How digital identity verification works: 8 vital data checks | Plaid (2024)

How does digital identity verification work? 8 vital data checks

Digital identity verification works by examining a variety of data sources, ID documents, and even selfie videos to ensure a person is who they say they are. These data sources are difficult to fake, making them the most secure and reliable way to verify identity online.

Plaid also looks at digital attributes like the customer's browser, location, and whether their email was part of a data breach. No one data point is considered on its own; rather each point is part of a holistic check across multiple platforms. In many cases, customers don't even know this data is there, making it more secure and more difficult to fake.

Then, companies are provided with an assessment of the risk a user presents. Based on a customizable risk level and other verification checks, the user may be able to complete verification or a company may require the user to undergo additional review to complete the process.

Digital identity verification platforms verify a range of data points, including:

1. Digital fingerprinting

When a customer wants to use a new financial app or service, as part of the onboarding process a company may require that customer to verify their identity. With the customer's permission, Plaid IDV looks at dozens of "fingerprints" related to their online activity, including:

Each of these data points is compared to other data about the customer to verify they are a real person and determine the risk of fraud, allowing companies to make more informed decisions about risk and fraud protection.

2. Device and IP checks

Plaid also checks the user's device and IP address. For example, it looks to see if the IP address is associated with a data center, which could signify fraudulent activity. It also looks to see if there is a time zone mismatch—meaning the device says it's in the Pacific time zone while the IP address is located in the Eastern time zone.

Other IP address checks include:

  • IP geolocation mismatch

  • Incognito session

  • Blocked cookies

  • Proxy or VPN usage

Using multiple data points is crucial to ensuring the accuracy of online identity verification, which is why Plaid looks at many different data points to determine fraud risk.

3. Email checks

When a user provides their email address, it enables Plaid IDV to associate their behavior with that address. The email address can then be checked for indications of fraud.

Email checks include:

  • Email deliverability: If the email is on a domain that isn't configured to receive email, that's a strong indication of fraud.

  • Disposable email: Plaid verifies whether the email is disposable, another high-risk indicator.

  • External account registration: If the email address is associated with accounts on popular social media, that's a strong indicator they are who they claim to be. For example, emails that have never been used to create a LinkedIn, Facebook, or Twitter account are more likely to be associated with fraud.

  • Recent domain registration checks: If the email address is associated with a domain that doesn't have a website or was purchased in recent weeks, it increases their chances of being associated with fraud.

  • Email data breaches: Finally, Plaid checks to see if the email address has been associated with a data breach. It analyzes how recent the breach was and how many times the email was uncovered. Surprisingly, the more data breaches an email has been exposed to, the better—because that means the address is likely to belong to a real person.

4. Phone checks

Phone number checks work similarly to email account checks. If the phone number is associated with several external accounts, say on Google or Facebook, that indicates the user is likely a real person. Phone numbers not associated with other accounts could be fraudulent or temporary numbers.

While you won't see the exact account, you will be able to see where the user has accounts using that same phone and email, making it easier to spot risky users.

5. Network risk

Network risk checks detect if a current user has attempted to verify their identity from the same device before, making it easier to detect fraud.

For example, if a user creates two separate online identity verification sessions from one device in the same day, they are likely at a higher risk than someone who creates two sessions from the same device 10 months apart. Granular details like these help organizations make smarter risk decisions based on verifiable data.

6. Behavioral analytics

As a user navigates the online Identity Verification process, Plaid tracks how they interact with the app or site, including how fast they type, whether data is copied and pasted or typed, and the order of input. People, for example, are likely to answer questions in order, while bots and bad actors may fill out information in less predictable patterns.

7. Digital ID verification and liveness/selfie verification

Many companies, especially in fintech, still need to collect government-issued IDs. Digital ID verification makes this process easier. With Plaid Identity Verification, for example, users simply snap a photo of their ID with their phone and upload it. Then, they submit a selfie verification to show they are a real person and look like the person in the documents they provide. Rather than replacing government IDs (which are required for many financial accounts), selfie verification makes it easier to verify that the person is real and looks like the person on the ID.

Read our article on how selfie verification works to learn more.

