An Overview of the FATF Recommendations
The Financial Action Task Force has a list of 40 recommendations to prevent money laundering and terrorist financing. Here are the highlights.
Our document verification and facial biometrics technology authenticates 4,000+ types of documents from over 240+ countries and territories in local languages, meaning you can on-board and verify customers around the world in real-time.
We scan the user’s ID document and detect whether it is genuine or fraudulent.
We authenticate more than 4,000 different global identity document types and many more unstructured proof of address documents. Unlike competitors with a human backend, our process is fully automated and can tell what type of ID document your customer provided.
Our liveness feature helps prevent fraudsters who are impersonating an individual from being onboarded. It verifies that the person using the device is live and not a static image, and that they match the presented ID document.
We provide instant validation of facial biometrics between ID document and photo or selfie captured on a smartphone, tablet or webcam.
We recognize and extract relevant data points from your customer’s ID documents including name, document number and more, using optical character recognition (OCR). We then verify that the extracted data has all the visual security elements, information, and other features of an authentic document.
KYC-Chain saves you time with automatic ID checks and a liveness feature, all done in real time.
If you have had problems in the past with properly authenticating documents, give our system a try - we have the highest levels of acceptance and lowest levels of false positives.
Our technology automatically detects a good frame and takes the picture.
We can detect digitally modified images to help reduce instances of fraud.
We provide configuration that allows different levels of authentication to be set for different individual or groups of documents.
We validate the ID data against public, private, and government data sources.
We analyze the device used for verification and compare hundreds of parameters with blacklists and past behavior and search for inconsistencies.