Core Identity Verification

Our Core Identity Verification is supported by a comprehensive suite of checks and security features designed to ensure the authenticity and accuracy of an individual's identity. Together, these checks form an interconnected, robust identity verification system - crucial for safeguarding against fraud and enabling compliance with regulatory obligations.

Download brochure

The following Checks and Security features are all included in our Core Identity Verification:

BENEFITS

Enhanced Customer Onboarding Experience
Robust Compliance Adherence
Reduced Operational Risks
Greater Operational Efficiency
Fortified Data Protection

Multi-Layer ID Checks

This essential ID check is the primary element of the Core Identity Verification. The customer providing their personal information is guided through the mobile journey by a set of simple instructions that takes them step-by-step through the self-service process and takes just a few minutes to complete.

As part of this customer journey, the App captures and validates the integrity of a official government-issued identity document, such as a Passport, Driving Licence, or ID Card.

The document verification process references specialist data such as templates from the document issuers.

Through a process of digital analysis and by referencing these official examples Verify can confirm the integrity of the ID documents provided.

PEP & Sanctions Screening

Verify’s Core Identity Verification includes a one-time PEP & Sanctions check (‘International, Enhanced’) as this is a standard requirement for all supervised and regulated businesses.

For PEP screening the customer’s details are checked against a database of Tier 1, 2, 3 PEPs, including PEPs ‘by association’. The database is updated daily from various sources, such as official government websites or national assemblies of foreign offices, CIA World leaders lists, open source verified repositories, and selected media websites.

For Sanction screening, the database is collated and updated daily from the numerous official sources including: UK HM Treasury, US Department of the Treasury - Office of Foreign Assets Control (OFAC), US Department of State - Bureau of International Security & Non-Proliferation Sanctions, UN Security Council Committees, EU Sanction records, US Defence Trade Controls, and other international government and local authority resources.

Geolocation Check

The Geolocation check determines if the location of the mobile device used for the identification process is consistent with the user's confirmed country of residence.

It works by cross-referencing the geographical location data from the user's mobile device with the country of residence provided.

When the geolocation check is activated, the mobile device will prompt the user to grant permission to access their device's location data. Upon permission, the system retrieves real-time geolocation data from the mobile device, including latitude and longitude coordinates.

The coordinates are used to determine the country where the mobile device is currently located. This is done through integration with a global geographic database. The identified country is then compared with the user's confirmed country of residence. If the countries match, the check will pass. If there is a discrepancy or the permission is denied, the results will show as ‘require review’.

Personal Details Capture

The following information is captured and reported as part of the Verification process:

  • Full Name
  • Date of Birth
  • Current Residential Address
  • Email Address
  • Proof of Address e.g., Utility Bill (Document Image)
  • ID Document (Image and OCR’ed document attributes)
  • Individual’s likeness (image)
  • GPS Location (One time capture during verification)

Proof of Address Upload

As a further part of the layered process, our secure Proof of Address upload is designed to be used as a secondary form of proof for the individual’s current residential address. This feature requires the user to submit an image, via the app, of a selected ‘qualifying’ document, that must be dated within the past three months, ensuring the address information is up to date.

This individual can select from the following document types:

  • Telephone bill
  • Tax assessment notice
  • Water bill
  • Electricity or gas bill
  • Credit card statement

Security Features

The Biometric Face Match and Liveness checks determine that the person undergoing the identification process is the legitimate holder of the provided identity document and is physically present during the verification.

Biometric Face Match

The portrait photo is extracted from the uploaded identity document, and then using advanced facial recognition algorithms, it analyses and compares the facial features in the ‘selfie’ with those in the document photo. The system calculates a score based on the confidence of the match. If the score passes the required threshold, the check will pass.

Active Liveness Detection

This is achieved through a series of real-time challenges that require physical interaction. For example, the system may ask the user to smile or move their head in a certain direction. The system then analyses the user's responses to these prompts to check for natural movement and variation, which would be indicative of a live human being. By including these tests, liveness detection adds an extra layer of security by preventing spoofing attacks, such as using a photograph or a video in place of a live face.

These tests are designed to ensure that the biometric data being provided during an identity verification process is from a real, live personand not a static image.

Physical Tamper Checks

This uses matching and pattern discrimination techniques, based on machine learning algorithms, to identify signs of the ID document having been tampered with.

It identifies feature and noise levels in regions corresponding to printed characters and attempts to detect whether the image is an authentic physical ID document or a recapture on paper or a screen. When detecting portrait photo substitution, some fraudsters will physically replace the photograph on a genuine identity document with another to masquerade as the bona fide holder of the document. Portrait photo tamper checks need to account for large intra-class diversity (background, watermark, ethnicities, etc.), varying lighting conditions (day, night, exterior, interior, etc.) and image quality(camera, compression, blur, etc.).

NFC Chip Reader

This technology provides the highest possible standard for ID verification. When available, the NFC chip is scanned by holding the Passport next to the smart phone and the data held is electronically transferred, including the original encrypted digital image of the portrait photo.

Help us prevent automated submissions.
Go back
Fill in a few details
Our team will be happy to help
Oops! Something went wrong while submitting the form.
Help us prevent automated submissions.
Go back
Fill in a few details
Our team will be happy to help
Oops! Something went wrong while submitting the form.
How can we help?
Choose from one of the below