Core ID
Identity verification is the process of checking and confirming the data and information provided by an individual to determine if it is true and corresponds to their real identity. Multi-factor verification is a more secure approach as it uses several methods to confirm a person's identity, rather than just one, which reduces the risk of identity fraud and increases confidence in the verification. This verification is highly customizable to ensure high convertibility while maintaining high levels of security.
​
Terminology
Anonymization. Process by which data are processed in such a way that it is not possible to connect them to a person's identity or personal data. Despite these processes, it is possible to perform technical and scientific analysis on this data set. For compliance with anonymization standards, the data must be stripped of sufficient elements so that the data subject can no longer be identified, and therefore this data must be processed so that it is not possible to identify an individual using all reasonable means for use by any other person.
​
Authentication. Authentication is a process that confirms a person's identity in the digital world. For this, the user is linked to one or more variables such as passwords, tokens, identification cards, fingerprints or biometric characteristics. These factors are classified into three types: known, object and biometric. Some systems also require specific actions for more secure authentication.
​
Authorization. Consists of the security process to determine which actions or services can be performed according to the identity of the users.
​
Biometrics. Biometrics is the method of verifying a person's identity through unique measurements of biological or behavioral characteristics. It is one of the most effective ways to confirm a person's identity, since biometric data is unique to each individual. Biometrics comes from two Greek words meaning "measure of life".
​
Behavioral biometrics. This is biometrics based on a person's own actions or behaviors. This includes typing patterns (formerly known as keystroke dynamics), tone of voice, use of social networks, heartbeat intensity and even gait.
​
Cybercrime. It is any crime that involves computing devices and networks for carrying out illegal activities. More in detail, it is usually used to talk about those activities directed against the confidentiality, integrity and availability of computer systems and networks, as well as the data stored in them.
​
Confidentiality. It is the protection of information and the guarantee that stored and transmitted data will not be disclosed to unauthorized third parties. In the digital era, confidentiality is strengthened through the use of cryptography to ensure data privacy.
​
Deduplication. Mechanisms used to detect duplicate identities and ensure the uniqueness of individuals within a system or organization. The tools used in these processes generally include biometric recognition, biographic data and the use of credentials.
​
Availability. This is the guarantee that a company's IT infrastructure has an adequate capacity for recovery and protection against system failures, natural disasters or malicious attacks. It is the ability to access and use resources, whether a computer network, a system, an application or data, allowing its use by authorized persons.
​
Face Match. Facial recognition or face matching system by which a user uses their biometric characteristics (their face) to authenticate their identity. It is one of the most widely used systems thanks to the popularization of smartphones and is often associated with the use of mobile applications (apps) and web platforms as a mechanism to keep accounts or transactions safe and secure.
​
Authorized source. A repository, system or database with information about an individual's attributes and is considered to be the primary or most reliable source for this information. When two or more identification systems present a conflict in their data, the authoritative source is used as the most secure source of information in this regard.
​
Identity. The set of traits of an individual, or of a group, that characterize them in relation to others. In security it is used to talk about individuals and the attributes that make them unique. These variables include physical characteristics, personal history, beliefs, cultural, national, and gender factors, among other variables.
​
Identification. The process of determining or recognizing the identity of someone or something. In the physical world, it is done through government-issued identity documents. In the digital world, identification is a key process for confirming a user's identity online. This process includes registering attributes and issuing credentials to facilitate the subsequent authentication process.
Biometric Identification. It is the process of determining the identity of a person through the use of biometric data such as face shape, fingerprint or walking pattern, among other possibilities. This information is then compared with a database to verify the identity of the user. Despite the use of digital tools for the capture, registration and comparison of data, it must be taken into account that a biometric match is never exact and therefore there will never be a 100% match between the biometric template and the user's data. As a consequence, margins of acceptance of matching patterns must be established, which obey a category called biometric threshold.
​
Integrity. This refers to the status and accuracy of the data involved in a process. In other words, integrity requires that the data being received must be exactly the same as the data being sent.
​
Performance metrics. These are measurement systems used to determine the accuracy of authentication processes. In biometrics they stand out:
​
-
False acceptance rate (FAR): the false acceptance rate or FAR is sometimes referred to as false negative rate or FN. As its name indicates, it is related to users who are not enrolled and who, in spite of them, are erroneously admitted into the systems.
-
False Rejection Rate (FRR): False Rejection Rate or FRR is sometimes referred to as False Positive Rate or FP. It is the opposite of the FAR and occurs when the system denies access to an authorized user.
​
Biometric recognition. A procedure, through the use of technological devices, of confirming the identity of individuals by comparing biological and behavioral attributes.
