Business Icon

Business

Why it’s time to automate your customer verification process

Why it’s time to automate your customer verification process

You want the digital experiences your business offers customers to be highly functional and efficient. At the same time, customers expect a seamless online experience, as well as frictionless and secure payment choices.  In order to meet those needs, verifying your customer’s identity with Artificial Intelligence (AI) and machine learning should be a fundamental first step for every business to deliver better online customer onboarding processes.  However, many companies are still relying on outdated processes, causing unnecessary friction for customers and exposing their businesses to errors and potential costly reputational damage.  Automating certain parts of the identity verification process with AI encourages digital user experiences without compromising usability. It also provides better security and protects your customers, business and services from fraud in the digital world.   Here’s our guide to why you need the process and why our solution can provide you with the right level of automated identity verification.    What is automated identity verification?  Automated identity verification uses artificial intelligence and machine learning to strengthen the verification process. With a higher level of security and more efficient ID checks, it’s easier than ever to prove who your customers really are. In the broader sense, automation can support essential business needs: Improve internal operations Increase response time  Assist in necessary manual checks Reduce costly errors  Get higher success rates  Provide more accurate, quality data for better decision making    What does your company achieve with automation?   When you automate, you can: Have a streamlined user experience: Provide a smoother experience for customers. Achieve a faster onboarding process and reduce drop off rates.    Handle spikes in the volumes of onboarding: By automating some or most parts of the process, you can reduce the time taken to verify new users manually and improve your team’s speed.   Design your own user flows: With automation, you choose where to add verification within your carefully crafted user experience.     Reduce internal costs: Using automated processes allows you to choose how much of the verification process to optimise, making it cheaper for you and more efficient for customers.   Scale globally across multiple jurisdictions: Entering new markets is challenging, but with automation, you will successfully serve multiple jurisdictions without increasing cost. Plus, your teams are better equipped to verify users in newer markets in line with regional regulations.     Make AML, KYC processes more robust: Automated AML helps teams check and investigate more profiles a lot faster than manual evaluation. Provide your teams with accurate quality data and the capability to react quickly to detected misuse. Your teams can mitigate risk and reduce the possibility of exposing your customers or business to fraud.    What processes can be automated?  With our complete solution, you can automate any part of the verification process, from the document and facial verification to anti-money laundering watchlist screening. This way the level of automation you use works alongside your industry requirements.  Here’s what processes you can automate:  Data extraction checks. We extract data using Optical Character Recognition (OCR) from the document’s visual zone or by reading Machine Readable Zone (MRZ), barcodes or PDF417 barcodes whenever present (On North American documents it is printed on the back of the card). Using Near Field Communication (NFC) for ePassports, we can read the chip data, including the photo.   ID document authenticity checks. Our AI and machine learning systems can do multiple comprehensive checks on an ID document to ensure valid data. We scan the document against police databases to check they are not fraudulent, reported, lost or stolen. We test to ensure that the document is original (not a copy or damaged) and doesn’t have signs of tampering.    Biometric face match. Using machine learning, we assess whether the user’s face matches the face on the checked ID document. Our systems can quickly evaluate the face of customers against their ID’s image to identify and match their characteristics accurately.    Liveness detection. Our AI confidently detects that a person is physically present to prevent spoofing attacks and checks that your user is a real person. We can accurately detect that the image is not an automated bot. Likewise, it is not a bad actor wearing a mask or using a photo of someone else.   Address verification. To assist your teams when needing to complete proof of address, we’ll extract customer address information from supporting documents like a utility bill or bank statement using OCR technology. We’ll check their name, date of birth, or address against an official third-party database.    AML watchlist screening. Your compliance teams can automatically screen extracted customer details against thousands of AML databases as part of the identity verification process:    Sanctions and watchlists. Against 1,000 global government regulatory and law enforcement watchlists and over 100 International and National Sanctions lists. Politically Exposed Persons (PEP). To comply with enhanced due diligence (EDD) regulations, we can screen customers against a database of more than 5,000 structured sources that are monitored daily. Adverse media. We screen against the world’s most accurate database of adverse information and media entities. The data is collated into a comprehensive, structured profile through machine learning classification techniques. Relevant adverse articles related to a single entity are presented  in one structured profile with FATF-aligned categorisation. Ongoing monitoring. We can monitor a user’s profiles or entities on an ongoing basis with automated adverse information and media monitoring. You can receive alerts to any changes in a customer or business client’s risk status against real-time databases.   What are the challenges of automated identity verification? While automation can benefit your business with improved processes and help get customers through faster, it doesn’t replace human experts with knowledge and experience in verification. A combination of automation and human experts is needed for those tricker submissions. That is why we champion a hybrid approach. This approach provides a balance of automation for some, and where required, an added layer of security that automation is not capable of delivering to the process. Our leading AI technology is enhanced with our expertly-trained identity verification specialists. Layering in verification specialists gives you a 100 per cent document submission rate. It provides you with a multifaceted defence against fraud.  As a result, your platform is built on solid identity verification that is more accurate, secure, and faster to detect misuse.   Get the right level of automation

