iD Verification Stops Fraud At Signup

Reduce risk with automated, instant online identity verification services.

Reduce risk with automated, instant online identity verification services.

Get A Demo

Trust Doesn’t Have To Be So Hard

Digital lives create real-world
uncertainty

As we do more, share more, and experience more online, we're interacting with people we've never met. How can we be sure someone is who they claim?

Fraudulent digital identities create
real-world risk

Unauthorized transactions from fraudulent identities result in all sorts of problems, like new credit cards opened online, claiming someone else’s tax return or people returning under an alias after they’ve been banned.

 
 

Automated iD Verification delivers lasting peace of mind

Easily verify new customers using a range of flexible identity verification services – so you can trust that your customers are who they say they are and let them transact freely.

Download Product Overview
90%
of participants in the AARP Fraud Watch Network study revealed their stolen credit or debit card information was used to buy merchandise.

of participants in the AARP Fraud Watch Network study revealed their stolen credit or debit card information was used to buy merchandise.

You Define The Verification Strength

Identity Validation

Lower-Strength

Uses public records and other consumer databases, email addresses or phone numbers to confirm that the identity claimed by the person signing up belongs to a real, living person.

Ideal for lightweight, backend confirmation that the identity being claimed is valid.

Knowledge-Based Authentication

Medium-Strength

Checks that the person applying for your services knows personal details associated with the identity they’re using and that they’re using a low-risk device (i.e. with an IP address that matches their claimed location).

The increased confidence comes from additional details, including address, birthdate, and SSN.

Photo ID + Document Authentication

Highest-Strength

High-strength process confirms the authenticity of the photo ID provided and uses a selfie to biometrically match the person using the ID to the photo on the ID in real time.

Choose to simply confirm a document’s authenticity or to match it with the user via a selfie.

Trusted Technology Partnerships

“ Identity.com’s verification engine creates an end-to-end solution and delivers automatic enhancements that make verification smarter, faster, and easier.”

“ Identity.com’s verification engine creates an end-to-end solution and delivers automatic enhancements that make verification smarter, faster, and easier.”

- VP of Trust & Safety at Inflection, Annie Lin

Why iD Verification From Identity.com?

Integrate Once

Integrate with just a few lines of code. As our services evolve, we take care of the upgrades for you.

Exactly What You Want

Endless verification combinations and smart defaults that adapt to your platform and flows.

Security That Matters

Sensitive information is encrypted using individualized data encryption keys, while all information is sent over HTTPS using TLS 1.2.

Uptime You Can Rely On

Our platform is built on world-class AWS infrastructure to ensure reliability and maximum uptime.

Privacy By Design

Experience a privacy-focused product development approach that combines technology and empathy to serve all stakeholders.

Smart Insights Reporting

Gain granular insights into user behavior and fraud prevention rates for your websites and mobile apps.

Sign Up For Free Demo
When people buy their own background check, we verify their identity in order to protect their sensitive information. Identity.com makes it easy, and the team helps us follow best practices.

When people buy their own background check, we verify their identity in order to protect their sensitive information. Identity.com makes it easy, and the team helps us follow best practices.

- Director of Product at GoodHire, Julie Hill Kimbrell

Maximize Results With iD Background Checks

Identity verification services reduce risk by identifying and then denying fraudulent or high-risk identities from transacting with your business or customers.

Background checks add a second-layer approach to understand the historical behavior of an identity so you can evaluate risk before they can engage in high-value transactions.

About iD Background Checks

Identity verification services reduce risk by identifying and then denying fraudulent or high-risk identities from transacting with your business or customers.

Background checks add a second-layer approach to understand the historical behavior of an identity so you can evaluate risk before they can engage in high-value transactions.

About iD Background Checks

Simple Integration. Fast Results.

Identity.com simplifies the iD Verification integration with just a few lines of code. Explore our documentation for more information.
So-called security questions long ago outlived their usefulness, since they can be hard for the right people to remember and easy for the wrong people to guess or steal.

So-called security questions long ago outlived their usefulness, since they can be hard for the right people to remember and easy for the wrong people to guess or steal.

