Verification Monitoring
The verification monitoring tab shows you every single verification done in more detail.
The verification Monitoring Page is a feature in the user dashboard that allows users to monitor the status of their KYC verification process.
The page also provides a detailed breakdown of the user's verification status, including the date and time of the verification process, the documents submitted, and any comments or feedback provided by the FACEKI.
Overall, the Verification Monitoring Page provides users with a transparent and user-friendly way to monitor their KYC verification status and ensure that they meet all necessary compliance requirements.
Steps Access to Verification Monitoring Page
Log in to the user dashboard using your credentials. Once you are logged in, navigate to the verification monitoring section, under the Verification menu.
You can filter the results based on various parameters, including:
Date of Verification
Document Number
Person Name
Request ID
Issuer Country
Branch
Status
Additionally, you can view detailed reports for each verification request by clicking the respective view button in the action column. From there, you can download the PDF report or delete the record as needed.
You also have the option to export the data for further analysis and reporting in Excel or CSV format.
Filters Available:
Monitoring Screen:
Verification details:
Overview
Person Name: The full name of the individual undergoing verification.
Document Number: The unique identifier associated with the document provided.
Status: The current status of the verification process (e.g., Pending, Approved, Declined).
Contact Email / Phone Number: The email address and/or phone number provided by the user during verification.
Verification Timestamp: The date and time when the verification process was completed.
Security Checks: Key verification criteria, including:
Selfie Liveness: Assessment of the selfie to confirm the user's presence.
Document Liveness: Verification that the document is genuine and not a static image.
Face Match: Comparison between the selfie and the document photo.
Verification Rules: Compliance checks are based on predefined rules.
Quality & Analysis: Evaluation of the document's quality and authenticity.
AML/PEP: Screening against Anti-Money Laundering (AML) and Politically Exposed Persons (PEP) lists.
Documents Information:
Person Name: The full name of the individual undergoing verification, which is essential for identity confirmation.
Document Type: The category of identification document provided, such as an identity card, which indicates the type of identity being verified.
Document Number: A unique identifier assigned to the document, used for tracking and verification purposes.
Personal No. / Document Additional No.: An additional identification number associated with the document, which may serve various administrative or verification functions.
Document & Selfie Face Match Score: The percentage score indicating the match quality between the submitted selfie and the document photo, reflecting the accuracy of facial recognition.
Full Name: The complete name as it appears on the identification document, is crucial for verification against submitted data.
First Name: The individual's first name, which helps in personal identification.
Middle Name: The individual's middle name, if applicable, providing additional context to the person’s identity.
Last Name: The family name of the individual, necessary for formal identification.
Local Name: The name in the local language or script, if applicable, which may be relevant in specific contexts.
Gender: The individual's gender, as recorded on the identification document, is important for demographic purposes.
Date of Birth: The birth date of the individual, which is critical for age verification.
Expiry Date: The date on which the document becomes invalid, necessary for assessing the document's current status.
Issue Date: The date when the document was issued, which may be relevant for determining the document's validity period.
Nationality: The individual's nationality as stated in the document, is important for compliance and regulatory purposes.
Nationality Local: The local designation of nationality, if provided, is useful for cultural or legal contexts.
Document Issuer: The authority or country that issued the document, is significant for verifying the document's authenticity.
MRZ (Machine Readable Zone): The section of the document containing encoded data for machine reading, essential for automated verification processes.
Actions
Copy JSON Object: A feature that allows users to copy the verification details in JSON format for further use or integration into other systems.
Documents Images
Selfie Image: The image captured of the individual’s face during the verification process. This is used for facial recognition to match with the document photo.
Document Front Image: The full image of the front side of the identification document. This image contains essential information such as the holder's name, document number, and expiration date.
Document Back Image: The full image of the back side of the identification document. This may include additional information, such as security features or barcodes.
Document Back Image: The full image of the back side of the identification document. This may include additional information, such as security features or barcodes.
Document Front Cropped Image: A cropped version of the front image that focuses on key identifying features, facilitating easier review and processing.