Safer Internet Day: Helping young people thrive online

Safer Internet Day: Helping young people thrive online

Today we’re celebrating Safer Internet Day (SID) – an EU-lead initiative encouraging safer and more responsible use of online technology. On this day, organisations around the world promote the safe and positive use of digital technology for young people. As part of the global landmark event, this year, the UK will explore the theme ‘All fun and games? Exploring respect and relationships online’. Young people are shaping the interactive entertainment spaces they are a part of and SID 2022 celebrates their role in creating a safer internet, whether gaming and creating content or interacting with their friends and peers. This year’s theme is a direct response to the negative behaviour young people are faced with on gaming platforms – bullying, verbally abusive language, groups ‘ganging up’ against other groups, and hate directed at LGBT+ users being just some examples. As well as creating a harmful environment, it also distracts from all the positive aspects that gaming and social platforms have to offer.  With age assurance tools like our facial age estimation technology, we know we can help to create more positive experiences for young people using these channels. Here’s how…   Providing age-appropriate services to all As of September 2021, the UK’s independent data authority, the Information Commissioner’s Office (ICO), introduced the Age Appropriate Design Code, also known as the Children’s Code. The Code aims to give young people a safe place to play, learn and explore online and is now a legal requirement. It outlines a set of standards that social media, dating, gaming, and other online services likely to be accessed by minors should follow.  It also requires businesses to design services to be age-appropriate from the ground up.  Before we can safeguard children online, we need to prove they are in fact children in the first place. Our facial age estimation allows us to do exactly this and we believe it will prove a valuable tool going forward in re-shaping the standards for gaming and social platforms!   Following the children’s code We’re leading the world in age assurance to enable children to enjoy their online experience. Our work with social media, dating, gaming and other online services help them to make their platforms safer by design and ensure compliance with the Code. We can support platforms to recognise their users are a minor and discourage them from employing nudge techniques and ensure children aren’t asked to provide unnecessary personal data or make their real-time location publicly available.  We’ve developed an array of sophisticated age assurance methods that let businesses gain the right level of assurance that someone is the appropriate age. They can choose from a range of age assurance methods to do so, from an estimated age based on a real-time selfie or a verified date-of-birth from an ID document. We only share the result of the age check, and instantly delete all personally identifiable data.  Our formidable AI-powered facial age estimation technology allows anyone to be age checked by just looking into a camera on a device. The technology is built to be anonymous and has been proven to be much more accurate than humans, estimating 6-12-year-olds within 1.28 years and 13-19-year-olds within 1.55 years. To discover more about the accuracy rates, read our regularly-updated white paper. Once you’ve discovered that your user is a child, you can then design a different user experience for them in line with the code. Our age assurance tools make it about knowing they’re a child and then providing them with age-appropriate gaming and social experiences, allowing them to thrive in the digital world! Learn more about our age assurance tools. 

