Setup Complete
Customer device is registered and ready for secure verification
Verify an Email
Check if an email you received is genuinely from your solicitor and hasn't been tampered with
Submit an Instruction
Send verified instructions to your solicitor with cryptographic proof of authenticity
Add Another Device
Register your tablet, laptop, or other devices for secure verification
Security Tips
Learn best practices for protecting your matter and recognizing fraud attempts
Device Binding
Your passkey is bound to this device's hardware. Cannot be copied, exported, or stolen.
Matter Protection
Only you can authorize instructions for RC-2024-1847. Prevents payment redirection fraud.
Instant Verification
One tap with Face ID or Touch ID to verify emails or submit instructions securely.
Phishing Resistant
Your passkey only works on legitimate shepwedd.com domains. Fake sites cannot use it.
Hardware Security
Private key stored in Secure Enclave/TPM. Unreachable by malware or attackers.
Audit Trail
Every verification and instruction is logged with cryptographic proof and timestamps.
🔄 Ongoing Customer Operations
✉️ Verifying Firm Emails
- Customer receives email with verification reference (REF-xxxx)
- Goes to verification portal
- Signs in with passkey
- Enters reference code
- Sees cryptographically verified result
📝 Sending Instructions
- Customer signs into portal with passkey
- Submits structured instructions (e.g., bank details)
- Approves with passkey (digital signature)
- System creates CREF-xxxx reference
- Agent verifies instruction before acting
📱 Adding Second Device
- Authenticate with first device (existing passkey)
- Register second device's passkey
- Both devices tied to same identity
- Use either device for verification
- Independent revocation possible
🔧 Access Management & Control
Firm org admins and agents with permission can manage customer access for security purposes:
Note: Customers cannot self-remove access as this affects firm-side security, but they can request removal through their solicitor. All access changes are logged with timestamps and admin attribution.