ACH Verification Account Aggregator Account Ownership Verification Account Takeover (ATO) Address Verification Adverse Media Screening Age Verification Allowlist and Denylist Anti Money Laundering (AML) Application Fraud
BIN Verification BSA (Bank Secrecy Act) Bank Account Verification Bank Statement Analysis Behavioral Biometrics Beneficial Ownership (UBO) Beneficiary Name Matching Biometric Verification Business Registry Search Business Verification (KYB)
Case Management Central KYC Registry, India (CKYCR) Chargeback Fraud Consent Management Continuous Monitoring Counterparty Screening Credential Stuffing Credit Bureau Check Criminal Screening Currency Transaction Report (CTR) Customer Due Diligence (CDD) Customer Identification Program (CIP)
Data Enrichment Database Verification De-duplication Decentralized Identifiers (DID) Deepfake Device Fingerprinting Digital Identity Document Authentication Document Verification Domain Verification Driver’s License Duplicate Account Detection
Email Verification Employer Identification Number (EIN) Enhanced Due Diligence (EDD) Entity Resolution Exception Management Expiry Date Validation External Database Checks eKYC
FAR / FRR (biometric error rates) FIDO Authentication Face Match FinCEN Financial Action Task Force (FATF) Financial Intelligence Unit (FIU) First party Fraud Fraud Ring Fraud Score Funds Flow Analysis
GDPR GSTIN (India) Genuine Presence (liveness outcome) Geo-IP Intelligence Geolocation Spoofing Global Sanctions Lists Government ID Graph Analytics
Hardware Security Module (HSM) Hash-based PII Matching High-risk Jurisdiction Human-in-the-loop (HITL)
IAL / AAL (NIST 800-63) ICAO 9303 IP Intelligence Identity Graph Identity Proofing Identity Theft Identity Verification (IDV) Injection Attack (biometrics) Instant Account Verification (IAV) Intelligent Character Recognition (ICR)
Jurisdiction Jurisdiction Screening
KBA Knowledge-Based Authentication (KBA) KYC Refresh (Periodic Review) KYC Remediation KYC Utility (Shared KYC) Key Risk Indicators (KRIs) Know Your Business (KYB) Know Your Customer (KYC) Know Your Employee (KYE) Know Your Transaction (KYT)
Layering (AML Stage) Legal Entity Identifier (LEI) Legal Name Normalization Link Analysis Liveness Detection
Machine Readable Zone (MRZ) Manual Review Microdeposits Mismatch Rate Mobile Number Verification Model Drift (monitoring) Money Laundering Money Mule Multi-factor Authentication (MFA)
NFC Chip Reading Name Screening National ID Natural Person Negative File / Denylist Network Risk Signals New Account Fraud Nominee Director Non-documentary Verification Non-repudiation
OAuth 2.0 OFAC Screening Onboarding One-Time Password (OTP) Open Banking Optical Character Recognition (OCR) Orchestration (verification flows) Out-of-Band Authentication Ownership Attestation
PEP Screening Passkeys (WebAuthn) Passport Passport Verification Penny Drop Verification (India) Phishing Phone Number Verification Placement (AML stage) Presentation Attack Detection (PAD) Proof of Address Proof of Identity
QR Code Authentication Qualitative Risk Assessment Quality Thresholds (Document Image)
Rate Limiting Re-KYC (Periodic KYC) Real-time Screening Red Flags Remediation Remote Onboarding Residual Risk Risk Appetite Risk Assessment Risk Based Approach (RBA) Rule Engine
SIM Swap SSN Verification Sanctions Screening Self-Sovereign Identity (SSI) Selfie Capture Shell Company Social Security Number (SSN) Source of Funds / Source of Wealth Spoofing (presentation attack) Suspicious Activity/Transaction Report (SAR/STR) Synthetic Identity Fraud
Tax Identification Number (TIN) Time-based OTP (TOTP) Trade-Based Money Laundering (TBML) Transaction Monitoring Transaction Risk Indicators (TRIs) Transaction Risk Scoring Travel Rule Triangulation Fraud Trust Framework (NIST / eIDAS) Two-Factor Authentication (2FA) Typology (AML Typology)
UBO (Ultimate Beneficial Owner) UPI (India) Unusual Activity User Consent User Risk Score
VASP (Virtual Asset Service Provider) VPN/Proxy/Tor Detection Validation Rules Velocity Checks Verifiable Credentials (W3C) Verification Waterfall Video KYC Video Liveness Check Vishing Voice Biometrics
Watchlist Screening WebAuthn Weighted Match Score Wire Fraud Workflow Orchestration
X.509 Certificate XML Digital Signature
Yield Curve (compliance context) YubiKey (hardware security token)
Zero Trust Zero-Knowledge Proofs (ZKP)