Identity Verification


Identity verification is an important security tool in the fight against new account fraud. When opening a bank account, asking for a loan, or going through other financial transactions, it’s critical to ensure that the person you’re dealing with is who they say they are.

Biometrics are computer-assisted techniques of identity verification based on observable biological and behavioural features.

  • Physical Attributes
    • Iris 
    • Hand 
    • Geometry 
    • Face 
    • Fingerprint 
    • Eye 
    • Vein
  • Behavioural Attributes
    • Signature 
    • Keystroke 
    • Handwriting 
    • Gait 
    • Voice

Digital identity verification sends facial biometric or an ID document to a confirmed data set.

  • On-board with ID and Selfie
  • Passive Liveness
  • Digital Versions of Trusted Government ID

An entered address is compared to multiple address sources to provide a validation of the address against these trusted sources.

  • Drivers License
  • Telco – Address Verification
  • Address Reference Check
  • Banking Profile – Address Verification
  • Credit Bureau Address Verification
  • Bank Statements
  • Utility Bill
  • Property Tax Bill

Reverse email lookup allows you to input an email address and obtain personal information about:

  • The owner
  • First name
  • Last names
  • Address
  • Phone number
  • Social media profiles
  • Other technical details about the email address

Analyze IP addresses to see where users really login from, flag suspicious VPNs, TOR users and risky locations

  • IP Fraud Score
  • Public IP Address
  • Private IP Address
    • Geolocation
    • Internet Service Provider
    • Open port scan
    • Spam checklist scan

Unlike fraud detection based on IP and GPS alone, location technology incorporates data from:

  • GPS
  • WiFi
  • Cellular
  • Bluetooth sensors
  • Identify location faking

When people communicate with each other on the internet, they leave a digital fingerprint that identifies their regular patterns of activity. Our notion of account identification is influenced by networks, devices, locations, and times of day.

  • Metadata
  • Signals
  • Scoring

Accurate mobile fraud detection with minimal false-positive rates, based on network, location, and device intelligence data to quietly distinguish trustworthy individuals based on their unique behaviour patterns.

  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics

Layout