paint-brush
How to Choose the Best Identity Verification Softwareby@janstepnov
327 reads
327 reads

How to Choose the Best Identity Verification Software

by Jan StepnovOctober 10th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

This comprehensive 9-step guide provides valuable insights into choosing the best Identity Verification (IDV) software provider for your needs. Here's a summary of each step: Automated Document Capture: Ensure that the solution can automatically recognize and assess the quality of submitted documents, improving user experience and reducing errors. Document Checks: Check if the IDV solution performs various document checks, including visual inspection zone verification, MRZ validation, and barcode reading. NFC-Based RFID Chip Verification: Ensure that the solution can read and verify RFID chips in ID documents, and inquire about the security measures to prevent cloning or data manipulation. Biometric Checks: Evaluate the biometric capabilities, such as face recognition and liveness detection, to verify that the person submitting the document matches the legitimate holder. Database of Supported Documents: Assess the vendor's document template database's depth and accuracy, as a comprehensive database enhances the solution's ability to verify various document types. Time to Value: Consider the integration process's speed and complexity, as well as customization options, to ensure a smooth and efficient implementation. Compliance: Explore how the solution handles customer data—whether it's cloud-based or on-premises—and inquire about certifications and data security policies. Tech Support: Investigate the vendor's technical support options, including response times, premium support, and the availability of comprehensive documentation. Customer References: Seek customer references, reviews, and case studies to gain insights into the vendor's track record and reputation in your industry.
featured image - How to Choose the Best Identity Verification Software
Jan Stepnov HackerNoon profile picture


The Identity Verification market offers a wide range of solution providers to choose from. The Best Identity Verification Software category on any listing platform includes over 200 products. Add to it all sorts of hardware devices, and you’ll get the impression that the market is over-saturated, and there are plenty of go-to solutions for handling ID documents and Biometric verification for any business use case.


Below is a 9-step guide that will empower you with insights on how to choose the best Identity Verification (IDV) software provider effectively, guiding your selection towards ones that excel in delivering precision, security, and the utmost trustworthiness in the field of identity verification.


Step 1: Make sure that document capture is fully automated

If you ask any forensic expert how to verify ID documents reliably, they will likely give you the following answer: first of all, make sure you have a physical document at hand. The reality, however, is often far from such ideals. In the face of digital transformation, the capture process largely determines the check’s credibility.


At the capture stage, an identity verification solution should cope with two things:

  • recognize the submitted document
  • and assess its quality.


The thing is that software solutions use the capabilities of the user’s device, and rely on the user’s accuracy in taking photos. A bad camera, poor lighting, glares, or a skewed image make it difficult to read the information. This may lead to either errors or asking users to re-take photos over and over again until they meet the quality requirements.


The best solutions can assess an image's quality and fine-tune it if necessary: adjust brightness or contrast, remove glares, or deskew the photo if it was shot at an angle.


As for document type recognition, it’s mostly a matter of UX. Unfortunately, many identity verification solutions still add two extra steps in the user journey: “choose your document type” and “choose your country.”


You can avoid making your users do extra clicks and typing by choosing a solution that identifies the document type and its origin country. As simple as it sounds, such capabilities require the vendor to invest a lot of time, money, and effort into creating a comprehensive document template database. For now, let’s just make a mental note that, ideally, your identity verification solution should do most of the work automatically.


Questions to ask a vendor:

  • Does your solution identify the document type automatically?
  • Does it assess the document image quality? What are the criteria?
  • Can it enhance the image’s quality to improve the data's readability?


Step 2: Test-drive document checks

Identity verification solutions must comply with ICAO and BSI guidelines for checking international documents, visas, etc. For domestic ID documents, though, there may be their own variants of execution of security elements of protection that require specific checks.


Ideally, an identity verification solution should offer a check for each aspect: both standardized international features and local characteristics. The denser the coverage with checks, the more credible the conclusion about the authenticity and validity of the document.


You can judge a vendor to provide first-class performance when their solution performs a long list of checks, plus runs massive cross-checks comparing the data from different elements to make sure they match.

