IDENTITY VERIFICATION
Check authenticity of documents
How to collect and verify identity documents to authenticate your users.
IDENTITY VERIFICATION
How to collect and verify identity documents to authenticate your users.
Performing an identity document verification check is essential to confirm the legitimacy and authenticity of an identity document, such as a passport, national identity card or driving licence.
An identity verification process will include checking the security features of the documents. For maximum effectiveness, identity documents should be checked by professionals trained in the techniques of detecting false documents.
With the proliferation of digital services and remote onboarding, online document fraud has increased. While governments and organizations that issue identity documents have always implemented security techniques to fight identity fraud, sometimes this is not enough. Fraudsters are developing more sophisticated techniques.
How can an identity document be checked?
Evolution of ID document checks.
When a document is submitted to a verification service, a set of automatic processing steps is performed. The following four steps are used in IDnow identity document checks.
1. Document classification
Without any input from the user, our services automatically identify the exact model of the identity document.
2. Data extraction
The data on the document holder is extracted from the different zones, such as the photo or the machine readable zone.
3. Document checks
In Unit Mode, also known as File Mode, several security checks are carried out: visual, business, consistency, blacklist.
4. Automated and real-time response
A verdict is given, together with a test report that is promptly returned to the customer.
While many online businesses are not legally required to check the identity of their customers, they should consider doing so anyway to more effectively combat fraud.
Organizations from heavily regulated sectors, such as financial services or gambling, however, are legally required to check the age of their customers, along with other regulatory requirements.
An identity document checker can confirm details that are essential to comply with regulations, such as KYC (Know Your Customer), AML (Anti-Money Laundering), PEP (Politically Exposed Person) and CFT (Countering the Financing of Terrorism) requirements.
Many documents can be used to prove identity:
These documents are usually issued by a trusted authority, such as a government, a recognized international organization, or a delegated entity.
Documents will contain the identity details of the holder like their surname, first name, date of birth, and address, as well as biometric information (photo, fingerprints) that allow the identity to be linked to the individual.
An identity document is issued after a rigorous process to ensure the document is produced on behalf of the right person and given to the right person.
The ID document should feature robust enough security measures to ensure criminals are unable to use the document for fraudulent purposes. Criminals often try to obtain identity documents that contain biometric characteristics associated with the identity of an existing person.
Commonly used identity documents vary from one country to another. In some countries, possession of an identity document (passport or identity card) is mandatory, while in others it is not.
Passport
Identity card
Residence permit
Driving license
Health insurance card
Other supporting documents
There are many techniques for securing identity documents. As it is customary for documents to implement many security features to discourage or hinder criminal activity, we will present only the most commonly-used ones.
The MRZ refers to a strip of one to three lines of characters found on documents. The strip contains important information in coded form. This includes the holder’s identity, date of birth, document expiry date, document number, etc. It also has the advantage of containing several checksums that can provide additional useful checks.
Whether it is fluorescent, fugitive, iridescent, metallic, optically variable, photochromic, penetrating or thermochromic, ink plays a very important role in securing an identity document.
The use of special fonts that cannot be found in the public domain is an additional security feature.
Bar codes have been used on identity documents for several years. Initially one-dimensional, they are now two-dimensional, often in PDF417 format. The 2D-DOC code invented by the IDnow group has been presented to the International Civil Aviation Organization for further study on use in other identity documents.
The methods used to print document backgrounds or personalize the document are important security features. Even though they are often difficult to verify with the naked eye, offset, intaglio printing, typography, screen printing for the background, inkjet or laser printing, or thermal transfer all play a part in security measures.
Printing text incredibly small is extremely difficult to reproduce precisely enough with a traditional printer. Microprinting is used as a fairly effective security feature.
Embedded into the body of a polycarbonate card or the cover of a passport, an electronic chip adds a high level of security. It also offers the possibility of additional features, such as the possibility of checking the holder’s fingerprints.
This category includes patterns sensitive to ultraviolet light, patterns that disappear under infrared light, holograms, fluorescent plates, etc.
Depending on the quality of the images uploaded for analysis, our automated identity verification solutions use algorithms to verify the most relevant security features.