Verify the identity of your users securely with our biometric authentication system.
Biometric authentication system
Discover our facial recognition system
The biometrics-based solution for user identification combines the identity document with facial biometrics to uniquely link the real identity of the future customer with his digital identity. This process allows your company to initiate onboarding processes with total anti-fraud security.
Our system guarantees that the user is who he/she says he/she is and, therefore, minimizes the risk of fraud when accessing systems, performing economic transactions, contracting or canceling services or performing other common activities, nowadays, through digital channels. It also prevents security breaches related to critical and relevant information about individuals, and cases of identity theft in the digital world. In this way, identity verification brings both legal and economic security to your transactions.
This solution is easily integrated into the digital onboarding process, providing a seamless user experience. The person who undertakes it only needs to have an ID card or similar and a cell phone or computer camera to take a selfie with a movement as proof of life (smile or blink). Once successfully verified, onboarding proceeds.
Benefits of our facial recognition identity verification solution
Reliable customer identification
Minimization of the risk of fraud such as identity theft and account theft.
Immediate verification of identity
Use of advanced algorithms and AI that process and validate information in seconds.
Improved customer experience
Simple and guided process that avoids abandonment in onboarding processes.
Availability and accessibility
Multi-device service available at any time of any day of the year.
Sustainability
Savings in paper costs and those associated with face-to-face processes.
Agility
A solution that is easy to integrate with the systems of each company.
Our facial biometrics system is of interest to you for…
- Perform digital onboarding processes of customers, with verified identity.
- Detect possible identity fraud in your existing customer database.
- To have control levels adaptable to the risk profile of the transactions.
- Ensure compliance with regulations in sectors such as finance, banking, insurance, telecommunications or utilities among others (PSD2, SEPBLAC, PBC/FT, IDD…).
- Implement auditable and certified processes, with custody of evidence.
How does our biometric facial recognition system work?
Capture of the identity document
The user takes a high quality photo of his ID card with the camera of his device (cell phone or computer).
Identity document verification
Verification of certain characteristics of the photographed document to verify its legitimacy.
Selfie with proof of life
The user takes a selfie with the device’s camera and adds a proof of life (smile or blink). The system verifies that the selfie matches the photo on the ID card.
Certification and custody
The tool generates an electronic certificate with the evidence collected during the identification process. In addition, it keeps the evidence in a secure digital environment for at least 5 years.
Computer vision algorithms
They look for matches between the image of the identity document and the different SDI formats issued by governments around the world.
AI-based analysis
Examination of the document from different perspectives to determine whether it is original or has been modified. Components such as printed biometric data, PDF418 barcode or MRZ code are evaluated.
Does your company need digital identity verification solutions?
OTHER SOLUTIONS ON CERTIFIED DIGITAL IDENTIFICATION
Frequently Asked Questions
The system starts with a photo of the identity document provided by the user who initiates the onboarding process. It then verifies the document after checking certain characteristics. The next step is for the user to take and share a proof-of-life selfie, i.e., one that includes a smile or eye blink. The system verifies that the person in the image is the same as the one in the ID card. The last point is that the solution generates the electronic certificate with the necessary evidences and stores them in a secure environment for at least 5 years.
Yes, the system is equipped with the necessary state-of-the-art technology to reliably verify that the person is who he or she claims to be based on facial recognition and identity document. In addition, in the case of MailComms Group, all data and evidence collected are protected by measures to ensure the security and privacy of information, as evidenced by our ISO 27001 and 27701 certifications.
This system can use official identity documents such as passports and national identity cards from a large number of countries.
The use of advanced algorithms and AI to process and validate the information means that online identity verification through the MailComms Group system takes only a few seconds.
MailComms Group integrates in all its applications the necessary measures to ensure the privacy and security of the data that process or travel through them. The ISO 27001 and ISO 27701 certifications (information security and privacy, respectively) recognize the validity and robustness of these measures.
Our teams offer continuous and personalized attention when designing and implementing certified identity verification processes, with facial recognition and verification of the validity of official identity documents. They also accompany our clients in subsequent actions of optimization and updating of systems and technologies.