Aggregating Identity
Verification Solutions


Connect to a multitude of digital identity solutions with a single API integration
idverifact

Evolving List of Digital Identity Solutions


The IDVerifact platform enables business users to select any combination of data and functionality required to meet specific use cases across multiple business lines. Produce a single composite data payload that meets the needs of each individual use case by aggregating any combination of our growing list of identity-proving attributes.

KYC

Know Your Customer (KYC)

  • Driver’s License
  • Birth Certificate
  • Passport
  • Banking – Bank Supported Credential
  • Banking – Transaction Aggregator
  • Driver’s License
  • Telco Address Verification
  • Address reference check
  • Banking – Transaction Aggregator
  • Credit bureau address verification
  • Document based address verification
  • Banking – Bank Supported Credential
  • Passport
  • Driver’s License
  • Driver’s License Department of Defence
  • Permanent Resident Card
  • Citizenship Card (prior to 2012)
  • Secure Certificate of Indian Status
  • British Columbia Services Card
  • Provincial or Territory Identity Cards
  • Global Entry and Nexus
  • Record of Landing
  • Green Card
  • Credit Bureau Challenge Questions
  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics

As governments and other trusted entities issue digital only identification methods stay ahead of the curve and integrate digital verification quickly into any process. IDVerifact does the heavy lifting on the integration allowing you to quickly leverage digital only identities. 

IP Address

  • Phone Number Social KYC
  • Phone Number Basic Check
  • Phone Number Device and SIM
  • Device Location
  • GPS Data
  • Cellular Sensors
  • Bluetooth Sensors
  • Wi-Fi Scanning

Email Phone IP Combination Detection

Email Address Indicators

  • 150K+ Participating websites (network, device, activity, geography)
  • 1.4 Billion logging in, checking out, registering, online gaming and dating daily
  • Transactional North American population multiple times per week
  • Identify stolen identities at onboarding
  • Trust and risk signals to adjust control at login and provide passwordless enrolments
  • Scanning – Choose a quick ad-hoc scan of an individual or company, or run a batch scan of some or all of your customer base. Select from multiple PEP and Sanctions listing globally. 
  • Ongoing Monitoring – Receive notifications of changes to profiles of matches, or new information affecting your customers, through automatic daily screening against global PEP & Sanction, as well as adverse media data sources. 
  • Due Diligence – Comply with auditing through the integrated due diligence to assign risks and decisions to matched profiles for your customers and applicants.
  • Intelligent Parameters – Customize your scan parameters and Watchlist category selection to meet your organization’s regulatory obligations.
  • Comprehensive Reporting – Create and download reports in PDF, Word, and Excel as part of your KYC obligations, and to meet audit requirements.
  • Whitelists – Create whitelists from due diligence decisions of ‘false match’, to apply to future scans in order to eliminate false positives and reduce your workload.
  • Analysis of 100M+ smartphones globally
  • Increased approval rates of 30%+ while keeping risk and credit loss under control
  • Enhanced product and marketing offers based on existence of competitors apps
  • More detailed segmentation and persona classification based on 50K+ data points
  • Higher level of potential fraud and risk detection based on actual behaviours (high ratio of casino and i-gaming apps, jailbroken device, lower than average contacts, less than 10 apps on device)
  • 100% predictivity with 0% personal data collected
  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics
  • Consumer Credit File
  • iDecision from Equifax
  • Business Credit Report
  • Business Failure Disk Score
  • Commercial Delinquency Score
  • Pay Stubs
  • Notice of Assessment summary
  • Notice of assessment detail
  • Bank Account based verification
  • Employer Outbound Call
  • Bank Statement
  • Employment Letter
  • Employment Payroll
  • Employment Letter
  • Pay Stubs
  • Bank Statement
  • Banking – Transaction Aggregator
  • Employer Reference Check (Outbound)
  • Digital Employment Verification
  • Employment Payroll
  • US Criminal Records
  • Canadian Criminal Records
  • International Criminal Records
  • Passport
  • Driver’s License
  • Driver’s License Department of Defence
  • Permanent Resident Card
  • Citizenship Card (prior to 2012)
  • Secure Certificate of Indian Status
  • British Columbia Services Card
  • Provincial or Territory Identity Cards
  • Global Entry and Nexus
  • Record of Landing
  • Green Card
  • Credit Bureau Challenge Questions
  • Credit Bureau Single Source
  • Credit Bureau Dual Source
  • Credit Bureau Cascade Single to Dual Source
  • Sanctions Basic Check – Current Jurisdiction
  • Sanctions Expanded Check – Multiple Jurisdictions
  • PEP Basic Check – Current Jurisdiction
  • PEP Expanded Check – Multiple Jurisdictions
KNOW YOUR BUSINESS

