Getting Started
FACEKI Real-Time Identity Verification - KYC
This is the official guide for FACEKI developers.
If you are looking for a comprehensive guide to help you with customizing, integrating, and using FACEKI's real-time eKYC solution for user verification, you have come to the right place. The FACEKI Developer Documentation provides you with all the information and resources you need to get started and make the most of the FACEKI platform.
What is FACEKI Identity Verification?
FACEKI eKYC is a digital identity verification service that allows you to verify users from any country in less than 30 seconds. FACEKI's eKYC solution enables organizations to comply with anti-money laundering (AML) and Know Your Customer (KYC) regulations by verifying customer identities with high accuracy. It also helps businesses to evaluate the risk level of potential customers and detect suspicious activities.
Our advanced technology can verify over 13,000 documents from more than 230 countries in real time, supporting over 35 languages. This ensures that only authorized individuals can access your services, preventing any fraud and identity theft.
With FACEKI's real-time user verification, businesses can authenticate users quickly and securely while protecting against fraud and data discrepancies. Our solutions are designed to create a safer digital environment for all involved parties, allowing businesses to onboard customers safely and efficiently.
How does it work?
For users, it consists of 3 steps:
User ID verification: The user starts the verification process by capturing a photo of their ID document (ID, Passport, or Driving License) through an app or website.
Liveness check: FACEKI's solution performs a liveness check to ensure that the user is physically present and not a spoofed image. This involves asking the user to perform a specific action, such as blinking or nodding their head.
Verification result: Once all the checks are completed, FACEKI's solution returns a verification result indicating the verification result (Accepted or Declined).
The security checks performed:
While the user performing the steps above, FACEKI behind the scenes is performing several AI-powered security checks in real-time, before a result gets given. Below is a list of the checks performed:
Anti-spoofing Check: FACEKI's solution uses advanced anti-spoofing technology to detect and prevent fraud attempts, such as the use of fake photos or videos.
Photo Face Match Check: FACEKI's solution compares the user's submitted photo or ID document with a live photo or video of the user to confirm that they are the same person.
Image Quality Check: Make sure that all texts on the ID are readable and with a high confidence score, and that the ID portrait image is clear, not blurry.
Document Type Check: To identify the type of document presented whether it’s an ID card, Passport, Driving License, or other type. Also identifying the document's origin and issuing country.
Security Features Check: Make sure that the document includes all security features by the issuer, and that it’s authentic, not photoshopped or manipulated in any shape or form.
Data Matching Check: Cross-check the data printed in the document on the front side and the back that it matches. Also, match the printed data (using OCR) with the data in the document Bar Code and MRZ code that they are matching, otherwise, it will be flagged.
Validity Check: Make sure that the document presented is valid and not expired, as well as calculate the days remaining till it expires.
Additional Checks: Depending on the requirements and settings selected, businesses may opt to activate extra checks to be performed, additional checks may be performed, such as age verification, gender verification, and nationality verification.
Risk Scoring: Once all the checks are completed, FACEKI's solution calculates the risk based on all checks performed and returns a verification result indicating whether the user verification is Accepted or Declined.
Overall, FACEKI's solution provides businesses with a fast, secure, and efficient way to authenticate users while also preventing fraud and creating a safer digital environment.
Last updated