Age assurance: helping young people thrive online

Age assurance: helping young people thrive online

“Age assurance is simply a gateway to the bigger prize of building the digital world young people deserve.” – 5Rights Foundation, But How Do They Know It’s a Child?   Recent advancements in regulation and technology have transformed the ways we now check how old someone is online. Until recently, designing age appropriate services for young people from the ground up didn’t seem possible, with businesses accepting that young people would simply have to face being exposed to online harm. But, thanks to intelligent age assurance technology, we now have valuable and powerful tools that can help platforms start designing their services so that young people can be supported to thrive within digital spaces in a way that is privacy-preserving, secure and simple. Age assurance: age verification and age estimation Age assurance describes the methods and measures that help to determine a person’s age or age range. The word assurance refers to the varying levels of certainty that different solutions offer in establishing an age or age range. This includes age verification and age estimation, which both have varying levels of confidence. Age verification refers to the process of age determination by reference to identity attributes, like a passport, that provides evidence of a user being of a certain age. This has traditionally provided the highest level of confidence in a user’s age. However, the level of confidence depends upon a number of factors: for example, a person’s ability to borrow a friend’s ID document, or using fake IDs. On the other hand, age estimation offers the possibility to age check the estimated one billion people globally that don’t own identity documents and can use facial analysis and machine learning techniques. Like age verification, it is also a subset of age assurance, but refers instead to the assessment that someone is likely to fall within a category of ages, or whether they are over or under a certain age.  There are many ways that a person’s age can be estimated: Self-declaration Biometrics Profiling and inference models Capacity testing Cross-account authentication Third-party age assurance provider Account holder confirmation Device controls Flagging Well-trained AI models are capable of estimating age more accurately than human judgement. This is because humans aren’t always trained at identifying a person’s age – and also can’t always detect when a document could be fraudulent. Age estimation tech is also scalable – capable of completing thousands of checks a day successfully without getting tired.  There is also compelling evidence that certain types of age estimation, such as facial age estimation, can provide a level of confidence in a person’s age at least as high as traditional forms of age verification. So, age estimation could very well provide greater assurance than human checks. What is important is finding the sweet spot that works for your business according to the regulations in place within your industry.   The importance of age assurance for young people today  Today, young people live out much of their lives digitally. During the pandemic, 1.4 billion young people across 190 countries were not able to attend school in person and much of their learning moved online. “Age assurance should not be mistaken for a silver bullet or a shortcut to making the digital world fit for young people […] Its value lies not simply in the act of assuring age but in the enormous opportunity it brings once young people have been recognised.” – 5Rights Foundation, But How Do They Know It’s a Child? Once businesses are able to recognise that a child is using their service, only then can they devise services fit to support and protect young people. Children have a right to use the internet and digital services as much as adults do, and age assurance is a powerful tool that will empower young people to safely navigate these digital spaces and thrive online. We believe that everyone should be able to prove who they are. But with an estimated one billion people worldwide who don’t own a legally-recognised form of ID, we need solutions that do not rely solely on hard identifiers. Age estimation is hugely beneficial to people across all demographics, particularly to young people. An estimated 24% of over 18s and 33 percent of under 18s in the UK do not have access to photo ID, so other ways must be available for them to prove their age.. Ensuring they are able to prove their age by a variety of means will enable them to navigate the internet safely.   How we’ve developed rights-respecting, accessible age assurance Developing our facial age estimation technology requires a data set of facial images where the person’s age is already verified. We’ve trained our algorithm on a wide range of ages, genders and skin tones to minimise bias and have collected data in accordance with the UK GDPR.  We’re transparent in how we develop the tool and reach out to organisations to make sure our approaches are in the best interests of our users. We’ve shared our approach in roundtable discussions with industry leaders to gain valuable insight and expertise that helps us develop the tool in the best way possible. This has allowed us to confidently apply facial age estimation to tackle online grooming and launched a #sharetoprotect movement to improve the diversity of the dataset.   Meaningful age assurance is no longer just an advantage… Some industries have already recognised the need for age assurance, and so have enforced legislation making it a compulsory practice. For example, UK video sharing platforms must comply with Ofcom’s regulation guidance, and gaming companies should apply the Principles for online and app-based games.  But it’s not just businesses delivering age-restricted services that need to worry about age assurance. A number of legislative changes have happened in the past few years, and there are more on the way that could affect the way businesses across the world operate. Any industry where young people might be more inclined to access its digital services would benefit hugely from age assurance measures. It’s also no coincidence that these industries are also the same ones impacted by changing and updating legislation, such as the ICO’s Age Appropriate Design Code (the Code). The Code came into force on 2nd September 2021 and aims to give young people a safe place to play, learn and explore online. With that in mind, if your business operates digitally and is used by young people, it might be time to deliver appropriate age assurance with some of your online services. The bottom line is no one knows when you could be impacted by legislative changes. We think taking a ‘Safety by Design’ approach is the best way to ensure ethical age assurance.  “[Safety by design] focuses on the ways technology companies can minimise online threats by anticipating, detecting and eliminating online harms before they occur.” – Julie Inman Grant, Australian eSafety Commissioner This, combined with Privacy by Design principles, will protect a digital service from being potentially harmful to vulnerable people and young people online.   Holding each other accountable Our goal is to start a movement of rights-respecting age assurance that upholds community values and protects people’s privacy. That’s why it’s not only important to build trust among our users but to do it in the right way. We do this by having internal and external bodies that hold us accountable—for example, our internal trust & ethics board and our external Guardian’s Council. The Guardian’s Council – made up of four independent advocates – helps Yoti always seek to do the right thing. They provide us with new and different perspectives from key backgrounds like law, tech, data and not-for-profit. We have also set up an internal Ethics & Trust Committee, which includes members from several different areas of our business to consider ethical issues related to our technology and its use.  This, alongside a number of public commitments to build ethical technology and our B Corp status, means that we uphold values that benefit the integrity of those who use our services. Read more about what we’re doing to build solutions with trust at the core.