Know Your Business (KYB)

  • Articles of Incorporation
  • Business Identification Number
  • Certificate of Incorporation
  • Electronic Business Information
  • Beneficial Ownership
  • Beneficial Shareholders
  • Accounting Transactions
  • AR Aging Report
  • AP Aging Report
  • Bills
  • Bill Payments
  • Credit Notes
  • Business Valuation
  • Deposits
  • Invoices
  • Invoice Payments
  • Account Summary
  • Account Detail
  • Account Transactions
  • Automated PPSA/RDPRM, NOSI & UCC processing
  • Upfront lien validations
  • Real-time reporting on PPSA/RDPRM/NOSI/Repair Lien registrations
  • Land Title and Homeowner Verification
  • Turnkey recovery solutions
  • Homeowner Verification (HOV)
  • Canadian Land Title Search
  • Analyzed Debtor/VIN Search
  • Lien Validation and Triggers
  • Unperfected Lien Analysis
  • Batch Remediation (Portfolio Cleanse)
  • UCC Filings
  • Full Due Diligence Searches
  • Multi-name search
  • Corporate Verification
  • Corporate Report
  • Lien Searches

CRAView provides a complete set of tools to obtain reported income from the Canadian Revenue Agency directly without your clients needing to produce hardcopies of notice of assessments or any other documentation. 

  • Lien registrations
  • Lien amendments
  • Lien renewals
  • Lien discharges

Integrate general ledger systems seamlessly to streamline accounts payable operations, saving time and money for your clients. Allow your clients to manage the scheduling, execution, and tracking of payments by allowing them to access accounts payable data through online banking systems.

Eliminate the agony and tedium of maintaining your clients’ accounts receivable, resulting in faster payments and happy suppliers. More time may be spent on productive work, allowing your clients’ businesses to expand quicker, by automating invoicing and reconciling bills to payments.

Dynamic Negotiation enables your client’s firm to proactively offer consumers and suppliers faster or extended payment terms in exchange for a discount or premium. Dynamic Negotiations improves consumer and supplier connections while keeping their business healthy.

  • Enable client directed consent and data sharing among various lines of business​
  • Save significant technical costs with a scalable data integration pattern​
  • Earn customer loyalty by offering more efficient, customized and pertinent services
  • Engage clients with access to various services, leveraging existing KYC​
  • Connect to trusted third party partners and services, and monetize connections​
  • Maintain privacy and loyalty with user consented data sharing and authorization
  • Consent-driven data collaboration between service providers​
  • Privacy-preserving and secure interactions, which respect jurisdictional requirements​
  • Increase customer loyalty with seamless and connected banking experiences

Leveraging automation, artificial intelligence, and machine learning from the ground up, the IDVerifact transaction monitoring and case management solution provides the most sophisticated, configurable, and accessible financial crime lifecycle management solution on the market.

Financial crime risk and regulation shift constantly. Both also demand operational agility to adapt so reflecting changes in strategy requires technical resource, incurring delays and cost. IDVerifact places business users firmly and in control.

Financial crime experts can make changes directly, without programming, using natural language.

Stay ahead of them and amend rules, models, or even integrated application providers in minutes, eliminating the typical wait time.

The IDVerifact platform’s functionality is entirely transparent and accessible thanks to this method.

