We operate more and more online, but at the same time we are also more concerned about the security of our data.
Transactions are getting easier, more comfortable. We introduce our name, email, credit card and shipping information, and order placed. But, how does a company know that we are who we say we are? Is it really that easy to impersonate our identity and impersonate us?
The fact is that, although identity fraud is still a very real problem for individuals and businesses, Counterfeit identity verification and online fraud prevention techniques are becoming more sophisticated every day. In a much summarized way, and without going into details so as not to give ideas to possible scammers, these are some of the techniques that in combination are used to verify the identity of a person on the internet. <>
When an identity document is authenticated, two factors are validated. First of all, that the document is authentic and not a forgery. Second, that it corresponds to the real identity of a person that this is who it claims to be (that it exists, that it is alive and that it is who the document represents).
- Authentication of document security measures, such as the kinegram or details inserted with ultraviolet or infrared inks.
- Reading of all data fields, from name and surname to OCR-B characters.
- Verification of the data in official databases, to verify that they have not been falsified or stolen.
An essential step in the process is to verify the physical identity of the person, that is, to know who is really on the other side of the operation or transaction that is being carried out. <>
- Biometric facial recognition, with a selfie. It is a quick and easy step for the user. In addition, new technologies allow a much more reliable verification than visual recognition performed by a person.
- Comparison of the selfie with the photo in the document. With a reliability of more than 99%, it tells us if
- Proof of life or liveness to see if the person exists, that is, that for example it is not a photo of a photo.
The third step that is carried out is the connection between the digital identity and the real identity of the person. The algorithms that perform this verification are complex and sophisticated, and analyze, among other elements: <>
- They validate the phone and email associated with the operation, that is, those provided by the user.
- They geolocation the user, to see if their movements are coherent.
- Their social networks (Social Network Analysis) are analyzed.
How long it takes?
Identity verification procedures are becoming faster and easier for the user to use. There are fully automatic solutions that allow you to carry out an onboarding process, or registering an online account, in less than 20 seconds.
Is it really reliable?
Today’s technological solutions are much more reliable than, for example, any manual verification. In the case of ICAR, the identity verification solution has a reliability rate of 99.8%.
Benefits of digital identity verification
For the company, automatic identity verification technologies allow it to improve the user experience, since it allows registering and making transactions much faster and easier. This dramatically reduces the abandonment of the onboarding process. On the other hand, it helps you reduce online fraud, a problem that generates losses of millions of euros every year in the financial sector.
For the user, in addition to the ease of use, these systems increase the security of their personal and financial data when performing an online operation, and reduce the risk of their identity being spoofed.