Document Back Cropped Image: A cropped version of the back image that highlights important details while eliminating unnecessary background, improving clarity for verification.
Signature: The image of the individual's signature, usually taken from the document. This is used to verify authenticity and confirm identity.
Document Portrait: A portrait-style image of the identification document, ensuring that all relevant details are captured and presented clearly for verification purposes.
AML Information:
Device Fingerprints:
Device Information
Type: Specifies the category of the device being used (e.g., smartphone, tablet, desktop), which helps tailor the verification process to device capabilities.
Brand: The manufacturer of the device (e.g., Apple, Samsung), useful for assessing device authenticity and security features.
Model: The specific model of the device, provides insight into its hardware capabilities and software compatibility.
Client Type: Indicates the type of client application being used (e.g., web browser, mobile app), important for understanding the user experience during verification.
User Agent: A string of data that provides information about the browser and operating system, assisting in identifying potential compatibility issues or anomalies.
IP Information
IP Address: The unique address assigned to the device, used for geolocation and security checks to verify the user's location.
ISP (Internet Service Provider): The company providing internet access to the user, which can give context about the reliability and security of the connection.
Region/City: The geographical location of the user based on their IP address, is important for compliance with regional regulations.
Timezone: The local time zone of the user, which can be relevant for timing-related verification processes and behavioral analysis.
Additional: Any supplementary information related to the IP address
Behavioral Insight & Risk:
. Phone Information
Phone Number: This field records the mobile phone number being assessed for potential risks.
Country: This field verifies the country in which the phone number is registered, confirming the location and providing carrier/provider information.
Carrier/Provider: This field identifies the service provider associated with the phone number (e.g., AT&T, Vodafone), helping to determine legitimacy.
Type: This field classifies the phone number as a mobile line or other types (e.g., landline, VoIP).
WhatsApp Last Seen: This field records the last known activity or usage associated with the phone number on WhatsApp, helping to assess recent usage.
Risk Level: This field evaluates the risk level of the phone number, with "Low" indicating no suspicious activity or fraud detected.
Disposable Phone: This field checks whether the phone number is linked to a disposable or temporary account, which would indicate a higher risk of fraud.
Email Information
Email Provider: This field identifies the domain of the email address (e.g., Gmail, Yahoo) to determine if it's associated with a common and trusted provider.
Risk Level: This field assesses the overall risk of the email address, considering factors like data breaches or suspicious activity.
Data Breaches: This field checks if the email address has been involved in any known data breaches, which would indicate a potential security risk.
Domain Info: This field provides information about the domain associated with the email address, ensuring it's a legitimate and trusted provider.
Additional Information: This field confirms whether the email address is linked to a free mail provider, which is common for personal use.
Social Media Profiles: This field identifies any active social media profiles connected to the email address, verifying the user's presence across trusted platforms.
Temporary Email: This field checks if the email address is a disposable or temporary account, which could be a sign of fraudulent behavior.
IP Address Information
IP Address: This field records the specific IP address under evaluation for potential security risks.
Country: This field confirms whether the IP address matches the expected country, ensuring geographical consistency.
Risk Level: This field indicates the overall risk associated with the IP address, based on various factors such as suspicious activity or known threats.
VPN/Proxy/Tor Detection: This field checks for any evidence that the IP address is using VPNs, web proxies, or Tor networks, which could indicate attempts to conceal the user's true location.
Public Proxy: This field identifies whether the IP address is being routed through a public proxy, which could be a sign of anonymous or potentially malicious behavior.
Open Ports and Spam Lists: This field checks if the IP address is associated with any open ports or listed in spam databases, helping to determine its legitimacy.
Timeline & Notes:
Audit Trail
The Audit Trail provides a detailed log of system interactions, capturing the following information:
Timestamp: The exact time an action occurred.
Email: The email address of the individual who performed the action.
Action Detail: A brief description of the action taken, such as logging in, updating settings, or modifying permissions.
Notes
The Notes section captures additional comments or updates made by users, including:
Timestamp: The time the note was added.
Note: A brief description or comment
Who Added the Note: The email address of the user who added the note.
Actions:
You can update the verification as per your need.
Last updated