Transactions are getting easier, more comfortable. We introduce our name, email, credit card, and shipping information, and order placed. But, how does a company know that we are who we say we are? Is it really that easy to impersonate our identity and impersonate us?
The fact is that, although identity fraud is still a very real problem for individuals and businesses, identity verification and online fraud prevention techniques are becoming more sophisticated by the day. In a much-summarized way, and without going into details so as not to give ideas to possible scammers, these are some of the techniques that in combination are used to verify the identity of a person on the internet.
Identification document
When an identity document is authenticated, two factors are validated. First, that the document is authentic and not a forgery. Second, that it corresponds to the real identity of a person that this is who it claims to be (that it exists, that it is alive, and that it is who the document represents). <>
- Authentication of document security measures, such as the king ram or details inserted with ultraviolet or infrared inks.
- Reading of all data fields, from the first and last names to the OCR-B characters.
- Verification of data in official databases, to verify that they have not been falsified or stolen.
Physical identity
An essential step in the process is to verify the physical identity of the person, that is, to know who is really on the other side of the operation or transaction that is being carried out.
- Biometric facial recognition, with a selfie. It is a quick and easy step for the user. In addition, new technologies allow a much more reliable verification than visual recognition performed by a person.
- Comparison of the selfie with the photo in the document. With reliability of more than 99%, it tells us if the person is the same as in the identification document.
- Proof of life or liveness to see if the person exists, that is, that for example, it is not a photo of a photo.
Digital identity
The third step that is carried out is the connection between the digital fake id online and the real identity of the person. The algorithms that perform this verification are complex and sophisticated, and analyze, among other elements:
- They validate the phone and email associated with the operation, that is, those provided by the user.
- They geolocate the user, to see if their movements are coherent.
- Their social networks (Social Network Analysis) are analyzed.
How long it takes?
Identity verification procedures are becoming faster and easier for the user to use. There are fully automatic solutions that allow you to carry out an onboarding process, or registering an online account, in less than 20 seconds.
Is it really reliable?
Today's technological solutions are much more reliable than, for example, any manual verification. In the case of ICAR, the identity verification solution has a reliability rate of 99.8%.
Benefits of digital identity verification
For the company, automatic identity verification technologies allow it to improve the user experience, since it allows registering and making transactions much faster and easier. This dramatically reduces the abandonment of the onboarding process. On the other hand, it helps you reduce online fraud, a problem that generates losses of millions of euros every year in the financial sector.
For the user, in addition to the ease of use, these systems increase the security of their personal and financial data when performing an online operation, and reduce the risk of their identity being spoofed.