Alyke Recognition

About Customer

Industry: Gen AI

This is an innovative online platform designed to help you connect with like-minded individuals who share your interests and personality traits. Leveraging advanced AI technology, It provides personalized recommendations for potential friends, ensuring compatibility and mutual understanding.

Current Infra

Using web platform on AWS, utilizing EC2 instances for servers and RDS for databases. Authentication primarily relies on traditional methods such as passwords and two-factor authentication (2FA) via SMS or email. Security measures include HTTPS encryption for data transmission and regular security audits. Despite its robust infrastructure, It faces challenges with security breaches and user experience friction during authentication. To address these issues, It is exploring innovative solutions like Amazon Recognition for facial recognition-based authentication to enhance security and streamline the authentication process, ensuring a seamless and secure experience for its users.

The Challenge

Here are the challenges faced when the Amazon Recognition service is not implemented:

  • Limited image and video analysis capabilities without Amazon Recognition.
  • Reliance on manual image processing methods, increasing workload and reducing operational efficiency.
  • Challenges in implementing advanced features like image-based search and content moderation.
  • Prolonged development time and higher maintenance costs for custom solutions.
  • Risk of inaccurate results compared to mature AI-powered services.
  • Difficulty integrating image analysis functionalities with other AWS services.

The Solution

Amazon Cognito, AWS Lambda, and Amazon API Gateway play crucial roles in integrating with Amazon Recognition to create a comprehensive and scalable solution for image and video analysis. Here’s how each service contributes:

1.  Implementing Amazon Recognition:

  • Integrated Recognition into authentication for facial recognition-based login.
  • Leveraged Recognition's facial analysis for secure user identity verification.

2. Enhanced Authentication with Amazon Cognito:

  • Used Cognito for user authentication and secure identity storage.
  • Integrated Cognito with Recognition for seamless facial recognition authentication.

3. Serverless Architecture with AWS Lambda:

  • Implemented serverless architecture using Lambda for authentication and Recognition interaction.
  • Lambda functions processed user images triggered by login attempts for facial recognition.

4. Real-Time Monitoring with Amazon CloudWatch:

  • Set up CloudWatch alarms to monitor authentication events.
  • Utilized CloudWatch logs and metrics for real-time insights into system performance and user behaviour.

5. Amazon Cognito:

  • Manages user authentication and authorization, ensuring secure Recognition access.

6. AWS Lambda:

  • Preprocesses data and handles authentication requests for Recognition.

7. Amazon API Gateway:

  • Creates and manages RESTful APIs for seamless Recognition integration, ensuring scalability and flexibility.

Scalability and Infrastructure Management

1. Amazon EC2 Auto Scaling: Implement EC2 Auto Scaling to automatically adjust compute resources based on demand. This ensures optimal performance and cost-efficiency during varying traffic conditions.

2. Elastic Load Balancing (ELB): Deploy Elastic Load Balancing to distribute incoming traffic across multiple Amazon EC2 instances. This setup will enhance the application's availability and reliability, providing a seamless user experience.

3. Amazon CloudWatch: Set up Amazon CloudWatch for comprehensive monitoring and management of application performance. CloudWatch will provide real-time insights and alerts, enabling proactive identification and resolution of potential issues.


1. We have implemented an AWS WAF and all the traffic from the internet is coming through WAF towards infra

2. All the important instances are in the private subnet so that public access can't be achieved.

3. For the developer, VPN is provided to access the infra for development-related management and upgradations.

4. IAM, KMS and Secret Manager are also deployed to handle the access management and security of the cryptographic data

5. MFA is deployed to ensure the verified access on the infrastructure.

6. The infrastructure is well architected and as per the best practices of the AWS to achieve the security.


1. A multi-AZ infrastructure has been architected for this customer.

2. Snapshots are being taken properly with a defined frequency and kept within S3, as-per-required retention period.

Solution Architecture

Why AWS?

AWS is designed to allow application providers, ISVs, and vendors to quickly and securely host your applications – whether an existing application or a new SaaS-based application. You can use the AWS Management Console or well-documented web services APIs to access AWS's application hosting platform. AWS utilizes an end-to-end approach to secure and harden our infrastructure, including physical, operational, and software measures. For more information, see the AWS Security Center.
Using AWS tools, Auto Scaling, and Elastic Load Balancing, your application can scale up or down based on demand. Backed by Amazon's massive infrastructure, you have access to compute and storage resources when you need them. With AWS, you take advantage of a scalable, reliable, and secure global computing infrastructure, the virtual backbone of's multi-billion dollar online business that has been honed for over a decade.

Why i2k2?

Our strategy

Cloud Computing – We are highly proficient in cloud hosting serving more than 4000 Corporates with 14000+ VMs and Physical servers mainly in India.

Cloud Consulting – We are adept at delivering solutions on public cloud, private cloud, and Hybrid cloud. We are partners with AWS, Azure, Google, and other cloud providers.

Our mission
Focus to service our customers and create products that are extremely user-centric and solution-oriented with a highly-skilled technical team and a vast experience in the technology space, we have been developing products that are solving real-life issues that can service the masses

Our vision
We offer tailor-made solutions and services so that businesses can leverage the maximum benefits through us. We ensure that the delivery and quality parameters are met and remain committed to the best possible customer experience

Please fill in the details to download Case Study

Request A Call Back

Enter Captcha: captcha