THEFRAUDPRACTICE PROTECTING THE BOTTOMLINE

Page created by Alfredo Nichols
 
CONTINUE READING
THEFRAUDPRACTICE PROTECTING THE BOTTOMLINE
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

 FRAUD TECHNIQUE:
 IDENTITY DOCUMENT VERIFICATION
 A technique data sheet presented by The Fraud Practice LLC.
THEFRAUDPRACTICE PROTECTING THE BOTTOMLINE
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

     Fraud Technique: Identity Document Verification

     Author: David Montague

           Identity Document Verification as a risk program technique ........................ 3
           What is the market need that Identity Document Verification addresses ...... 4
           How does Identity Document Verification work? ........................................... 4
           Fraud technique strengths and weaknesses ................................................. 5
           Where it falls into a risk program ................................................................... 6
           Who/where is it desired in the market ........................................................... 7
           Vendors offering Identity Document Verification ........................................... 7
           Vendor approaches to Identity Document Verification .................................. 8
           Practical application, integration, and complexity .......................................... 9
           Appendix ..................................................................................................... 10

      Intended solely for the entity who purchased this document and/or was authorized to obtain a
      copy by The Fraud Practice, LLC.

      THIS DOCUMENT IS CONFIDENTIAL.
      This document including any transporting email, or facsimile are proprietary and confidential information
      intended only for the use of the recipient(s) named above. If you are not the intended recipient, you may
      not print, distribute, or copy this document. If you have received this document in error, please notify the
      sender by return e-mail or facsimile and destroy this document and any transporting emails from your
      computer.

                     This technique data sheet is sponsored by IDChecker (www.idchecker.com)
                                                                                                                         © The Fraud Practice 2014
                                                                                                                               CONFIDENTIAL

2                                                           Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE PROTECTING THE BOTTOMLINE
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

          Identity Document Verification as a Risk Program
          Technique
          Identity Document Verification helps organizations verify a person is who they say they
          are. Modern services allow consumers to take a photo of their driver’s license, ID card,
          passport, credit card, bank statement, bill or other document relevant for the transaction.
          The consumer may also take a photo of themselves. Facial features are translated into an
          algorithm and compared to the image on their ID card in real time. In many cases, vendors
          also offer a service that can auto-populate sign-up forms through a photo of the ID or
          statement.

          Pre-transaction            Transaction      Post-transaction        Fulfillment      Reconciliation

    Identity Document Verification
      takes place pre-transaction

          Identity Document Verification seeks to confirm relevant information to a user's identity that may
          be required for KYC (know your customer), AML (anti-money laundering), and other compliance
          requirements. It is often used by financial institutions, financial services businesses, and others
          concerned with these regulatory requirements. It may also be used for businesses that are
          granting credit, or selling age-sensitive goods or services. Many different types of merchants use
          Identity Document Verification, although not on every single transaction. It is something to consider
          for the cases where it can help drive increased revenue while keeping fraud down. These cases
          include international transactions, and instances where a person cannot be effectively authenticated
          and verified using traditional methods.

          Many organizations have performed Identity Document Verification in-house by having consum-
          ers fax in documents, but this is often a rudimentary version of the technique compared to ser-
          vices available in the market today. Few organizations will be able to effectively spot forgeries,
          and the majority of businesses do not have the equipment to decipher barcodes, symbols, and
          codes. A third party provider can read and process customer’s documents, ensuring they’re not
          forged and checking specific document details such as holograms, background printing and micro
          text. Service providers may also add the security of facial recognition, ensuring the documents aren’t
          stolen. Not to mention, being able to use a cell phone, tablet, or computer makes the process
          more pleasant for the customer than having to fax or scan and submit their identity documents.

                                                                              Risk Program
            The Fraud Practice considers Identity                     Operational Tools
            Document Verification to be a technique                                                   Fraud Tools
            within a risk program’s operational tool kit.              ID Doc. Verification

                                                                         Strategic Tools

                                                                                                      © The Fraud Practice 2014
                                                                                                         CONFIDENTIAL

3                                                     Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

      What is the Market Need that Identity Document
      Verification Addresses?
      Identity Document Verification has a focus on fraud prevention and is excellent for meeting
      KYC, anti-money laundering, and other types of compliance, but it is also a sales conversion
      enabler for merchants, allowing businesses to feel comfortable taking orders where normal
      verification checks fail.