​
Facial recognition. A way of verifying a user's identity by comparing facial characteristics with a database stored in a digital format. This technology has become popular due to its ease of use and its registration process that includes the measurements of the different parts of the face. The recorded data is optimized and protected by algorithms to ensure the security of the information.
​
Cybersecurity. Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to protect its digital assets. There are several classifications ranging from Internet of Things(IoT) security, to information security, among other classifications. Some of the most common threats are ransomware, malware, denial of service attacks and phishing. Its use has changed motives, and sides, from its beginnings from being a tool for extortion and industrial espionage, to the sabotage of entire nations in conflicts and a tool for cyberactivists.
Identification system. This is the set of practices, equipment, technological infrastructure, software, credentials and laws involved in the capture, management and use of personal identification data.
​
Digital identification system. It is a technological platform used during the identity lifecycle of an organization. It ranges from data capture, validation, storage and transfer, to credential management, for subsequent verification and authorization of identities.
​
Error rate. Biometrics has a margin of error that is controlled through the definition of a threshold, which balances the false acceptance rate and the false rejection rate. A low threshold will increase the acceptance rate and decrease the rejection rate, which can be risky, as there will be more chances for unauthorized persons to access protected systems. Therefore, increasing the rejection rate reduces the risk of unauthorized access.
​
Verification. In the context of information technology and security, it is defined as the process of confirming the identity of a user or process by comparing their attributes or credentials to facilitate their authorization and access to services.
​
Biometric verification. It is the verification process using biometric attributes for this purpose. For this purpose, a capture of these variables is performed and the information is compared with a digitally stored biometric template.
​
Multifactor Verification. Single-factor authentication systems, such as passwords, are easy to administer but also more vulnerable. Biometric systems are more secure, but have the risk of being irreversible and linked to a person's anatomy. For best security and convenience, the current trend is to use two-factor authentication (2FA) and multi-factor authentication (MFA) systems. Multi-factor authentication is an authentication system that requires the presence of several different factors to verify a person's identity. These factors include information known to the user (password), objects in the user's possession (token or an ID card) and biometric characteristics (fingerprints or facial recognition). The combination of these factors provides additional security against unauthorized access to protected information or resources.
​
Benefits
-
Reduces phishing fraud.
-
Increases conversion rates.
-
Combats money laundering, terrorist financing and online fraud.
-
Valid authenticity of information.
-
Primary source for information collection in the creation of users' digital identities.
-
Promotes AML / KYC and KYT compliance.
-
By using multiple methods to confirm a person's identity, the risk of impersonation is reduced and confidence in verification is increased.
-
Some regulations require multi-factor verification to meet security standards.
-
Multi-factor verification allows users to use different methods to confirm their identity, providing a greater level of flexibility.
-
It allows companies to scale their identity verification processes to accommodate a larger number of users or a wider variety of transactions.
-
Reduces the amount of personal information that is stored and shared, helping to protect users' privacy.
-
Gives users the ability to authenticate on different devices, whether from a computer, smartphone or tablet, making the verification process easier.
-
Reduces the time and costs associated with identity verification.
​
Services
With multi-factor authentication it is more difficult for an attacker to gain access to a system if multiple authentication factors are required instead of just one. The multi-factor verification matrix increases security and reduces the risk of impersonation or hacking.
Knowledge factor. Checks what information the subject knows such as passwords, answers to questions known only to the individual, or PINs.
​
Possession factor. Checks what the subject possesses such as an ID card, passport, credit card or driver's license.
​
Physical factor. Answer what inherent physical qualities make each person unique such as biometric fingerprints in facial and voice recognition.
​
Location factor. Web services implement location factors to detect suspicious parallel or successive login activities and restrict access when necessary. It is verified through Internet Protocol (IP) addresses or through the operating system of the user's device.
Our services include:
Video. Image processing is used to collect and manage biometric information, optical character recognition and self-identify actions to collect proof of life.
​
Device ID. Information captured from the PC or mobile device from which the end user interacts with Anteia.
​
Optical Character Recognition (OCR). Data such as names, dates, serial numbers, Q.R., holograms and barcodes extracted by visual computing from any camera on a cell phone, tablet or PC.
​
Facematch. Comparison between document image vs. biometrically captured face.
Liveness. Ability to determine that one is interacting with a physically present human being and not a fake inanimate artifact or video.
​
Taxonomic evaluation of documents. Evaluation of the set of elements that make an identification document unique. Example: font types and sizes, distances, micro texts, holograms, bar codes, among others.
​
Biometrics. Process of verifying a person's identity based on physiological and behavioral aspects. Anteia has facial and voice recognition.
​
OTP-GPS. IP or GPS location from the device being used by each user interacting with Anteia. A verification number is sent via text message (SMS) to the user's mobile device.
