ASSURE IDENTITY

VERIFICATION PROCESS

WHAT MAKES OUR VERIFICATION PROCESS
Gold Standard Gold

A STRONG IDENTITY VERIFICATION PROCESS IS VITAL

As a business providing an identity verification & storage solution, ensuring that we are able to validate with confidence & 100% accuracy who a person is could be considered the most fundamental aspect of our offering.

The actual process of identity verification & level of depth which KYC providers go to ensure the parties completing the process are known varies widely. The sophistication of software used, the data collected, the analytics performed, the databases available for cross-checking, the expertise of the reviewers, etc all play a major factor in the quality of any identification process.

ASSURE IDENTITY VERIFICATION PROCESS - THE GOLD STANDARD

Assure offers one of the most robust identity verification services on the market today. When a project is Assure Verified, stakeholders can be confident that the process used for verification was thorough and that the identities are known & accurate.

The sophisticated process that Assure has implemented starts by leveraging a fully integrated AI-powered software, which allows our clients to seamlessly complete the end-to-end identity verification approval in only 2-3 minutes on their smartphone or tablet!

DOCUMENTS NEEDED FOR VERIFICATION

To get verified you will need to provide a current, physical, genuine Government-issued ID. Acceptable forms of ID include:

passport

Valid Passport

Driving license

Valid Driving License

ID card

Government Issued ID Card

*Party must have physical possession of the identification document. KYC approval will be rejected if a physical ID that you actually have in your possession is not provided during the verification process. Please do not post pictures of pictures, screenshots, etc.

DOCUMENT CHECKING/VALIDATION

Our verification process supports over 10,000 government-issued IDs from 190 countries. Our global reach allows us to verify project owners from all corners of the world, which is paramount with the crypto space being such a diverse global market.

Our system scans the identity documents and performs the following checks:

Barcode/QR scanning

MRZ # Data Extraction

Registered document database check

Expiration date check

DOCUMENT TAMPERING

With over 10,000 government documents in our database, our verification system can verify documents nearly anywhere in the world. The AI-powered technology used is able to detect whether a government-issued identity document has certain correct features that could detect a counterfeit or altered document. 

For example, the following are some of the more prominent parts of IDs that we analyze to catch fakes:

Security features

Material integrity

Portrait photo inconsistencies

Data cross-referencing 

Format validation

Data dependencies 

Font detection

Handwriting validation

And more

The AI relies on Machine Learning model that detects and matches the presented document in the session with the specimen in our database. When a document is fake or tampered with, the session is declined.

SYNTHETIC FRAUD PREVENTION

Our identification system uses a multi-prong solution to prevent synthetic fraud. It uses device and network fingerprinting, which allows for behavioral analytics to be applied to catch fraud. 

Also, crosslinking takes behavioral analytics further. The system groups verification sessions together and points out risk factors based on user behavior that may seem abnormal and provides that data to our clients. Crosslinking analyzes the person, network, and more.

Additionally, velocity abuse prevents the same person, device, or document (depending on the configuration of the decision engine) from opening multiple accounts, which is common in financial services. 

DEEPER DATA EXTRACTION

Standard Compliance Data (5 points)

First name, last name, DOB, Expiration date, Document #

Assure Data Collected (10 points)

First name, last name, DOB, Expiration date, Document #, Issue Date, Personal #, Gender, Nationality, Address

FRAUD PREVENTION USING NETWORK AND DEVICE ANALYTICS

As a fraud prevention measure,the platform analyzes the device and network used for a verification session and assigns each a fingerprint. Along with hundreds of other parameters, including personal data on the ID, the data is then cross-checked with PEP and sanctions lists, past behavior, and other inconsistencies before a decision is made with respect to approval.

MANUAL ID REVIEW CHECKS

Though the automated system we have implemented is robust by itself, the KYC by Assure process also includes a manual review by our team to provide a further layer of validation.

BIOMETRIC ANALYSIS

Biometric information is extracted from photos and non-disruptive background video to confirm that a user is who they say they are. Assure takes live video data & uses facial recognition technology integrated into the AI-powered software to provide a deeper level of verification than is standard in the industry.

LIVENESS CHECKS

Through various tests, we can determine if a session or user is real. These checks involve analyzing photos and video and are conducted behind the scenes. This is a strong means of preventing fraud tactics like deepfakes which become prevalent in the crypto space. 

PEP AND SANCTIONS CHECKS

During every verification, Politically Exposed Persons (PEP) checks are undertaken, which screen multiple government databases to identify individuals entrusted with a prominent public function. Every individual will also undergo Sanctions checks, making it possible for us to run user data through government sanction databases to see if there are any matches. 

ONGOING MONITORING

Assure provides ongoing monitoring of all our clients who have completed identity verification. Our platform will automatically notify us if any existing users have been added to the PEP or Sanctions lists as outlined above & allow us to take action with respect to their approval.

of people have experienced exit scams/rug pulls from anonymous teams

SPEED, EASE & CONVENIENCE OF PROCESS

  • Automated Data Extraction

    To make sure our process is quick and efficient, we use AI to extract data from IDs as soon as they are submitted to speed up verification sessions and provide a fantastic user experience for our clients without sacrificing integrity.

  • Global Multinational Support

    Our verification process supports over 10,000 government-issued IDs from 190 countries. Our global reach allows us to verify project owners from all corners of the world, which is paramount with the crypto space being such a diverse global market.

HIGH SECURITY OF ALL SENSITIVE IDENTITY DATA

When you verify yourself with Assure you can be confident in the safety of your data.  Our identity verification software provider is fully compliant to CCPA, GDPR, WCAG & AICPA SOC accessibility standards, providing audited 3rd party validation of how they handle the data.  Assure’s Data Storage & Handling Policy is based around the GDPR guidelines and our processes are designed to ensure we limit risks which could potentially lead to compromised data.

CCPA 2
GDPR 2
WCAG 2
SOC 2
Gold Standard Gold

CONTACT ASSURE DEFI®

Contact us on one of our social platforms below or click here to fill out our contact form.

OUR LEGAL TEAM

Artboard 1
Artboard 7
Artboard 8
Artboard 9

OUR PARTNERS

fantom logo square 01

Fantom Foundation

ferrum

Ferrum Network

Artboard 21

Quill Audits

pinkswap.a95de4f3 01

PinkSale Finance

Artboard 13

Dx Sale