Learning more about our facial age estimation

Learning more about our facial age estimation

Facial age estimation is a valuable age assurance tool helping industries to provide age appropriate products and services worldwide. Using a combination of AI technology and liveness anti-spoofing, our tools are helping businesses know their customers are the right age to access their product or services without knowing anything more about them. We want to make sure you have all the information you need to navigate facial age estimation. We’ve compiled some excellent resources that help to explain the core technology and why we’ve developed our solution the way we have. How facial age estimation is built How AI really works Try Yoti’s facial age estimation demo Putting our anti-spoofing technology to the test Facial age estimation in use Peer-to-peer checks: know who you’re dealing with Further reading How age estimation is built We partnered with family digital wellness experts Be inTouch to explain how we built our facial age estimation technology. Watch his three minute video below. How AI really works You can also check out the below two-part series where Be inTouch explains how AI really works. In the eight minute and twelve minute explainer videos, you can learn more about AI, deep learning, and how it’s used to estimate age and create safe spaces online. Try it out with our demo (for users aged 13 and above) Using our facial age estimation is simple. Check it out for yourself in our interactive demo. Putting our anti-spoofing technology to the test We’ve implemented anti-spoofing to make sure that people can’t imitate someone older or younger than their actual age and trick our age estimation tech. It works by using deep machine learning, preventing presentation attacks. We put our anti-spoofing technology to the test to see if our facial age estimation can outsmart a disguise. Watch the thirty-second video below to see what happened. Facial age estimation in use Our tech provides many real life benefits to people of all demographics. See what these students at Queen Mary University had to say about Yoti facial age estimation and the future of ID checks in our one-minute video. For these shoppers in Estonia, the checkout process just got a whole lot faster. We visited the first supermarket in the world using age estimation in their self checkout terminals. Watch the thirty-second video to see what they thought. Peer-to-peer checks: know who you’re dealing with When you’re talking to people online, it’s almost impossible to know who you’re dealing with from just a profile picture. Whether you’re online dating, buying a bike from a shared marketplace, or organising a holiday let, make sure you know exactly who you’re talking to. Our Little Casanova shows us just how easy it is to misjudge how old someone might be before you meet them in person in this two-minute video. Further reading For even more information on our age estimation technology, or our other age assurance tools, check out our blogs. Tackling child sexual abuse online with the Safety Tech Challenge Fund Online age verification: a new era Age verification: the solution to buying age-restricted products in supermarkets Developing age estimation technology to tackle grooming online  To read more about facial age estimation and the steps we’ve taken to get to where we are today, you can read our full briefing materials here.

