To Be Secure, Authenticate Identity
Who hasn't met someone affected by identity fraud? It’s already considered the number one source of cybercrime and it's often unreported because people are reluctant to admit they were victims of it. This is a real and legitimate fear in this day and age, but there are ways to take the guesswork out of digital identification.
It's not just individuals on guard about their identity theft, it’s also large-scale enterprises, governments and institutions who worry about becoming victims as well. Nothing is worse than an information security breach or a hostile account takeover. Here at Authenticate, we spare you the risk of mistaking someone for someone else. As Cambridge Dictionary states, authentication is "the process of proving that something or someone is real or genuine".
Our bundled authentication and verification interface Medallion™ is an all-in-one identity authentication solution. It's an easy-to-deploy, fully scalable and white-labeled React application that is platform agnostic. This ensures that anyone with a government-issued photo ID or passport can quickly authenticate themselves anywhere. MedallionTM verifies the authenticity of IDs by comparing security features against authoritative government sources.
How does Medallion authenticate identities?
By using machine learning, computer vision, and AI there is a forensic analysis done on the photo ID or passport. We are able to successfully analyze more than 6,000 forms of government-issued identification from 200 countries and territories in 38 different languages. Our application is easy to customize with your brand. You can integrate it and activate it in just a few steps. Check it out here to try it yourself. In addition to determining if any of these accepted forms of government identification have been forged or tampered with in any way, Authenticate's International IDV provides authoritative database coverage in 31 countries outside the US and Canada, to ensure undoubtedly that you are not looking at a really good synthetic identity. By verifying security features and data against trusted sources, Medallion establishes that credentials are genuine - the definition of authentication.
What else can Medallion do?
If someone is from the US and doesn't have an official government ID or passport on-hand, they can try a classic, 5-question, multiple choice, out-of-wallet, personal, knowledge based authentication (KBA) quiz with just their legal name, date of birth, address that strings to their identity and last four digits of a SSN or ITIN. This KBA quiz serves as an additional authentication factor by verifying users know confidential details tied to their identity.
For clients who would like to collect and verify first-party employment, education or professional license data Authenticate can independently prove this information as well. You can customize Medallion to match the theme of your brand, to include your logo, to send emails from your domain, to offer KBA as an option, to require facial recognition and liveness detection, and more such as multiple workflow configurations and domain verification (coming soon).
What other identity attributes can Medallion authenticate?
- Email & SMS One Time Passcodes
- SSN, ITIN, FEIN & D-U-N-S®
- Criminal & Sex Offender Checks
- Federal/State/County Criminal & Civil Records
- Global Watch Lists and Sanction Checks
- Financial Account Ownership
- Evictions, Liens, Judgments, Bankruptcies
- DMV & Motor Vehicle Reports
- Military Service and Veteran Status
By cross-checking details against authoritative sources, MedallionTM verifies that attributes such as SSN, criminal history, income, etc. genuinely belong to the identity - fulfilling the authentication process.
How does True Continuous Monitoring provide ongoing authentication?
True Continuous Monitoring provides near-real-time reporting for arrests, bookings, warrants, and incarcerations. This allows for ongoing authentication by continuously verifying identities remain clear of issues over time. You can periodically recheck someone, but that leaves gaps where compromised access could go undetected. Continuous monitoring plugs those gaps by perpetually authenticating approved users.