
Actionable reports to justify decisions in internal and external audits.
Strong encryption
AES-256 for data and TLS 1.3 for data in transit.
European sovereignty
European infrastructure and governance adapted to regulated environments.
Flexible deployment
Choose the level of control that fits your organization.
Sovereign Cloud API
Fast go-live, managed operations, and high availability.
On-Premise / Air-Gapped
For critical sectors (CNI, defense, finance): local model execution, including offline.
View On-Premise requirementsLet's design your trust architecture
Talk to our experts to define the deployment model that matches your constraints.