ASSURE IDENTITY
VERIFICATION PROCESS
WHAT MAKES OUR VERIFICATION PROCESS
A STRONG IDENTITY VERIFICATION PROCESS IS VITAL
As a business providing an identity verification & storage solution, ensuring that we are able to validate with confidence & 100% accuracy who a person is could be considered the most fundamental aspect of our offering.
The actual process of identity verification & level of depth which KYC providers go to ensure the parties completing the process are known varies widely. The sophistication of software used, the data collected, the analytics performed, the databases available for cross-checking, the expertise of the reviewers, etc all play a major factor in the quality of any identification process.
ASSURE IDENTITY VERIFICATION PROCESS - THE GOLD STANDARD
Assure offers one of the most robust identity verification services on the market today. When a project is Assure Verified, stakeholders can be confident that the process used for verification was thorough and that the identities are known & accurate.
The sophisticated process that Assure has implemented starts by leveraging a fully integrated AI-powered software, which allows our clients to seamlessly complete the end-to-end identity verification approval in only 2-3 minutes on their smartphone or tablet!
DOCUMENTS NEEDED FOR VERIFICATION
To get verified you will need to provide a current, physical, genuine Government-issued ID. Acceptable forms of ID include:
Valid Passport
Valid Driving License
Government Issued ID Card
*Party must have physical possession of the identification document. KYC approval will be rejected if a physical ID that you actually have in your possession is not provided during the verification process. Please do not post pictures of pictures, screenshots, etc.
DOCUMENT CHECKING/VALIDATION
Our verification process supports over 10,000 government-issued IDs from 190 countries. Our global reach allows us to verify project owners from all corners of the world, which is paramount with the crypto space being such a diverse global market.
Our system scans the identity documents and performs the following checks:
Barcode/QR scanning
MRZ # Data Extraction
Registered document database check
Expiration date check
DOCUMENT TAMPERING
With over 10,000 government documents in our database, our verification system can verify documents nearly anywhere in the world. The AI-powered technology used is able to detect whether a government-issued identity document has certain correct features that could detect a counterfeit or altered document.
For example, the following are some of the more prominent parts of IDs that we analyze to catch fakes:
Security features
Material integrity
Portrait photo inconsistencies
Data cross-referencing
Format validation
Data dependencies
Font detection
Handwriting validation
And more
The AI relies on Machine Learning model that detects and matches the presented document in the session with the specimen in our database. When a document is fake or tampered with, the session is declined.
SYNTHETIC FRAUD PREVENTION
Our identification system uses a multi-prong solution to prevent synthetic fraud. It uses device and network fingerprinting, which allows for behavioral analytics to be applied to catch fraud.
Also, crosslinking takes behavioral analytics further. The system groups verification sessions together and points out risk factors based on user behavior that may seem abnormal and provides that data to our clients. Crosslinking analyzes the person, network, and more.
Additionally, velocity abuse prevents the same person, device, or document (depending on the configuration of the decision engine) from opening multiple accounts, which is common in financial services.
DEEPER DATA EXTRACTION
Standard Compliance Data (5 points)
First name, last name, DOB, Expiration date, Document #
Assure Data Collected (10 points)
First name, last name, DOB, Expiration date, Document #, Issue Date, Personal #, Gender, Nationality, Address
FRAUD PREVENTION USING NETWORK AND DEVICE ANALYTICS
As a fraud prevention measure,the platform analyzes the device and network used for a verification session and assigns each a fingerprint. Along with hundreds of other parameters, including personal data on the ID, the data is then cross-checked with PEP and sanctions lists, past behavior, and other inconsistencies before a decision is made with respect to approval.
MANUAL ID REVIEW CHECKS
Though the automated system we have implemented is robust by itself, the KYC by Assure process also includes a manual review by our team to provide a further layer of validation.
BIOMETRIC ANALYSIS
Biometric information is extracted from photos and non-disruptive background video to confirm that a user is who they say they are. Assure takes live video data & uses facial recognition technology integrated into the AI-powered software to provide a deeper level of verification than is standard in the industry.
LIVENESS CHECKS
Through various tests, we can determine if a session or user is real. These checks involve analyzing photos and video and are conducted behind the scenes. This is a strong means of preventing fraud tactics like deepfakes which become prevalent in the crypto space.
PEP AND SANCTIONS CHECKS
During every verification, Politically Exposed Persons (PEP) checks are undertaken, which screen multiple government databases to identify individuals entrusted with a prominent public function. Every individual will also undergo Sanctions checks, making it possible for us to run user data through government sanction databases to see if there are any matches.
ONGOING MONITORING
Assure provides ongoing monitoring of all our clients who have completed identity verification. Our platform will automatically notify us if any existing users have been added to the PEP or Sanctions lists as outlined above & allow us to take action with respect to their approval.
of people have experienced exit scams/rug pulls from anonymous teams