Discover affiliation processes
10X faster to bring into production
5X more secure
Core ID
Identity verification is the process of checking and confirming the data and information provided by an individual to determine if it is true and corresponds to their real identity. Multi-factor or multi-factor verification is a more secure approach as it uses several methods to confirm a person's identity, rather than just one, which reduces the risk of identity theft and increases confidence in the verification. This verification is highly customizable to ensure a high conversion rate while maintaining high levels of security.
Docs
Document processing service that allows: (1) Creation of documents such as forms, contracts, promissory notes, among others. (2) Text analysis to extract valuable information from documents, such as personal data, numbers, dates, etc. (3) Document classification that allows the automatic organization of documents according to different categories. (4) Optical Character Recognition (OCR) that allows digitizing paper documents and converting them into electronic files. (5) Monitoring of information inconsistencies and risk alerts.
Electronic signature
The electronic signature is a digital method to associate authenticated persons with valid digital documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. It is based on cryptography and security technologies. In the anteia ecosystem, identity verification is performed to associate the digital identity of the signer and ensure the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes, however, through the use of digital identity, there is always a way to verify the signer's identity. It has a certified timestamp by trusted certificate authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and document integrity.
Authentikator
Service that uses computer vision, machine learning and data analysis techniques to identify patterns and trends in forged documents, analyze and compare visual characteristics of a document (such as text, images, layout and formatting) against a database of known authentic documents. It has the ability to detect forged or altered features in a document and issue a warning or response if it is determined that the document is not authentic. Allows you to attach identity documents, diplomas, invoices, certificates, tax returns or any other document and validate its authenticity. Converts unstructured documents into structured ones. Convert images with text into computer-readable text data.
Services
Authenticated Attachments. Enables attachment of identity documents, diplomas, invoices, certificates, tax returns or any other document. Convert unstructured documents into structured ones to automate the capture of large-scale procurement data, increase operational efficiency, improve customer experience and support decision making by providing speed and security to processes.
Smart Contracts. Legal documents that can be automatically generated, securely stored on a blockchain and have programmed clauses that are automatically triggered under certain conditions, allowing for greater control and tracking of the contract lifecycle. This can improve efficiency and security in contract management.
Electronic signature. A mechanism that allows a person to bind himself to an electronic message, contract or electronic document, identifying himself as the signatory of the message. It provides users with the ability to make signatures, facilitates the distribution of legally confidential documents for the collection of electronic signatures.
Intelligent forms. Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies.
Digital Identity. Identity verification information is anonymized for reuse in future events such as form management, contracts or electronic signatures, thus streamlining processes and ensuring information security.
Decision engine. Executes automated decisions based on personalized rules as a set of processes. Uses artificial intelligence and analytics to learn and redefine decisions.
Dematerialized promissory notes. Mechanism that allows to sign, execute and endorse promissory notes supported by dematerialized technology (secure digitalization), protected with an advanced electronic signature ensuring its validity. It allows the safekeeping and filing of blank promissory notes for processing, using a secure trace for the parties, verifying the transactions made on the promissory note.
Identity verification. Multiple verification factors instantly ensure that customers, employees and suppliers are really who they say they are. Facial and voice biometrics, proof of life, ID card authenticity, GPS, Mobile Number, Device ID, verification on binding and non-binding lists, search public and private sources of information and credit history.