8. Database verification

Database ID verification compares information provided by the user with information stored in issuing databases. These databases store information about consumers, such as their social security number, date of birth, location, and email address. Comparing this information with information shared by the consumer can help verify identification.

Plaid's Identity Verification is a customizable online ID verification platform that helps companies reduce fraud risk and meet KYC and AML requirements in one easy-to-use solution. It verifies identity data by comparing it against regulated data sources, authenticates hundreds of different ID documents, and confirms liveliness through selfie verification. By analyzing hundreds of risk signals, Plaid helps reduce fraud losses while protecting the customer experience and increasing conversions.

How digital identity verification works: 8 vital data checks | Plaid (2024)

FAQs

How digital identity verification works: 8 vital data checks | Plaid? ›

Digital identity verification works by examining a variety of data sources, ID documents, and even selfie videos to ensure a person is who they say they are. These data sources are difficult to fake, making them the most secure and reliable way to verify identity online.

How does the identity verification process work? ›

Through sophisticated algorithms and software, machine learning and AI detect key images, written content, digital data, and other elements in identity documentation and cross-checks them to ensure that they are genuine and also compare with the face of the person.

How does digital identity work? ›

A digital identity is a collection of information about a person that exists online. When this information is grouped together, it can provide a digital representation of an individual to help them access services and goods once a business has verified the identity of the customer.

How does online identity verification work? ›

This works by comparing the data a person sends over, whether that's a document such as a passport or biometric data such as a picture of their face and comparing that against a verified data set. This can include government records, credit references or even mobile data.

What are the three most common methods used to verify identity? ›

In the world of customer identity verification software, three methods stand out for their efficacy and widespread use: Document Verification, Biometric Verification, and Knowledge-Based Verification.

How does digital identity verification work? ›

Digital identity verification works by examining a variety of data sources, ID documents, and even selfie videos to ensure a person is who they say they are. These data sources are difficult to fake, making them the most secure and reliable way to verify identity online.

How long does it take to verify a digital ID? ›

Results often take minutes. It takes a few minutes to request a check and few minutes for an applicant to complete it.

How to do digital verification? ›

There are two main digital identity verification methods: analyzing data and analyzing identity documents. The first approach involves checking a person's identity data – name, address, phone number, birthdate – against data sources such as electoral records, credit bureaus and census information.

How is electronic verification done? ›

eIDV involves the use of sophisticated software to scan and analyze thousands of data points to determine the accuracy of the customer's personal information. The process of eIDV is quick and efficient, enabling financial institutions to verify their customers' identities in real-time.

How does personal identity verification work? ›

A PIV credential is a U.S. federal government-wide credential used to access federally controlled facilities and information systems at the appropriate security level. PIV credentials have certificates and key pairs, pin numbers, biometrics like fingerprints and pictures, and other unique identifiers.

How do I confirm my identity online? ›

By answering security questions online

You'll have to answer some security questions about things like your mobile phone contract, and any bank accounts, credit cards, loans or mortgages you may have. You also need one of the following types of photo ID: UK passport.

How to verify a person online? ›

For example, you can compare their name, date of birth, address, or email with public records, databases, or directories. You can also look for their online presence on other platforms, such as LinkedIn, Twitter, or Facebook, and see if their profile, activity, and network are consistent with their identity.

How to verify someone's identity over the phone? ›

Verifying via phone
  1. First, check the phone number if you have caller ID. ...
  2. Phone numbers can be “spoofed” or modified to trick a recipient into thinking a malicious call is legitimate. ...
  3. Ask standard questions like name, address, and phone number, but also ask something that only the individual would know.

What is the process of verifying the identity of a person? ›

The process of verifying the identity of a user is called Authentication.

How can someone verify their identity? ›

Requirements for identity verification
  1. Your driver's license or state ID card. You can upload a photo of your ID by phone or by computer.
  2. Social Security number.
  3. Your phone number. In some cases, you can verify by mail instead.
  4. Taking a photo of yourself.

How to complete the identity verification? ›

You'll take a photo of your accepted driver's license or state ID card and enter your personal information to verify your identity online. You may need to take a photo of yourself with a phone to verify your identity online. This is to check that you are the person on your ID.

Top Articles
Polyamory
MANA Price Prediction: Can Decentraland Coin Reach $100?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 6296

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.