- Liz Weston, The Associated Press

Industry Spotlight

Financial Services
On Demand Platforms
Problem
Cost sensitivities with regards to ‘Know Your Customer’ (KYC) and anti-money laundering (AML) regulations.
Solution
iD Verification helps you find the right balance between the cost of sending too many customers to manual review queues, while still meeting regulatory standards.
Key Advantages

Automated, powerful technology easily plugs-into existing systems and fraud controls

Adherence to compliance laws let you focus on other goals

Speed and cost of service are optimized to meet financial services requirements

Seamless, digital-first customer experience for easy cross-platform access your customers will expect

Problem
Balancing the need for customers to feel and be safe when interacting on the platform with the drive to scale.
Solution
iD Verification helps you stop fraud at signup or at any sensitive transaction point, increasing trust in the platform and reducing risks to your business’ reputation, growth, and financial health.
Key Advantages

Different levels of verification easily support different types of transactions

Optimized to allow minimal-friction entry for “low-risk” people and to put up appropriate barriers for higher-risk identities

Provides the type of customer experience your digital native customers expect

Frequently Asked Questions

What types of iD Verification are available?

iD Verification includes a range of identity services, from lower-strength to higher-strength, each customizable for your business needs.

Identity Validation confirms that an identity exists.

This is a lower-strength service that confirms an identity is legitimate. iD Verification provides three options:

  • Databases: uses public records and other reliable consumer databases.

    Required Inputs: legal name and address

    Additional Supported Inputs for higher accuracy: birthdate and Social Security number

  • Email: verifies the person presenting the email address has access to the account, by entering a unique token on Identity.com that was sent to the email address.

    Required Inputs: email address

    Additional Supported Inputs for higher accuracy: none

  • Phone: verifies the person presenting the phone number has access to the phone, by entering a unique token on Identity.com that was sent to the phone.

    Required Inputs: mobile phone number

    Additional Supported Inputs for higher accuracy: none

Knowledge Based Authentication (KBA) generates challenge questions that compare a person’s answers to information only they should know, not including consumer credit information.

With Enhanced KBA from Identity.com, additional hard-to-spoof risk signals (including device location and user behavior) are factored into the verification decision, instead of simply relying on static information sourced from public records.

Required Inputs: legal name and address

Additional Supported Inputs for higher accuracy: birthdate, and Social Security number

Additional configuration for low-risk identities: one-time passcode (OTP) sent to person’s phone

Photo ID + Documents creates the link between the identity and the person presenting the information. This high-strength solution confirms the authenticity of a government-issued photo ID document, and compares the photo on the document to a selfie of the person for a biometric match. This product supports US driver's licenses and state-issued ID cards, with global passport verification coming soon.

Required Inputs: Front and back of a Photo ID will validate the authenticity of the document.

Adding an uploaded selfie will verify that the Photo ID document matches the person presenting the information.

Additional Supported Inputs for higher accuracy: none

How is customer information kept secure?

All personal information is encrypted in transit using TLS, and sensitive PII is encrypted at rest using AES256 with a unique encryption key for each record. All data is stored in AWS' secure environment, which has received ISO27001, PCI-DSS, and SOC2 security certifications, with the additional security layer of two-factor authentication in our web portal. You can learn more about our layered security approach here.

How does our iD Verification solution differentiate?

We differentiate by offering a full spectrum of risk-based identity verification options that allow you to customize the solution to best fits your needs. iD Verification can also be paired with our “iD Background Checks” to help you identify both the legitimacy of an identity, as well as the risk associated with that identity - all in one centralized solution.

Unlike other identity verification solutions, our solution is fully automated and utilizes machine learning to validate the authenticity of an ID, and processes the information locally, allowing you to process the verification instantly (versus manual processing) and facilitate a smooth, uninterrupted onboarding process for your customers.

How does photo ID and facial biometric matching work?

An algorithm looks for security features that exist in driver's licenses, such as holograms and microprinting, and uses machine learning to compares IDs to a library of known, valid ID formats.

For the ID to selfie biometric match, facial features that tend to remain fairly static over time are compared between the two images for similarity. For example, facial markers for comparison might be the distance between the eyes, nose, and mouth, relative size of the face, positioning of facial features, etc.

Where do Knowledge-Based Authentication questions come from?

These questions are pulled from 80,000+ non-credit sources of consumer information and public records to create an "out-of-wallet" exam. Out-of-wallet originally referred to the concept that an identity thief shouldn't be able to pass the KBA exam by stealing the contents of your wallet.

Want to Know More?

Talk to us to learn more about iD Verification and to set up a demo of our powerful solutions.
Get A Demo