​
Mail. Verification service that the user has access to the e-mail that is being registered in the Onboarding process.
​
Risky mail lists. Service that checks the user's e-mail against public lists of risky e-mails.
​
Verification in the Registrar's Office. Confirmation of the user's identity document information, name, ID number, date of issue, birth and life or death status.
​
Third-party verification and restrictive lists. More than 211 public and private sources of information are consulted in a single search.
Multiple factors
Strong confidence
Multifactor verification process
Coming soon.​
Configurations
DeviceID.
-
The set of elements is captured.
​
Optical Character Recognition (OCR).
-
The client defines the elements to be captured and the type of document.
-
The service allows human review.
​
Face Match.
-
According to the risk, the client defines the desired thresholds.
-
30% to 79%.
-
80% to 89%.
-
90% to 94%.
-
95% to 100%.
We recommend a minimum of 40%.
-
The service allows human review.
​
Liveness.
-
According to the risk, the client defines which thresholds he/she wants.
-
50% to 79%.
-
80% to 89%.
-
90% to 94%.
-
95% to 100%.
We recommend a minimum of 60%.
-
The service allows human review.
​
Document validity.
-
According to the risk, the client defines the thresholds desired for each subservice.
-
50% to 79%.
-
80% to 89%.
-
90% to 94%.
-
95% to 100%.
We recommend a minimum of 70%.
-
The service allows human review.
​
Acceptance of registration.
-
Pass.
The user complies with the pre-established configuration indicators in the matrix of multiple verification and authentication factors.
-
Under review.
The user does not meet the pre-established configuration indicators in the multi-factor verification and authentication matrix, but is within a tolerable margin for case analysis. The client makes the decision.
​
-
Does not pass.
The user does not meet the preset configuration indicators in the multi-factor verification and authentication matrix.
​
Use cases
Banking and Finance. Multifactor identity verification is an important process to ensure security and prevent fraud. This process is essential to protect customers' assets and financial information and to prevent unauthorized access to their accounts. Multifactor verification may also be required to comply with government and compliance regulations such as money laundering laws.
E-commerce. Customers must provide personal and financial information. Multifactor identity verification helps ensure that only authorized individuals make purchases on a website.
Educational institutions. Use multifactor identity verification to ensure that only authorized individuals have access to sensitive education information. Identity verification may include checking identification documents such as passports, driver's licenses or student cards, and may be a requirement for access to certain areas or resources of the institution.
Health. Clients must provide personal and financial information. Multifactor identity verification helps ensure that only authorized individuals have access to health services.
Insurance. Ensures that the person applying for insurance is who they say they are, which helps prevent fraud and maintain the integrity of the system. Improves the customer experience, allowing a faster and more convenient process for the customer, as it can be done online and without the need to go to an office.
Government services. Ensures security and protects the privacy of citizens. This process is essential to protect citizens' sensitive and confidential information and to prevent unauthorized access to their personal and financial data. It may also be required to comply with government and privacy regulations, such as the Personal Data Protection Act.
Telecommunications. Customers must provide personal and financial information. Multifactor identity verification helps ensure that only authorized individuals have access to services.
Transportation and logistics. It is used to ensure that individuals or companies accessing certain services or resources are really who they say they are. This can include verifying the identity of truck drivers, authenticating shipments, and validating the identity of shippers and recipients. By verifying the identity of passengers, you can ensure that the people traveling on a mode of transportation are the same people who are registered in the system and that they meet security requirements. It can include verification of identification documents, criminal records, and security checks on watch lists. In addition, identity verification can also help prevent unauthorized entry and ensure the integrity of the supply chain in the transportation of goods.
​
Tourism. By verifying the identity of tourists, tourism service providers can ensure that the people who book and travel are actually the ones who have registered. It can also help prevent the entry of unauthorized persons into certain tourist areas and may be required to comply with immigration and national security regulations. Identity verification can be done through the presentation of identification documents such as passports or driver's licenses, and may be a requirement for booking accommodation, tours or flights.
Frequently Asked Questions
What types of documents do you accept for identity verification?
We have the ability to train our visual computing algorithms to accept different types of identity documents, we support especially the official identity documents of each country, passports and driver's licenses, mainly in Latin America.
​
How do you guarantee the security and privacy of customer information?
We implement multiple data security strategies, and maintain more than 35 security, privacy and data protection policies. We run drills and have an incident management policy. We anonymize the information collected.
​
In which countries do you have coverage?
Ecuador, Colombia, Costa Rica, Panama and Peru.
​
What processes and technologies do you use to verify the authenticity of documents?
We use different visual computing algorithms that allow us to process information from the captured documents, such as sources, taxonomy and other characteristics of each one of them on which we establish the probability that the document is authentic with a very high reliability.
