Document verification

Digital identity verification that protects your business and safeguards growth.

Why do you need to carry out a document check to verify your clients?

The digital era started so rapidly we didn't even have time to get used to it. And if not so long ago, people used to work with people and see and communicate with each other every day, nowadays you don't even have to leave your home. On the one hand, it's very convenient since everything can be done using just your laptop. On the other hand – the inability to see a person's face or simply tell if that's the person you wanted to connect with, requires implementing protective measures.

As the majority of businesses now work with customers online, they need to make sure their customers are who they say they are. That's why the online companies handle various verifications like document check things.

Types of document verification available nowadays

There are a few types of identification the business can use to confirm the identity of their clients and to comply with KYC and AML procedures. They help companies prove the identities of clients and, sometimes, employees. The idea behind these procedures focuses on preventing fraud and providing secure-for-all services. The basic list of these types is as follows:

  • Address checks
  • Bio checks
  • Document checks
  • Employment checks

Shortly after, we will look at the types of verification procedures in more detail. However, there’s one more important question. Without answering it, we can’t proceed further. Thus, be sure to understand the whole process to be able to choose the most relevant verification services you may need.

How do you verify a document at all?

Starting from the very basics, let’s answer the main question. The document verification process consists of a few simple steps. So, how do you verify a document? The procedure is the following:

1. Submitting the required documents. The customers are asked to upload the photos or videos of the relevant ID documents in high quality.
2. The AI and algorithms scan the document for information, including the encrypted data, and recognize it.
3. Validation of the data extracted from the scans, which requires establishing if the document and the info shown are still valid.
4.The next step is checking the document for the signs of fraud and forgery (like changing the photo, altering the data, encrypting symbols, etc.).
5. Successful onboarding of clients. As soon as the program finishes checking the submitted documents, it verifies the user.

General types of verification

  • Documents
To verify documents, you should complete a few steps. The customer submits the documents on the website and the AI technology scans it on a subject of validity, the existence of any records connected to it, its appearance in criminal records, etc. the documents include ID, driver's license, passport, social security and basically every government-issued proof of your identity.

  • Addresses
  • This type is similar to our document verification service. The user has to submit utility bills and postal correspondence – the letters that have the user's address on them. The technology scans the documents for the address and then checks it for existence, people residing at it, etc. The algorithm has to have wide coverage, which means to understand different languages and recognize various document types.

More specific types you may be interested in

  • Biometrics. This verification is simple and hassle-free. The user simply uploads his/her photo ID, then it gets verified and in cases of forgotten passwords and security issues, sends a picture of his/her face, so the platform algorithms can compare the face biometrics with the previously verified photo ID.
  • Employments. This verification is sometimes an option too. It's a bit more time and effort-consuming but overall – an effective way to verify someone's identity and claimed work experience. It can also be done using documents like paychecks and work contracts or via contacting an immediate employer.

Most of the time the online platforms use a combination of methods like biometric plus document verification services or document plus address verification. Using a simple password doesn't cut it anymore.

Moving further, you may be interested in the purpose of verification procedures. Most of the identification methods over the last 10-15 years included identification using an IP address or a phone number. Both of them have lost their relevance and became simply ineffective, as can be easily faked or abused. Plus, we have to pay attention to the fact that a great share of people using such services consists of digital nomads. They travel constantly, therefore – change their phone numbers and IP addresses at least a few times a year. This poses additional difficulties. So the web platforms had to come up with the idea of simple identity verification through the means you always have on you.

The main two goals of checks are:

  1. Verifying the user's identity by scanning their documents, cross-referencing them with the database of available documents to match the corresponding data. Except for the actual need of verifying customer's identity, it is a legal requirement in order for the platform to comply with KYC and AML principles.
  2. Catching fake documents that can be used for fraud. Expired, stolen, and forgotten documents can be utilized by impostors to steal the sensitive information and use another person's identity in order to get money or even for cyber-attacks.

For doc verifications, the systems use certain types of documents to establish identity. Usually, they are the ones, issued by the government of the user's country. The following documents are the most likely to be asked from a customer to prove their identity:

  • Passport;
  • Driver's license;
  • Resident permit;
  • Other identity-proving instruments

As a rule, documents, proving identity are designed in a way that makes it difficult to forge them. The biometric signs, holograms, thickness, etc. – all of these are used to identify the person and verify the documents.

Diving deeper into the process of verification documents, we can find out that they are often checked by AI. Technologies develop rapidly, but so does the fraud. That's why identity-checking instruments require the use of machine learning and Artificial Intelligence technology that constantly improves and designs new ways to test and inspect the documents. Aa a rule, most of the programs pay attention to the following factors while verifying document:

  • The first factor – is the data content, shown on a document. The machine collects all the information contained on a document, including written, encrypted, and the info on an MRZ (machine-readable zone), which can only be extracted by a computer. Then it compares the data with the information, provided by the user and checks the document for validity.
  • The second one – are templates, fonts, and other signs of alterations. Obviously, the document can be altered both in material and in digital form. The programs look for changed fonts, photo imperfections like blurred areas, and visible signs of changes, as well as for broken symbols and holograms.
  • The third factor, like the thickness of the paper, the number of pages, and the type of paper can usually be checked using video. The user simply has to make a video clip of him/her rotating the required document so the algorithm could clearly see the edges and the thickness of the paper.
  • The last factor – is the overall look of the document for the watermarks, overlays, and different inks. This is required to compare the photo of the ID to the legitimate ID document templates or address verification documents used in different countries. Of course, in order to do this, the platform has to have access to the base of IDs of a big number of countries.

The verified document then goes to a relevant database of the company or business.

Identance is a web-platform that offers solutions for easy clients onboarding and verification. Pros of verifying document with Identance are the following:

  • Developing apps for any kind of device. Whether you need an app for a smartphone or a desktop – we got you!
  • Seamless integration. Our programs are flexible and easily transformable to suit every web service there is.
  • White-label implementation. The solution we create can be integrated on a platform as a native product to help you build your own brand.
  • Customization – an option to design and change the product's features to suit your needs and requirements.
  • AML and KYC compliance. With our solution, you can be sure to obey the relevant legislation and detect potential fraud.
Identance helps you scale your business while simultaneously proving quick clients onboarding and authentication.

Interested in pricing or a demo?

Our team is here to answer your questions about IDENTANCE

Talk to an expert
We use cookies to optimize site functionality and give you the best possible experience. Learn more.