      These orders can, for example, be related to good customers who cannot be verified through their
      phone number or address, and international orders where verification methods typically common in the
      USA are difficult, if not impossible. Using Identity Document Verification allows organizations to expand
      their reach with a streamlined workflow similar for all markets instead of using a multitude of routines
      and services. Identity Document Verification can also streamline the user’s experience, particularly on
      mobile platforms.

      Besides verifying customers who might not be reached by traditional checks, document verification with
      facial recognition can be an excellent tool for select high-risk, high-price orders. Most fraudsters attempting
      to use stolen information online are not in possession of the actual credit card and the person’s ID, and
      asking for a photo can be a good deterrent. Even if they have these items, comparing their photo to the
      one of the documents will make utilizing stolen credentials nearly impossible.

                                                              Channel Effectiveness
                                                         Online - web                       Superior
     Identity Document Verification is most
     efficient and needed on transactions                Online - mobile                    Superior
     where the customer is not present.
                                                         Point-of-Sale                      Average
                                                         Telephone                     Below Average
                                                         Mail Order                    Below Average

                                                                                                       © The Fraud Practice 2014
                                                                                                           CONFIDENTIAL
4                                                      Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

      How does Identity Document Verification Work?

      Any camera-equipped device is turned into a data capture tool, allowing consumers to take
      photos of their ID cards, driver’s licenses, credit cards and passports. These standard docu-
      ments are considered “core” documents and are widely supported.

      Most vendors will also support “peripheral” documents such as bank and account statements, utility
      bills, insurance cards, non-government issued identification cards, and similar. The vendor may also
      offer the ability to create new templates to manage other types of peripheral documents that aren’t
      already included.

      The information is encrypted and processed in real time. A series of automated checks on the identity
      document are performed to include forgery checks as well check-sums and consistency checks with
      details in the document such as the Machine Readable Zone (MRZ). The MRZ contains information
      that confirms data on a passport, such as date of birth, nationality, gender, and expiration date. In most
      cases, verification takes less than a minute, and the consumer gets a smooth and pleasant online
      experience.

      Vendors may also offer manual document checks provided as a managed service, as well as facial
      recognition and comparison checks to ensure the person providing the document is the true document
      owner. The vendor may offer services with biometric checks such as facial recognition, which generally
      look for involuntary movement and blinking to assure the person on the picture is an actual person and
      not just a photo of another photo. The software extracts key features which are translated to an
      algorithm to be compared to the algorithm for the photo on an identity document.

      An additional benefit of Identity Document Verification is automated form filling features through optical
      character recognition (OCR) that can help users sign up or fill out forms through a picture of their
      documents instead of typing. Another benefit of OCR is pulling information from identity documents that can
      be used for authentication with service providers’ partners, or through third party data integrations.

                                                                                                    © The Fraud Practice 2014
                                                                                                       CONFIDENTIAL
5                                                    Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

        Fraud Technique Strengths and Weaknesses
        Identity Document Verification gives one fraud flow for many regions of the world. It is
        excellent for complying with “know your customer” and anti-money laundering regulations,
        and great for access to the unbanked, underbanked, and immigrant populations. The
        technique can also be implemented very quickly. Although third party services make the
        process of submitting an ID document as easy and streamlined as possible, it can be
        perceived as somewhat intrusive, and works best when customers are invested in com-
        pleting a transaction.

                      Fraud Technique Strengths
                                                                          Rating
                           and Weaknesses
                            First Time Fraud Detection                  Above Average

                              Repeat Fraud Detection                       Average

                                Account Takeover                           Average

                                 Application Fraud                      Above Average

                                   Internal Fraud                       Below Average

                                   Affiliate Fraud                      Below Average

                             3rd Party Fraud Detection                  Above Average

                     1st Party Fraud (Friendly Fraud) Detection            Average

                     Sales Conversion (Enhance and Increase)               Average

                                     Monitoring                         Below Average

        Where does Identity Document Verification fall into
        a Risk Program?

                       Independent         Multiple       Partial   Vertical       Full
                           Tool             Tools        Solution   Solution     Solution

        Identity Document Verification is a tool, used within a risk program for monitoring and
        managing fraud pre-transaction. This is a global technique which can greatly facilitate
        cross-border transactions.