Easily drag and drop different third-party data sources, rulesets and Machine Learning models into a journey builder to create a strategy or journey in seconds. Our orchestration gateway does the heavy lifting, eliminating the need for lengthy and costly IT intervention.

IDVerifact is about making safe commerce simple. No other financial crime and compliance platform can offer business users the power, speed, and ease.

The system was built around delivering ultimate configurability alongside a best-of-breed user experience.

Multiple integrations are required for effective financial crime lifecycle management since it requires access to best-in-class data and services. With incumbent suppliers, integration costs might range into the hundreds of pounds and weeks of development time per service.

IDVerifact, on the other hand, simply requires one integration.

Implemented by financial crime technology specialists, a straightforward and intuitive Restful Application Program Interface (API) provides quick integration, providing a route to live in days, not months.

High quality decisioning starts with the best possible data. IDVerifact brings granular information from multiple datasets back into orchestration.

IDVerifact takes the intelligence generated by third party services and puts it into a single flow to create an overall risk score, called the “unified score.”

Changes in risk are recognized as best practices throughout the lifecycle.

Apply dynamic and persistent risk scoring at the account, customer, or transactional level using IDVerifact decisioning combined with orchestration and data.

Cases can be automatically escalated to suitable specialists or teams when an automated ‘pass or fail’ determination is not achievable.

IDVerifact integrates everything an agent needs to see to visualize risk, examine insight, and manage a case referral into one straightforward, easy-to-use interface.

  • Change risk scores
  • Add comments
  • Assign cases to various team members
  • Instantly convey choices across the organization
  • Submit fraud data to third-party databases and agencies in a timely manner

IDVerifact offers customers access to its own proprietary decisioning models as well as the ability to integrate their own or third-party models regardless language or platform.

Machine Learning capabilities drive:

  • Automated decisions
  • Improve the performance of rules
  • Reduce referral rates and operational costs

Virtual Agent is a proprietary Machine Learning model that learns from real agent choices.

As enabled, it can automatically simulate human agent behaviour when needed, such as when a fraud referral needs to be handled late at night and real agent resources are restricted.

Virtual Agent provides amazing automated decisioning that improves over time by retraining and utilizing real agent data.

Only a few data security systems can secure data while still keeping its utility.

Data is more useful in all the places we can use it to make judgments.

Data masking ensures data security by substituting sensitive information with a non-sensitive proxy in such a manner that the copied data appears and behaves identically to the original.

Non-sensitive data can be used in business operations using Dynamic Data Masking without having to change the supporting apps or data storage facilities.

Eliminate danger without jeopardizing the company’s operations.

  • Automated – application data correction and cleansing
  • Automated – application of lending rules
  • Automated – risk scoring
  • Application segmentation
  • Application underwriting prioritization
  • Automated – commitment generation
  • Risk based pricing

  • Driver’s License
  • Birth Certificate
  • Passport
  • Banking – Bank Supported Credential
  • Banking – Transaction Aggregator
  • Driver’s License
  • Telco Address Verification
  • Address reference check
  • Banking – Transaction Aggregator
  • Credit bureau address verification
  • Document based address verification
  • Banking – Bank Supported Credential
  • GPS Data
  • Cellular Sensors
  • Bluetooth Sensors
  • Wi-Fi Scanning
  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics
  • Passport
  • Driver’s License
  • Driver’s License Department of Defence
  • Permanent Resident Card
  • Citizenship Card (prior to 2012)
  • Secure Certificate of Indian Status
  • British Columbia Services Card
  • Provincial or Territory Identity Cards
  • Global Entry and Nexus
  • Record of Landing
  • Green Card
  • Credit Bureau Challenge Questions
  • Phone Number Social KYC
  • Phone Number Basic Check
  • Phone Number Device and SIM
  • Device Location

IP Address

Email Phone IP Combination Detection

  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics

Email Address Indicators

  • Employment Letter
  • Pay Stubs
  • Bank Statement
  • Banking – Transaction Aggregator
  • Employer Reference Check (Outbound)
  • Digital Employment Verification
  • Employment Payroll
  • Pay Stubs
  • Notice of Assessment summary
  • Notice of assessment detail
  • Bank Account based verification
  • Employer Outbound Call
  • Bank Statement
  • Employment Letter
  • Employment Payroll
  • Consumer Credit File
  • iDecision from Equifax
  • Business Credit Report
  • Business Failure Disk Score
  • Commercial Delinquency Score
fraud detection