Get ahead of new age and identity verification regulations with our handy guide to know your customer (KYC) processes

Get ahead of new age and identity verification regulations with our handy guide to know your customer (KYC) processes

It’s no longer financial institutions, real estate, art dealers, casinos, lawyers, and accountants who are the main targets for financial crimes online. Criminals are finding it harder to use them for money laundering due to rigorous regulations and effective know your customer (KYC) processes. To go undetected, they have set their sights on online multiplayer gaming, online marketplaces, FinTech, online gambling and many more small and medium businesses.    Lawbreakers are attracted to these platforms because they have little to no anti-money laundering (AML) and counter-terrorist financing (CTF) regulations. For example, multiplayer online gaming platforms have experienced a rise in illicit activities on platforms. According to Newzoo’s report, 35 per cent of UK gamers have had a negative experience when paying online, and 18 per cent have experienced fraud while paying for games.   Criminals can purchase in-game content or credit (often through prepaid cards), sell these to other users (possibly at a discount) and then receive cash credited to their account from that legitimate source.    It’s a type of money laundering that can go undetected by a customer and by you, but its impact hasn’t gone unnoticed by the Financial Action Task Force (FAFT). Recommendations issued by the FATF define criminal justice and regulatory measures that should be implemented to counter this problem. They recently published guidance on virtual assets and virtual asset service providers (VASPs), explaining that these industries should come under anti-money laundering regulatory guidelines. Necessary measures are set to increase in the coming years.   However, it will be an entirely new process for many online service providers to follow in order to protect their business and customers. For experienced industries, it’s challenging enough to be compliant.    Suppose your industry is one of the businesses providing innovative ways consumers’ access entertainment, gaming, shopping, gambling, banking, and more. To be proactive in protecting them and your business, here’s our quick guide to help you prepare for the changes and hit the ground running to smash those requirements.     What is Know Your Customer? Know your customer (KYC) is a set of processes that gather personally identifiable information to understand if a customer is genuine and will not attempt to use your services for illicit activities. The best place to do KYC checks is during the customer onboarding process, as it is the first step with every new customer.  Otherwise, you could unwittingly facilitate fraud, leave your services vulnerable to costly reputation damage, and risk losing genuine customers’ trust. Last year, 198 fines, totalling 10.4 billion dollars, were issued globally against financial institutions for non-compliance with AML, KYC, data privacy and MiFID (Markets in Financial Instruments Directive) regulations.    What is the difference between AML and KYC?  AML is a broader framework that refers to a range of the policies, regulations and procedures businesses must have to identify, monitor and report any illicit activities. KYC is the first line of defence in an AML program. It ensures your customer is who they say they are. Plus, it helps you assess the level of money laundering risk a customer might present.     What is Customer Due Diligence (CDD)? Customer due diligence (CDD) is various components of the identification collection of data. CDD is effective at managing any potential risk to your business. The process of gathering customer data about their identity, background and activities to evaluate what level of potential risk (high or low) a customer falls under. Once your business has a payment processor, it’s your responsibility to check the source of the funds. Your industry and business needs will predetermine the risk criteria and when to apply them.    The Law Society explains that Under regulation 27 of the Money Laundering, Terrorist Financing and Transfer of Funds Regulations 2017 (MLR 2017), you must carry out CDD measures when:   establishing a business relationship carrying out an occasional transaction that amounts to 15,000€ or more you suspect money laundering or terrorist financing you doubt the accuracy or adequacy of documents or information previously obtained for CDD   We will cover when you are required to carry out CDD below.    How does the KYC process work?  Firstly, there are three critical best practices to KYC that you must ensure to:    Establish the customer’s identity  Understand the nature of the customer’s activities (means to satisfy that the customer’s funds are from a legitimate source) Evaluate what level of money laundering risk they could pose    Here is how those key elements work within your customer onboarding process.    1. Establish the customer’s identity It starts with collecting basic information about your customer, which is done using digital identity verification technology (we’ll dive into its role in more detail later). In America and some other jurisdictions, it is referred to as a customer identification program (CIP). It follows the same method of collecting basic data to confirm your potential user’s details and identity are genuine, so you’re sure they are who they say they are.    