                                                                                            © The Fraud Practice 2014
                                                                                               CONFIDENTIAL

6                                                    Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

        Who/where is it desired in the market
        Verticals drawn to Identity Document Verification include:

                  Those who do international business
                  Financial institutions, credit granting, financial services etc
                  Any business with KYC or AML requirements
                  High-dollar goods merchants
                  Person to person interactions such as Bed and Breakfasts

        Vendors Offering Identity Document Verification
        IDchecker were established in 2004 to verify identities through document verification for
        legal and compliance requirements. The service has since expanded to improve the accuracy
        and processing of personal information while serving as an additional step in the detection of
        identity fraud. They have offices in the Netherlands, United Kingdom, and USA. Their StrongID
        product performs automated verification and forgery checks on identity documents, including
        extracting and pre-filling data into web forms with the option to include manual identity document
        checks while biometric facial recognition and comparison can also be included through their
        FaceLink product.

        Jumio were founded in 2010 and have their headquarters in Palo Alto California, but the
        company has offices in Europe and operates development centers in Linz and Vienna, Austria.
        Their Identity Document Verification product, Netverify®, offers real-time ID verification of passports,
        driver’s licenses, government issued ID cards, utility bills, insurance cards, and bank statements
        from over 100 countries. It is used by financial institutions, e-retailers, and consumer marketplaces
        to meet know-your-customer industry regulations and internal policies, reduce fraud and chargeback
        costs in purchase transactions, and enhance trust and safety in online communities.

                                      Company Service Information

                                                                                    Service Information Direct
               Name                              Headquarters
                                                                                               URL

                                  Haarlem, The Netherlands with a satellite
             IDchecker                                                                  www.idchecker.com
                                     office in San Francisco, California

                                  Palo Alto, California with satellite offices in
               Jumio                                                                       www.jumio.com
                                          London, Linz, and Vienna.

                                                                                                     © The Fraud Practice 2014
                                                                                                        CONFIDENTIAL

7                                                    Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

         Vendor approaches to Identity Document Verification

         IDchecker offers easy sign-up forms, document verification, and biometric authentication for
         mobile and web transactions. Their focus is on reducing fraud and creating a smooth user
         experience. They have three main products:

         Easy Onboard™ captures data for sign-up forms and similar through the customer’s camera. It
         processes personal data and any photos extracted from documents in real time, creating a
         high-speed form filling experience for the customer.

         Strong ID allows customers to upload their documents with a cell phone, tablet, or
         computer, and verifies documents in seconds. If a manual review is required, the response
         comes back in minutes.

         FaceLink™ ties Identity Document Verification to biometric authentication through
         cloud-based facial recognition. The service works in real time through creating an algorithm to
         define facial features and comparing these to the image on the person’s ID card. FaceLink also
         uses liveness detection to make sure the photo is of a real person.

         Jumio offers payments and ID scanning and validation products for mobile and web
         transactions. Their focus is on reducing fraud and increasing revenue through minimizing friction
         in customer transaction. They have three main products:

         FastFill captures data for sign-up forms and similar through the customer’s camera.

         Netverify® offers real-time ID verification of passports, driver’s licenses, government issued ID
         cards, utility bills, insurance cards, and bank statements from over 100 countries.

         Netswipe® supports real-time credit card scanning and validation in online and mobile
         checkouts.

                                  Service Features and Coverage
                                                     Data Capture            Biometric Facial            Countries
    Company Name       Documents Accepted
                                                      and Autofill             Comparison                Covered

                        Core and Peripheral                                  Yes (FaceLink –
      IDchecker                                           Yes                                                196
                        Identity Documents                                  add-on to StrongID)

                        Core and Peripheral                                  Yes (Included with
       Jumio                                              Yes                                                102
                        Identity Documents                                       Netverify)

                                                                                                  © The Fraud Practice 2014
                                                                                                     CONFIDENTIAL

8                                                  Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

          Practical Application, Integration, and Complexity
          Identity Document Verification is a technique merchants can put in place in less than 24
          hours – in many cases in less than one hour – and it is considered not difficult to implement.
          These services can be utilized by a merchant at any level.

          Both IDchecker’s and Jumio’s products can be implemented into an existing mobile application
          through a software development kit. Jumio also offer HTML5 for mobile.

