DEEPFORGERY TRUST CENTER

Technology & security for critical environments

DeepForgery combines explainable forensic AI, human forgery detection, protected temporary processing, and European governance to secure sensitive document workflows.

< 2s
Indicative average processing time depending on file type and load.
After analysis
In the standard workflow, uploaded files are automatically deleted once processing is complete.
EU
Governance and operations aligned with European requirements.
Short-Lived Processing

A processing pipeline with automatic deletion

Files may be stored temporarily in protected private storage during processing, then are automatically deleted at the end of the workflow.

01

Secure ingestion

TLS 1.3, format checks, and input validation before analysis.

02

Forensic analysis

Multi-layer detection with explainable scoring on your content.

03

Post-analysis deletion

In the standard workflow, uploaded files are automatically deleted once processing is complete.

Processing diagram

How it works, simply

Your file follows a short lifecycle: upload, secure intake, scan, post-analysis deletion, then result delivery.

  1. 01

    File upload

    The user sends the document through the interface or encrypted API.

  2. 02

    Controlled intake

    The service receives the file, validates its format, and isolates it in protected processing storage.

  3. 03

    Forensic scan

    The engine detects fraud signals and computes an explainable score.

  4. 04

    Post-analysis deletion

    In the standard workflow, the uploaded file and temporary artifacts are automatically deleted after processing.

  5. 05

    Response returned

    The verdict and explanations are returned to the user; uploaded content is not retained beyond standard processing.

Keeps

Only the analysis result and strictly necessary technical metadata.

Deletes

The uploaded source file and temporary copies created during processing.

Returns

An actionable response: status, risk score, and explanation elements.

API Request (JSON)

POST /api/v1/analyze
{
  "endpoint": "POST /api/v1/analyze",
  "payload": {
    "file_name": "identity-card.png",
    "mime_type": "image/png",
    "content_base64": "iVBORw0KGgoAAAANSUhEUgAA..."
  },
  "storage_policy": "standard_temporary_processing"
}

API Response (JSON)

200 OK
{
  "analysis_id": "an_8Y1Q5",
  "result": "completed",
  "report_status": "available",
  "file_lifecycle": "deleted_after_processing",
  "metadata_scope": "technical_minimum"
}
Compliance & standards

Auditable decisions, robust architecture

XAI explainability

Actionable reports to justify decisions in internal and external audits.

Strong encryption

AES-256 for data and TLS 1.3 for data in transit.

European sovereignty

European infrastructure and governance adapted to regulated environments.

Flexible deployment

Choose the level of control that fits your organization.

Sovereign Cloud API

Fast go-live, managed operations, and high availability.

Ideal for accelerating adoption without increasing maintenance overhead.

Let's design your trust architecture

Talk to our experts to define the deployment model that matches your constraints.