The basic information needed is their name, address, date of birth, requested identification documents such as a passport or driving licence, and documents confirming proof of address.    The FAFT currently recommends a risk-based approach for industries experienced in complying with AML -This will differ for every industry. Therefore, you would be required to assess the potential risk to your business to understand the level of KYC or the amount of information your business will need to collect.     2. Assess the risk by practising Due Diligence There are three recommended due diligence practices you could add to your KYC process:   Simplified Due Diligence (SDD): This involves identifying your customer and making sure they are who they say they are. As mentioned above, this is performed on all customers during onboarding using digital identity verification. It’s you being confident that the user has zero to no intent of misusing your platform.  Customer Due Diligence (CDD): This is commonly referred to as standard due diligence (SDD). It’s used for customers and transactions that present a low risk, where you’re satisfied that the business relationship or transaction presents a low risk of money laundering or terrorist financing. At this level, you must continue to monitor low-risk accounts to spot any red flags or suspicious activity.  Enhanced Due Diligence (EDD): EDD occurs when the risk for money laundering or terrorist financing through the services you provide is high. It requires you to carry out deeper additional checks to verify your customer’s identity and understand their activity in order to mitigate any risks.    There are many circumstances and factors where the risk of money laundering is high, and you’ll need to carry out EDD measures. Risk factors include customer, country, product or services.  For example, customer risk factors can affect gaming industries in the gambling sector because it is a cash-intensive business. The risk of illegal activity by customers is considered high.     Things to note:  It is a business’s responsibility to put policies in place that define when EDD should be triggered. To provide guidance around this, it could trigger when the customer is a foreign national, resident in a high risk or high secrecy jurisdiction, involved in a high-risk industry (as defined by FATF), a high-value transaction (thresholds are set by JMLSG, FATF, regulators), politically exposed or just doesn’t smell right. EDD must also include looking for publicly available information from reliable sources for adverse information, media or allegations of criminality. Satisfying the source of funds and source of wealth is also part of the EDD.    3. Ongoing monitoring: Evaluate the money laundering risk   Identification and screening of customers are vital to the onboarding process. To protect businesses from becoming vulnerable to illicit activities later on, they must monitor customers on an ongoing basis and keep an auditable record of all checks. This is to spot if there are any changes in customer activities that pose a risk.     The role of digital identity verification solutions in KYC  Regulations are constantly changing and evolving as new vulnerabilities pop up. As online access grows, experienced industries are using digital identity verification solutions more regularly to maintain compliance and manage the identity process. In fact, it is encouraged by the FAFT to use artificial intelligence (AI) and machine learning to improve how you do those KYC checks.    AI and machine learning help to improve the accuracy of KYC checks, reducing the possibility of criminals using false or stolen identities from entering your platform. It gives you a better quality of data and helps to manage customer identification efficiently. Not to mention, an identity verification solution makes requesting and verifying an ID match to a real person more straightforward for the customer. It uses a customer’s biometrics to correctly match it to their ID (passport/driving licence), along with checking that the document is an authentic one.       How Yoti can support you  We help you proactively carry out KYC checks without affecting the customer onboarding experience while accurately identifying potential risks. The verification system fits within your current user flow without disrupting your customers.    Our identity verification solution is a hybrid of AI technology enhanced by a team of expertly-trained identity verification specialists. Working together, using AI and fraud experts allows you to detect potential risk and misuse accurately.    To ensure only genuine users get through your identity checks, we can do necessary identity checks and enhanced checks as per your industry requirements. We can verify proof of address documents, check your customer’s name, date of birth, or address against an official database and screen against AML watchlist using global databases (Sanctions and watchlist, PEP, adverse media, and ongoing monitoring).    How do your customers prove who they are?  For your customers, it’s as easy as capturing an image of their ID document and a biometric selfie.   Robust identity verification in 3 steps:  Select the issuing country and type of ID, such as passport, ePassport, or driving license Take a photo of the front and back of the document via a mobile phone or computer camera Take a selfie using a phone or computer camera      See how we make it hassle-free to verify your customer’s identity. Try it now for yourself