          For website use there is an application programming interface, or access through               Time to Implement:
                                                                                                                Short
          iFrames. Both vendors offer a client portal.

                                                                                                           Level of Difficulty:
                                                                                                                  Easy

                                    Service Integration Information

    Company Name         Client Portal     Integration Options         Integration Time          Technical Difficulty

                                                                    Web—minutes (iFrame)
                                            Web—API, iFrame
                                                                    to hours (API), Mobile
      IDchecker               Yes            Mobile—SDK                                                    Easy
                                                                    SDK varies on level of
                                              Client portal
                                                                          integration

                                           Web—API, iFrame
       Jumio                  Yes         Mobile—SDK, HTML5            Minutes to an hour                  Easy
                                              Client portal

                                                                                                  © The Fraud Practice 2014
                                                                                                      CONFIDENTIAL

9                                                   Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

                                                                                                        APPENDIX
                            Company Service Information

                                                                         Service Information Direct
            Name                      Headquarters
                                                                                    URL

                         Haarlem, The Netherlands with a satellite
          IDchecker                                                         www.idchecker.com
                            office in San Francisco, California

            Jumio                  Palo Alto, California                  www.jumio.com/netverify

                              Sales Contact Information

           Name             Sales Person       Phone Number                 Email Address

          IDchecker      Chris Montesanti       727-343-1430         chris.montesanti@idchecker.com

           Jumio            Ray Soriano                                  ray.soriano@jumio.com

                                 Regions and Channels

               Name                Regional Coverage                    Channel Effectiveness

             IDchecker            Global—196 countries                   Online, Mobile, POS

               Jumio              Global—102 countries                   Online, Mobile, POS

                            Company Service Information

               Name                                          Partners

             IDchecker                      192business.com, Experian, edentiti, Crif

               Jumio                                       IDology, Vodlo

                                                                                          © The Fraud Practice 2014
                                                                                               CONFIDENTIAL

10                                          Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE                                                                                    APPENDIX
                          Coverage and Service Usage Information

                                                                                                                      APPENDIX
                              Monthly Minimum/
      Name                                                     Coverage                    Customers
                              Volume Minimum

                                No minimums                                       2 of the world’s largest money
                                No set-up fees                 Global (196     transfer businesses. Market leader
     IDchecker
                               No contract time                countries)               in temp agencies in
                              Pay per verification                                            Europe.

                             Monthly plans for usage
                        license with volume caps starting
                        at $795 per month with 12 month                        Travelocity, Airbnb, Entropay, Pok-
                                                               Global (102
      Jumio              contract. Pre-purchase available                      erStars, 5 of top 10 consumer inter-
                                                               countries)
                       instead with minimum purchase of                          net companies in Silicon Valley.
                        1,000 documents (can be used at
                                     any time)

                             Platforms and Documents Supported

     Company name               Platforms Supported                          Documents covered

                                                               Core (passports, national IDs etc) and peripheral
                              Mobile (iOS and Android),         (account statements, bills, insurance cards etc)
       IDchecker
                                        Web                    identity documents. Will build a template for new
                                                                     documents a client needs to process.

                                                                     Core (passports, national IDs etc) and
                              Mobile (iOS and Android),
     Jumio Netverify                                            peripheral (account statements, bills, insurance
                                mobile HTML5, Web
                                                                        cards etc) identity documents.

                                             Technical Integration

     Company name                  Integration Options               Integration Time              Technical Difficulty

        IDchecker                 API or iFrame for web.        Web — minutes (iFrame) to
                                      SDK for Mobile              hours (API), Mobile SDK                  Easy
  Strong ID and FaceLink          Also offers client portal     varies on level of integration

                                  API or iFrame for Web.
      Jumio Netverify            SDK or HTML5 for Mobile.            Minutes to an hour                    Easy
                                  Also offers client portal.

                                                                                                       © The Fraud Practice 2014
                                                                                                          CONFIDENTIAL

11                                                      Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE                                                                     APPENDIX

                                                                                                       APPENDIX
                                Service Method

                            Consumers are able to provide images of their identity document
                             and face for verification via web based and mobile platforms for
                            minimal friction. Relevant data is captured and pre-filled into web
                               forms while the identity document is checked for forgery and
              IDchecker
                             inconsistencies. Optional features include manual review of the
                                identity document performed by IDchecker, third party data
                            integration to authenticate data on the identity document, as well
                              as biometric facial recognition and comparison with FaceLink.

