Core Identity Verification

Our Core Identity Verification is supported by a comprehensive suite of checks and security features designed to ensure the authenticity and accuracy of an individual's identity. Together, these checks form an interconnected, robust identity verification system - crucial for safeguarding against fraud and enabling compliance with regulatory obligations.

Download brochure

The following Checks and Security features are all included in our Core Identity Verification:

BENEFITS

Enhanced Customer Onboarding Experience
Robust Compliance Adherence
Reduced Operational Risks
Greater Operational Efficiency
Fortified Data Protection

Multi-Layer ID Checks

This essential ID check is the primary element of the Core Identity Verification. The customer providing their personal information is guided through the mobile journey by a set of simple instructions that takes them step-by-step through the self-service process and takes just a few minutes to complete.

As part of this customer journey, the App captures and validates the integrity of a official government-issued identity document, such as a Passport, Driving Licence, or ID Card.

We can currently validate 1335 documents from 175 countries.

The document verification process references specialist data such as templates from the document issuers.

Through a process of digital analysis and by referencing these official examples Verify can confirm the integrity of the ID documents provided.

PEP & Sanctions Screening

PEP & Sanctions is available as a one-time check, or as a part of our on going monitoring service, which make daily check and reports on any changes in a clients PEP & Sanctions status.

To improve the accuracy of our PEP & Sanctions, we have included filter options within the Verify Portal. These filters enable admin users to customise and manage their PEP and Sanctions settings based on their business requirements for their Verify Portal account. Users can now specify which filters to apply for PEP, Sanction, and Adverse Media checks.

This search is performed across a wide array of sources including, 1200+ sanction lists, a database of over 1.7 million PEPS scored by country, and position, and 120,000 media sources. Verify then implements phonetic matching to filter those potential matches in real time.

Geolocation Check

The Geolocation check records the location of the mobile device when the App is being used. At the beginning of the mobile journey the customer is asked to give consistent for the geolocation data to be captured.

It works by cross-referencing the geographical location data from the user's mobile device with the country of residence provided.

When the geolocation check is activated, the mobile device will prompt the user to grant permission to access their device's location data. Upon permission, the system retrieves real-time geolocation data from the mobile device, including latitude and longitude coordinates.

The coordinates are used to determine the country where the mobile device is currently located. This is done through integration with a global geographic database. The identified country is then compared with the user's confirmed country of residence. If the countries match, the check will pass. If there is a discrepancy or the permission is denied, the results will show as ‘require review’.

Personal Details Capture

The following information is captured and reported as part of the Verification process:

  • Full Name
  • Date of Birth
  • Current Residential Address
  • Email Address
  • Proof of Address e.g., Utility Bill (Document Image)
  • ID Document (Image and OCR’ed document attributes)
  • Individual’s likeness (image)
  • GPS Location (One time capture during verification)

Proof of Address Upload

As a further part of the layered process, our secure Proof of Address upload is designed to be used as a secondary form of proof for the individual’s current residential address. This feature requires the user to submit an image, via the app, of a selected ‘qualifying’ document, that must be dated within the past three months, ensuring the address information is up to date.

This individual can select from the following document types:

  • Telephone bill
  • Tax assessment notice
  • Water bill
  • Electricity or gas bill
  • Credit card statement

This list is configurable by each company using the service. The captured image is always presented in a ‘passed state’, in that no electronic checks are completed against the document - as such this is captured as supplementary information only. The Verify by Tiller Portal users can view this document within the Portal and it is included as supplementary information within the individual’s PDF report.

Security Features

The Biometric Face Match and Liveness checks determine that the person undergoing the identification process is the legitimate holder of the provided identity document and is physically present during the verification.

Biometric Face Match

The portrait photo is extracted from the uploaded identity document, and then using advanced facial recognition algorithms, it analyses and compares the facial features in the ‘selfie’ with those in the document photo. The system calculates a score based on the confidence of the match. If the score passes the required threshold, the check will pass.

Active Liveness Detection

This is achieved through a series of real-time challenges that require physical interaction. For example, the system may ask the user to smile or move their head in a certain direction. The system then analyses the user's responses to these prompts to check for natural movement and variation, which would be indicative of a live human being. By including these tests, liveness detection adds an extra layer of security by preventing spoofing attacks, such as using a photograph or a video in place of a live face.

These tests are designed to ensure that the biometric data being provided during an identity verification process is from a real, live personand not a static image.

Physical Tamper Checks

This uses matching and pattern discrimination techniques, based on machine learning algorithms, to identify signs of the ID document having been tampered with.

It identifies feature and noise levels in regions corresponding to printed characters and attempts to detect whether the image is an authentic physical ID document or a recapture on paper or a screen. When detecting portrait photo substitution, some fraudsters will physically replace the photograph on a genuine identity document with another to masquerade as the bona fide holder of the document. Portrait photo tamper checks need to account for large intra-class diversity (background, watermark, ethnicities, etc.), varying lighting conditions (day, night, exterior, interior, etc.) and image quality(camera, compression, blur, etc.).

NFC Chip Reader

This technology provides the highest possible standard for ID verification. When available, the NFC chip is scanned by holding the Passport next to the smart phone and the data held is electronically transferred, including the original encrypted digital image of the portrait photo.

Help us prevent automated submissions.
Go back
Fill in a few details
Our team will be happy to help
Oops! Something went wrong while submitting the form.
Help us prevent automated submissions.
Go back
Fill in a few details
Our team will be happy to help
Oops! Something went wrong while submitting the form.
How can we help?
Choose from one of the below