Proxy Platform
Cipher's Proxy Platform is a drop-in, OpenAI-compatible gateway that adds real-time trust verification, risk controls, and analytics in front of your LLM provider.
The platform integrates seamlessly with voice-agent platforms like ElevenLabs and Vapi by replacing their LLM URL with a single endpoint. No code changes required—just point your provider to Cipher and get instant protection.
How it works
Understanding Cipher's request flow and verification process
Incoming requests stream to Cipher at POST /v1/chat/completions. Your voice agent platform sends standard OpenAI-formatted requests.
Cipher performs real-time verification and monitoring while maintaining streaming behavior. Phone numbers are verified via Twilio, and prompts are analyzed for injection attacks.
When trust thresholds are met, Cipher forwards to your configured downstream model (GPT-4o, Claude, etc.) and relays the response back in real-time.
Key features
What makes Cipher's proxy platform unique
Real-time Verification
Verify caller identities via Twilio phone lookup before LLM responses are generated. Block fraudulent callers automatically.
Prompt Injection Detection
Analyze incoming prompts for malicious patterns and injection attempts. Protect your agents from adversarial inputs.
OpenAI Compatible
Drop-in replacement for OpenAI's API. Works with any platform that supports custom LLM endpoints with streaming.
Zero Latency Impact
Verification happens in parallel with LLM streaming. Your users experience no added delay in responses.
Supported models
Use your preferred LLM provider with Cipher's proxy
Cipher's proxy is compatible with leading LLM providers. Configure your downstream model through the dashboard or API.
| Provider | Models |
|---|---|
| Gemini 2.5 Flash, Gemini 2.0 Flash, Gemini 2.0 Flash Lite, Gemini 1.5 Flash, Gemini 1.5 Pro | |
| OpenAI | GPT-4.1, GPT-4.1 Mini, GPT-4.1 Nano, GPT-4o, GPT-4o Mini, GPT-4 Turbo, GPT-4, GPT-3.5 Turbo |
| Anthropic | Claude Sonnet 4, Claude 3.5 Sonnet, Claude 3.5 Sonnet v1, Claude 3.7 Sonnet, Claude 3.0 Haiku |
| Groq | Llama 3.1 70B, Llama 3.1 8B, Mixtral 8x7B |
Popular applications
Industries and use cases where Cipher adds value
Organizations across regulated industries use Cipher to add caller verification and fraud prevention to their voice AI applications.
Healthcare & Medical
- •EHR access verification: Voice agents that verify patient identity before accessing electronic health records, ensuring HIPAA compliance.
- •Appointment scheduling: Automated scheduling assistants that verify patient information and update appointments with confidence.
- •Prescription refills: Voice agents that handle medication refill requests with proper caller authentication.
- •Insurance verification: Automated systems that verify insurance eligibility and benefits by confirming caller identity.
Financial Services
- •Account balance inquiries: Voice banking assistants that verify customer identity before disclosing sensitive account information.
- •Loan applications: Automated loan processing that authenticates applicants and collects verified personal information.
- •Fraud prevention: Real-time detection of suspicious callers attempting account takeover or social engineering attacks.
- •Payment authorization: Voice agents that verify caller identity before processing transfers or payments.
Legal Services
- •Client intake: Automated intake systems that verify new client information before case creation.
- •Case status updates: Voice agents that authenticate clients before discussing confidential case details.
- •Document access: Secure portals accessed via voice with multi-factor verification using Cipher.
- •Compliance documentation: Audit trails of verified caller interactions for regulatory compliance.
Government & Public Services
- •Benefits verification: Automated systems that verify eligibility for government assistance programs.
- •Citizen services: Voice agents that handle public inquiries while maintaining identity verification standards.
- •Tax information: IRS-style voice systems that verify taxpayer identity before discussing sensitive information.
Insurance
- •Claims processing: Voice agents that verify policyholder identity before accepting or updating claims.
- •Policy inquiries: Automated systems that authenticate callers before disclosing coverage details.
- •Fraud detection: Real-time identification of suspicious claims or identity theft attempts.