                              The task of supplying identity documents is streamlined through
                            capture of the identity document or statement, as well as matching
                            a consumer’s face to the image in their Photo ID via a mobile app
               Jumio
                             or web based interface. Data is recorded and filled into web sign-
                            up, check-out, or registration forms via Fastfill, while identity docu-
                              ments are data filled and verified as legitimate with Netverify®.

                             Service Description

                            StrongID performs automated verification and forgery checks on
                             identity documents, including extracting and pre-filling data into
              IDchecker       web forms with the option to include manual identity document
                            checks while biometric facial recognition and comparison can be
                                         included through their FaceLink product.

                                 Jumio offers real-time Identity Document Verification of
                             passports, driver’s licenses, government issued ID cards, utility
                               bills, insurance cards, and bank statements from over 100
                                countries. It is used by financial institutions, e-tailers, and
               Jumio
                             consumer marketplaces to meet know-your-customer industry
                             regulations and internal policies, reduce fraud and chargeback
                              costs in purchase transactions, and enhance trust and safety
                                                   in online communities.

                                                                                         © The Fraud Practice 2014
                                                                                             CONFIDENTIAL

12                                      Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE                                                                          APPENDIX

                                                                                                            APPENDIX
Services and options                         IDchecker                           Jumio

Regional Coverage                            196 countries                    102 countries

                                     Automated and manual Identity    Automated and manual Identity
                                        Document Verification—          Document Verification with
Offering Type
                                        FaceLink adds biometric         biometric facial recognition
                                              component                        comparison

                                        Mobile (iOS and Android)        Mobile (iOS and Android)
Platforms Supported
                                                  Web                             Web

Mobile Capture Option                             Yes                              Yes

Web/Webcam Capture Option                         Yes                              Yes

i-Frame Solution                                  Yes                              Yes

Data Capture and Prefill                          Yes                              Yes

Forgery Checks                                    Yes                              Yes

Manual ID Check Option                            Yes                              Yes

Verifies Passport Machine Reada-
                                                  Yes                              Yes
ble Zone (MRZ)

Checks Passport Background Print /
                                                  Yes                              Yes
Micro-text

Hologram Check                                    Yes                              Yes

Biometric Facial Comparison                  Yes (FaceLink)                        Yes

White Label or Integrate Document
                                                  Yes                              Yes
Capture into Mobile App

3rd Party Data Integrations                       Yes                         Partners only

                                      Automated checks, seconds to
                                        max two minutes. Manual        Seconds to max 90 seconds,
Response Time
                                     checks, minutes to maximum two     including manual checks.
                                                  hours.

                                                                                              © The Fraud Practice 2014
                                                                                                 CONFIDENTIAL

13                                                 Technique Data Sheet — Identity Document Verification
THEFRAUDPRACTICE
PROTECTING THE BOTTOMLINE

     FRAUD TECHNIQUE:
     IDENTITY DOCUMENT VERIFICATION
     A technique data sheet presented by The Fraud Practice LLC.

     Intended solely for the entity who purchased this document and/or was authorized to obtain a copy by The
     Fraud Practice, LLC.

     THIS DOCUMENT IS CONFIDENTIAL.
     This document including any transporting email, or facsimile are proprietary and confidential information
     intended only for the use of the recipient(s) named above. If you are not the intended recipient, you may not print,
     distribute, or copy this document. If you have received this document in error, please notify the sender by return e-mail
     or facsimile and destroy this document and any transporting emails from your computer. For updates and modifications
     to this document, please visit www.fraudpractice.com/Course-DataSheet-Issuer-Alerts.html

     © 2014. The Fraud Practice, LLC. All Rights Reserved Subject to Terms of Use available at
     http://fraudpractice.com/terms.html. The Fraud Practice LLC names and logo and all other names, logos, and slogans
     identifying The Fraud Practice’s products and services are service marks of The Fraud Practice LLC. All other trade-
     marks and service marks are the property of their respective owners.
     Images Copyright ©iStockphoto LP                                                                        © The Fraud Practice 2014
                                                                                                                CONFIDENTIAL
You can also read