Fraud Detection

IP Address

  • Phone Number Social KYC
  • Phone Number Basic Check
  • Phone Number Device and SIM
  • Device Location
  • GPS Data
  • Cellular Sensors
  • Bluetooth Sensors
  • Wi-Fi Scanning

Location identity creates a wider picture of not just a user’s device but the most common physical location in which a device is used. It provides a common point of reference via trusted location fingerprints to detect location spoofing and potential fraud. It incorporates:

  • Bluetooth sensors to define commonly connected bluetooth devices
  • Wifi scanning to determine not only the Wifi that the devices uses but a profile of the common Wifi networks located within the vicinity of the device. 
  • Cellular network signals to augment device GPS signals that can be spoofed. 
  • GPS location detail from the device

Email Address Indicators

  • US Criminal Records
  • Canadian Criminal Records
  • International Criminal Records

This is where a real credit card number such as ‘4500 8540 1234 4321’ could be replaced with ‘4959 1121 2232 3663’ or any other user-defined tokenization format.  

Where the name ‘Michael’ and ‘Scott’ could be replaced with ‘e87db9d7dbb22’ and ‘2jh4b5kj59dd98s6d76d5f889dd’, or other symmetric and asymmetric encryption options.

Where the medication ID number ‘33439090’ might be changed with ‘5xxxxxxx’ or any other data masking format determined by the user.


When an authorized user or business process requires the actual data to be seen or transferred someplace (for example, for payment processing), the solution immediately and transparently reverses the obfuscation, replacing the tokenized, encrypted, or masked value with the genuine data in transit.

No need for any existing software code to be rewritten or modified. There is no need to build integrations using APIs or connectors, or install any agents or widgets.

No need to alter existing user interactions, corporate processes or retraining personnel while using IDVerifact.

Internal users connect with their computer programmes in the same way they did before.

External users continue to engage with websites in the same way they did previously.

With so many apps hosted in the cloud, the risk of sensitive data crossing national boundaries is growing.

Thanks to the GDPR, CCPA, Bill 64, and other privacy regulations it is now a legal necessity with consequences for non-compliance.

Personal identifiable information never leaves an environment without explicit authorization and complete control over where it:

  • Travels
  • How it is safeguarded
  • When it may be reconstituted

Controlling and regulating access to sensitive data has been a struggle.

Data is tokenized, metadata is created and enhanced, and the recorded data is supplied as characteristics for use in our access control policy using IDVerifact’s data cybersecurity solution.

It is no longer only the proper thing to do to protect the privacy of consumer information.

It is now a legal necessity with the adoption of the GDPR and other privacy regulations, with fines for non-compliance.

Personal identifiable information never leaves an environment without explicit authorization and full control over where it travels, how it is safeguarded, and when it may be reconstituted using IDVerifact’s data cybersecurity solution.

All enterprises that store, handle, or transfer credit card information must undergo PCI compliance audits.

As the problem of developing and maintaining a secure network evolve, this annual assessment grows increasingly costly and extensive.

Before it reaches your network, IDVerifact’s data cybersecurity solution can delete all credit card information from apps, data, and documents.

Your network is judged out of scope for a PCI assessment since it does not include any payment card information.

Managing the risk of using production data in lower-level environments can be challenging.

IDVerifact’s data cybersecurity solution enables businesses to take a total data management approach that allows developers and testers to self-serve new test data sets, eliminating the need for manual intervention and removing any infrastructure requirements for master ‘golden copies’ or derivative test data sets.

Our platform obscures regulated and/or restricted information as data moves across the network when migrating data from a production environment to a development environment.

BIOMETRICS

Biometrics

  • Facial
  • Fingerprint
  • Voice
  • Iris
  • Behavioural Biometrics