DELETE (Biometric Data Deletion)
Purpose
The DELETE operation is designed to irrevocably purge a user’s enrolled biometric data and all associated cryptographic tokens from the system. This operation is critical for:
- Regulatory Compliance: Ensures that biometric data is deleted in accordance with privacy regulations (e.g., GDPR, CCPA).
- Minimizing Attack Surface: Eliminates stored tokens and metadata to prevent future exploitation.
- Data Lifecycle Management: Supports transient verification policies by removing data after use.
Operational Overview
When a DELETE request is initiated, the following steps occur:
-
Credential Verification: The system authenticates the request using
x_api_key
,clientID
, andclientSecret
(or SLC) to confirm authorization. -
User Record Identification: The user is identified via their UUID, precisely targeting biometric and token data for deletion.
-
Secure Data Purging: The system employs cryptographically secure deletion techniques. This involves overwriting memory buffers and invoking secure deletion routines on persistent storage, thereby ensuring that no residual data or cryptographic artifacts remain recoverable.
-
Audit Logging: An immutable audit log entry is generated for the deletion event. This log contains non-sensitive metadata (such as transaction ID and device information) to support compliance and forensic analysis, without exposing any raw biometric data.
Endpoint
POST /v2/verification-session
Expanded Request Body
The DELETE request includes additional parameters for enhanced traceability and secure operation. Below is a detailed JSON schema for the request:
{
"type": "DELETE",
"redirectURL": "https://your-app.com/deletion-callback",
"callback": {
"url": "https://your-api.com/webhook",
"headers": {
"authorization": "Bearer YOUR_TOKEN"
}
},
"transactionID": "txn-delete-445566",
"deviceInfo": {
"os": "Windows 11",
"model": "Dell XPS 15",
"resolution": "1920x1080"
},
"auditTag": "user-initiated-deletion",
"sessionExpiry": 600
}
Parameter Details
- Name
type
- Type
- (String, Required)
- Description
Must be "DELETE" to denote the deletion operation.
- Name
uuid
- Type
- (String, Required)
- Description
User's unique identifier established during registration.
- Name
redirectURL
- Type
- (String, Required)
- Description
Client-side redirect URL after deletion completes.
- Name
callback
- Type
- (Object, Required)
- Description
Contains configuration for the webhook that delivers asynchronous authentication results.
- Name
url
- Type
- (String)
- Description
-
Endpoint for receiving webhook notifications.
- Name
headers
- Type
- (Object)
- Description
-
Additional headers (e.g., authorization) for securing the callback endpoint.
- Name
transactionID
- Type
- (String, Optional)
- Description
Client-generated ID for tracking the deletion event.
- Name
deviceInfo
- Type
- (Object, Optional)
- Description
Client device metadata: OS, model, and resolution.
- Name
auditTag
- Type
- (String, Optional)
- Description
Categorization tag for the audit trail.
- Name
sessionExpiry
- Type
- (Integer, Optional)
- Description
Expiration duration for this session (in seconds).
- Name
debugMode
- Type
- (Boolean, Optional)
- Description
Enable detailed logs (disable in production).
Success Response
A successful DELETE operation returns a JSON payload confirming the deletion, including an audit tag for reference:
{
"message": "Success!",
"status": "success",
"sessionId": "dac57c75-0ed8-40fa-b40e-f0620dbb9444",
"identificationResult": {
"uuid": "123e4567-e89b-12d3-a456-426614174000",
"auditTag": "user-initiated-deletion",
"status": "deleted"
}
}
Cryptographic Considerations
Secure Erasure: The deletion process employs cryptographic erasure techniques to overwrite any stored tokens and biometric data. This ensures that, even if storage media are compromised later, no recoverable data remains. recovery impossible.
Data Purging: Raw biometric data and associated cryptographic tokens are purged from volatile memory immediately after the deletion command is executed. Secure deletion routines ensure that the data is not recoverable by any subsequent process.
Audit Trail Integrity: Deletion events are logged in an immutable audit trail. Although sensitive biometric data is not recorded, metadata such as transaction IDs and device information is cryptographically signed to prevent tampering and ensure traceability.