How to strike a balance between fraud prevention and seamless customer onboarding

How to strike a balance between fraud prevention and seamless customer onboarding

Our Identity Verification solution makes onboarding as hassle-free as possible for your users.  Digital identity verification has become a crucial part of onboarding customers, with businesses needing to check that they are genuine, protect customers’ data and mitigate fraud. Having identity verification embedded into your online customer journey ensures you have identified and verified your customers’ identities.  Even so, it can be challenging to establish a balance. Finding the best way to streamline the customer’s digital experience while complying with know your customer (KYC), anti-money laundering (AML) industry requirements isn’t easy. Businesses are often forced to choose between robust security to prevent fraud or providing a frictionless user onboarding experience.  Competition is tough, no matter the industry. Businesses are focused on making the online customer journey faster and more streamlined. The call is often to reduce the level of friction experienced to keep customers coming back. While this could speed up onboarding and transaction processes, it will cost your business a customers’ trust and puts your online services at risk of misuse. Customers need to trust your business with their personal information, and they also expect a certain level of friction. Digital identity verification is necessary friction that is an essential factor in building trust with customers remotely.   Every industry is different, and their need for a verification system will differ, which is why a digital identity verification solution needs to be flexible and scalable enough to meet those needs. The correct identity verification method can help you strike a balance between KYC requirements and having the right level of friction that doesn’t negatively impact the customer experience. Let’s look at how you can achieve that balance.    How do you streamline the identity verification process?  Our Identity Verification solution makes the onboarding process simple while protecting your business, ensures you’re in line with KYC, AML compliance and helps you reduce drop off rates.  Our verification system fits within your current user flow without disrupting your customers. It is a cross-platform solution that allows you to integrate your way.  We give you a complete solution that lets you:   Verify the identities of your customers your way. Simply configure the checks you need in line with your industry and security requirements. Only pay for the types of checks you need your users to complete. For example, if you just need to capture an image of your users’ ID document or require matching the person in real-time to the image on their ID, you only configure those types of checks to be carried out.   Deliver the right level of friction after onboarding. For higher-risk industries, we can enhance the type of checks you need. Our Identity Verification solution is scalable and gives you the capability to integrate our other solutions into your user flow. Let’s say you’re in the gambling industry. You already use our Identity Verification solution and now need to perform age checks. You can save the high-assurance identity checks for those that need them. With our facial age estimation technology, you can keep the onboarding process free of checks and scan accounts at scale. This allows you to detect the most at-risk accounts and introduce friction to those most likely to not be the required age by asking them to prove their age with an ID document.   Connect with our solution to fit the size of your business. For a fully-branded customer experience, you can place our verification technology in your existing flow with our SDKs built for web, mobile web and native mobile apps. For smaller businesses that require low-volume checks, it’s not always worth the time and resources to integrate. Our no-code portal lets you send your customers to complete the verification flow via a web link and manage the results in a simple dashboard.   Protect your customers’ data. Quickly verify the identity of your customers and receive a granular view of checks and an overall recommendation.  We offer you flexible data retention options to reduce your exposure to data leaks and ensure GDPR compliance. Businesses can store the data encrypted on our servers and call API for results without having to store the information on their systems.   Scale globally and securely. We support 1,000 ID documents from over 200 countries, allowing you to scale globally and serve multiple jurisdictions. Our identity verification specialists are expertly trained in verifying documents from across the globe, helping you detect fraud and reduce the cost of damages.   