​
Do you offer any additional services or solutions to enforce identity verification, such as biometric authentication?
Anteia identity verification is intrinsically connected to biometric authentication, our process requires validation of both the document and the person, so we can verify if the person matches the document.
​
Do you have any experience or certifications in identity verification in a specific sector?
We have experience with entities in the solidarity sector, banking, finance, insurance, cargo transportation industry, among others. We follow biometric and identity verification standards, following GDPR and ISO 27701 standards.
​
What are the processing times for identity verification?
A user can take between 1 and 3 minutes to finish a verification process, our methods allow background processing while the user interacts with the application.
​
Can you handle mass or large scale identity verification?
Yes, we have a scalable system to perform verifications based on the needs and capacity requirements of each client.
​
Do you offer any technical support or customer service to help with identity verification related issues?
Yes, in addition to a technical support service, we have automated support systems (intelligent personal assistant) that help users in a friendly way to successfully complete a verification process.
​
Do you offer integration with other platforms or systems to facilitate the identity verification process in a company's workflow?
Our system is easy to integrate, so we offer multiple integration options that allow us to connect with diverse systems, so that the customer experience is the best.
​
How is customer identity verification information handled and stored?
We have multiple methods of managing and storing information, through our Data Fabric we anonymize and pseudonymize sensitive user data to enhance user privacy. We handle different types of connections and data transfer to deliver information to the customer in a secure manner.
​
Do you have a process in place to handle fraud situations or unauthorized identity verification attempts?
Our system analyzes the verification process and in case of finding anomalies it generates alerts, all this based on the client's parameterization, so that for those cases they can manually verify if the anomaly was caused by a fraud attempt.
​
What kind of reports or statistics can you provide to help companies evaluate and improve their identity verification processes?
One of the functionalities in the Backoffice is the possibility to evaluate, through graphs and consolidated information, the information of the verifications in different time ranges. This is particularly useful to know the effectiveness of a new campaign, or to know at a glance the number of people accepted in a particular flow.
​
In case of fraud, are you responsible for the damage caused?
Anteia is responsible for complying with the configuration parameters of the verification matrix, in case of any system failure we are responsible
​
In case of storing the information, and reaching a contract termination, does the transfer of the information generate a cost?
Yes, the cost varies according to the transfer method, since it must comply with the security requirements for data transfers that we have in our policies.
Do you validate the photograph of the document with the issuing entity?
The information of the identity document is consulted, in case the issuing entities offer this service.
​
Do you send notifications via WhatsApp?
In case of need, it is used as a backup means of notifications.
​
Is the platform modular?
Yes, anteia services can be obtained separately.
​
How many verifications can be performed per minute?
A provisioning analysis is performed for each customer.
Digital identity
A virtual and digital representation of a person on the Internet and other digital media, including personal and professional information such as names, contact information, preferences and online activity. This information allows users to interact and transact online, resulting in a more convenient and efficient experience. It can be used by companies and organizations to personalize the user experience and improve the efficiency of business processes.
​
Pseudonymization is a technique used in data processing, which aims to protect the privacy of data subjects when processing their personal data. This technique is not a method of anonymization; it simply reduces the linkability of a data set to the original identity of the data subject.
​
Pseudonymization consists of replacing the unique identifiers of the data, such as name, address, identification number, etc., with an artificial identifier (an alias or code). This process allows the processing of personal data without exposing the real identifiers of the data subjects, reducing the risk of re-identification and, therefore, the violation of privacy. Anteia implements a comprehensive pseudonymization process to protect the privacy of data subjects, complying with the highest global regulatory standards on data protection.
​
The process includes identification of sensitive data, creation of an artificial identifier and its encryption, replacement of unique identifiers with an encrypted identifier, validation of the pseudonymization, secure storage and use of the pseudonymized data, and documentation and auditing of the process. We use the SHA-256 hashing algorithm to ensure data integrity and generate a unique hash.
We pseudonymize identity verification data.
We create a digital identity.
Services such as Docs and SecurSing orbit around digital identity.
Analytics
Cost. It measures and calculates the costs of the digital identity creation processes according to the behavior of the users, so that the costs per month can be foreseen according to the expected transactionality.
​
Users. Analyze user registration data to obtain information such as their demographic profile.
​
Conversion funnels. A conversion funnel is generated to analyze user behavior within the process. With this it is possible to analyze the efficiency and effectiveness of the current configurations in order to parameterize the system in an optimal way.
​
Customer experience. Evaluate customer satisfaction with the process, which allows us to identify areas for improvement in terms of usability and customer interaction.
​
Trends. Customer registration data is analyzed to detect trends and patterns, which allows identifying business opportunities or process improvements.
​