signzy

API Marketplace

downArrow
Logo
Responsive
Decorative line

Identity Proofing

Overview

Identity proofing is the process of verifying a person’s real-world identity before granting access to regulated financial services. It collects evidence (government ID, selfie biometrics, database hits), validates authenticity (document forensics, MRZ/NFC), and binds the identity to the applicant (face match with liveness). Strong programs follow risk-based rules: lighter proofing for low-risk products, enhanced steps for high-risk or cross-border scenarios.
Proofing outputs map to frameworks like NIST IAL and feed downstream authentication choices (AAL). Controls include coached capture, quality thresholds, fraud signals (device/IP), and exception handling with human review. Proper logging of evidence, decisions, and thresholds supports audits and dispute resolution while minimizing data retention to respect privacy regulations.

FAQ

What’s the goal of proofing?

Establish that the applicant is a real person and truly the document holder, before enabling accounts, payments, or credit access.

Which signals matter most?

Document authenticity, cryptographic checks (NFC/MRZ), selfie+liveness, and corroborating databases. Context signals (device, IP, geolocation) improve confidence.

How does risk change steps?

Higher-risk products or geographies trigger EDD: more sources, manual review, and tighter thresholds. Lower-risk flows can stay lightweight for usability.