How do your customers prove who they are? The user flow gives your customers a simple way to prove who they are with just a government-issued ID document and a biometric selfie.   Robust identity verification in 3 steps:  Select the issuing country and type of ID – passport, ePassport, or driving license.  Take a photo of the front and back of the document via a mobile phone or computer camera.  Take a selfie using a phone or computer camera.      See how it works Seamless identity verification directly on your website or app:   How do we verify your customer’s identity? Our hybrid of leading artificial intelligence (AI) technology is enhanced by a team of expertly-trained identity verification specialists. Using a combined approach helps to make our verification systems more accurate, secure and faster at detecting misuse.  Let’s look at the different identity verification methods. Document verification  Data extraction: We extract data from a document using Optical Character Recognition (OCR) from the document’s visual zone or by reading Machine Readable Zone (MRZ) or barcodes. We read the PDF417 barcodes whenever it’s present (for example, on North American documents where it is printed on the back of the card). For ePassports, our native mobile SDKs can read the chip data, including the photo, using Near Field Communication (NFC). We also can verify the digital signatures as part of the document’s authenticity checks. We use a combination of data extraction methods, both automatic and manual, to ensure we have an optimum solution for each document type within the wide range of documents we support. Depending on your business’s risk appetite, you can choose to configure our verification system to ‘fallback’ to manual data extraction or to ‘always’ have a human check the data extraction, even if the automatic extraction was successful.   Document authenticity checks: We use a combination of world-leading AI and dedicated 24/7 identity verification specialists to perform multiple checks. Our hybrid approach ensures that ID document checks determine that they are original, not a copy or damaged and that the document doesn’t have signs of tampering. This provides the highest level of assurance that an ID document is genuine.   Facial verification  Biometric liveness detection: To ensure your users are real and to prevent spoofing attacks, our AI liveness detection confidently detects that a person is physically present when the image is captured. We can accurately detect that the image is not an automated bot. Likewise, it is not a bad actor wearing a mask or using a photo of someone else.    Biometric face match: We assess whether the user’s face matches the face on the checked ID document.     We can enhance the checks as per industry requirements.  Proof of address verification  Receive a proof of address document or verify a customer’s address -they can upload a supporting document like a utility bill or bank statement. Checking a customer’s address can be done in two parts:  Capture an image of the supporting document, and using OCR technology, we can also extract the address information and manually review the data.  Verify the customer’s address against a relevant third-party database.                Trusted third-party database checks  We can check your customer’s name, date of birth, or address against an official database for additional security.   AML watchlist screening  You can screen your customer’s details against the following major global databases:    Sanctions and watchlists: We can screen customers’ profiles against 1,000 global government regulatory and law enforcement watchlists and over 100 International and National Sanctions lists, updated in real-time.    Politically Exposed Persons (PEP): In high-risk situations where customers are linked to higher-risk countries or business sectors, businesses can comply with enhanced due diligence (EDD) regulations by screening against a database of more than 5,000 structured sources that are monitored daily.   Adverse media: We screen against the world’s most accurate database of adverse information and media entities, collated into a comprehensive, structured profile through machine learning classification techniques. Relevant adverse articles related to a single entity are collated in one structured profile with FATF-aligned categorisation.   Ongoing monitoring: We can monitor a user’s profiles or entities on an ongoing basis with automated adverse information and media monitoring. You can receive alerts to any changes in a customer or business client’s risk status against real-time databases.   Know your customers and protect each other against fraud Make it more convenient for your customers while protecting them and your business. Our identity verification system is intuitive and recognises that you need to strike a balance between stopping fraud and having the right level of friction necessary without impacting the customer experience.