Alyke Recognition

About Customer

Industry: Gen AI

Our client operates a widely used friendship application designed to connect users through shared interests, activities, and mutual connections. To elevate user engagement and satisfaction, the client seeks to implement superior friend recommendation capabilities and robust customer support, alongside integrating advanced image recognition functionalities into their mobile application.

Current Infra

A leading fintech company, hosts its web platform on AWS, utilizing EC2 instances for servers and RDS for databases. Authentication primarily relies on traditional methods such as passwords and two-factor authentication (2FA) via SMS or email. Security measures include HTTPS encryption for data transmission and regular security audits. Despite its robust infrastructure, It faces challenges with security breaches and user experience friction during authentication. To address these issues, TechSecure is exploring innovative solutions like Amazon Rekognition for facial recognition-based authentication to enhance security and streamline the authentication process, ensuring a seamless and secure experience for its users.

The Challenge

Here are the challenges faced when the Amazon Rekognition service is not implemented:

  • Limited image and video analysis capabilities without Amazon Rekognition.
  • Reliance on manual image processing methods, increasing workload and reducing operational efficiency.
  • Challenges in implementing advanced features like image-based search and content moderation.
  • Prolonged development time and higher maintenance costs for custom solutions.
  • Risk of inaccurate results compared to mature AI-powered services.
  • Difficulty integrating image analysis functionalities with other AWS services.

The Solution

Amazon Cognito, AWS Lambda, and Amazon API Gateway play crucial roles in integrating with Amazon Rekognition to create a comprehensive and scalable solution for image and video analysis. Here’s how each service contributes:

1.  Implementing Amazon Recognition:

  • Integrated Rekognition into authentication for facial recognition-based login.
  • Leveraged Rekognition’s facial analysis for secure user identity verification.

2. Enhanced Authentication with Amazon Cognito:

  • Used Cognito for user authentication and secure identity storage.
  • Integrated Cognito with Rekognition for seamless facial recognition authentication.

3. Serverless Architecture with AWS Lambda:

  • Implemented serverless architecture using Lambda for authentication and Rekognition interaction.
  • Lambda functions processed user images triggered by login attempts for facial recognition.

4. Real-Time Monitoring with Amazon CloudWatch:

  • Set up CloudWatch alarms to monitor authentication events.
  • Utilized CloudWatch logs and metrics for real-time insights into system performance and user behavior.

5. Amazon Cognito:

  • Manages user authentication and authorization, ensuring secure Rekognition access.

6. AWS Lambda:

  • Preprocesses data and handles authentication requests for Rekognition.

7. Amazon API Gateway:

  • Creates and manages RESTful APIs for seamless Rekognition integration, ensuring scalability and flexibility.

Scalability and Infrastructure Management

1. Amazon EC2 Auto Scaling: Implement EC2 Auto Scaling to automatically adjust compute resources based on demand. This ensures optimal performance and cost-efficiency during varying traffic conditions.

2. Elastic Load Balancing (ELB): Deploy Elastic Load Balancing to distribute incoming traffic across multiple Amazon EC2 instances. This setup will enhance the application's availability and reliability, providing a seamless user experience.

3. Amazon CloudWatch: Set up Amazon CloudWatch for comprehensive monitoring and management of application performance. CloudWatch will provide real-time insights and alerts, enabling proactive identification and resolution of potential issues.


1. We have implemented an AWS WAF and all the traffic from the internet is coming through WAF towards infra

2. All the important instances are in the private subnet so that public access can't be achieved.

3. For the developer, VPN is provided to access the infra for development-related management and upgradations.

4. IAM, KMS and Secret Manager are also deployed to handle the access management and security of the cryptographic data

5. MFA is deployed to ensure the verified access on the infrastructure.

6. The infrastructure is well architected and as per the best practices of the AWS to achieve the security.


1. A multi-AZ infrastructure has been architected for this customer.

2. Snapshots are being taken properly with a defined frequency and kept within S3, as-per-required retention period.

Solution Architecture

Why AWS?

AWS is designed to allow application providers, ISVs, and vendors to quickly and securely host your applications – whether an existing application or a new SaaS-based application. You can use the AWS Management Console or well-documented web services APIs to access AWS's application hosting platform. AWS utilizes an end-to-end approach to secure and harden our infrastructure, including physical, operational, and software measures. For more information, see the AWS Security Center.
Using AWS tools, Auto Scaling, and Elastic Load Balancing, your application can scale up or down based on demand. Backed by Amazon's massive infrastructure, you have access to compute and storage resources when you need them. With AWS, you take advantage of a scalable, reliable, and secure global computing infrastructure, the virtual backbone of's multi-billion dollar online business that has been honed for over a decade.

Why i2k2?

Our strategy

Cloud Computing – We are highly proficient in cloud hosting serving more than 4000 Corporates with 14000+ VMs and Physical servers mainly in India.

Cloud Consulting – We are adept at delivering solutions on public cloud, private cloud, and Hybrid cloud. We are partners with AWS, Azure, Google, and other cloud providers.

Our mission
Focus to service our customers and create products that are extremely user-centric and solution-oriented with a highly-skilled technical team and a vast experience in the technology space, we have been developing products that are solving real-life issues that can service the masses

Our vision
We offer tailor-made solutions and services so that businesses can leverage the maximum benefits through us. We ensure that the delivery and quality parameters are met and remain committed to the best possible customer experience

Please fill in the details to download Case Study

Request A Call Back

Enter Captcha: captcha