Document checks to ask for:

  • Automatic document type identification
  • Visual inspection zone verification
  • MRZ validation
  • Barcode type and format reading and validation
  • Document liveness check (includes checks of holograms and screenshot detection)
  • RFID chip detection and reading
  • Cross-checks of the data fetched from different elements


Step 3: Ensure that NFC-based RFID chip verification is in place

A radio-frequency identification—or simply RFID—chip is a tiny device that modern electronic ID documents contain. RFID chips store document holders’ data. The ICAO (International Civil Aviation Organization) strictly regulates the exact list of the data encoded in the chip.


Usually, reading this information entails using special passport readers or NFC technology built into mobile phones. You should be especially careful if it’s the latter. In the case of a remote process, there’s a risk that fraudsters can intercept and modify verification results. That’s why a good vendor needs to practice a zero-trust-to-mobile approach. In practice, the data needs to be re-verified to ensure the chip is not cloned or its data manipulated.


Here’s an example of how Regula tackles this issue. RFID sessions can be re-verified on the server side in addition to the checks conducted on mobiles. Thanks to this, the data of the check is impossible to compromise. All this is done strictly on-premises: the results of the verification session are stored on a customer’s server, so it’s possible to get back to them afterward. This approach is considered the most reliable and secure way to verify a document with an NFC chip.

Questions to ask a vendor:

  • Does your identity verification solution read and verify an RFID chip?
  • Can it read the information encoded in the chip?
  • Do you apply a zero-trust-to-mobile approach? If so, how exactly does it work in your solution?


Step 4: Explore capabilities for Biometric checks

Validating the ID document is just a part of identity verification. Another part is ensuring that the person submitting it is the legitimate holder. That’s done with the help of biometric checks.


Biometrics is a broad term that may imply a wide range of checks: face, fingerprints, voice, or even iris recognition. Most of them are overkill for regular business’ digital onboarding, but state authorities can require them, for example, when you apply for a visa. The most common way to run a biometric check for business is by using face biometrics.


The process is simple: the user takes a selfie, and then the technology matches that photo with the photos in the submitted ID document (e.g., in the visual inspection zone and the RFID chip), and flags if there’s anything wrong.


The essential feature of a proper face recognition module is liveness detection. That means you need not only to determine that it’s the same person in the photographs but also to make sure that the selfie is real. Sometimes attackers try to pass off an edited photo as a real selfie. Sometimes, they might use various masks and even deepfake technology. A good identity verification solution should be able to detect such issues.


There are two types of liveness verification: passive and active. A passive liveness check implies the use of a static selfie, while active liveness requires the user to perform a series of simple movements: rotating the head, moving closer or further away, etc.

Questions to ask a vendor:

  • Do you perform biometric verification?
  • What components does it include (face detection, face matching, face search, age verification, etc.)?
  • Do you provide active or passive liveness checks?
  • What PAD (Presentation Attack Detection) do you protect from?


Step 5: Investigate the database of supported documents

Cutting-edge technologies on their own aren’t enough for thorough identity verification. The most reliable IDV requires a deep knowledge of identity documents. This usually comes in the form of a document template database containing detailed information for every document: layout, fields, data recording methods, security elements, and more.


Gathering such a collection requires tremendous resources and a solid background in document forensics. Ideally, your vendor should have seasoned forensic experts on their team to guarantee the comprehensiveness of templates and competent maintenance of the database. The importance of this cannot be overstated. If the vendor has thoroughly examined thousands of document types, its software solutions can easily distinguish one from another, fully read them, and extract the required data, therefore effectively verifying them as a result.


The database needs to be extensive, as even within one country, there can be multiple versions of a document based on the date of issuance. Considering the frequent renewal and re-issuance of identity documents, the database should be regularly updated too. Cooperation with international organizations and security agencies is also a point in favor of the provider. Established relationships help them regularly expand the database with new document types and share the best practices in detecting document fraud.

Questions to ask a vendor:

  • How long have you been operating in the identity verification industry?
  • Are there experts on your team with hands-on experience as forensic analysts?
  • Do you have a document template database? How many items does it include?
  • If there is no document in the database, how long does it take to add?
  • Is it proprietary or bought from third parties?


Step 6: Evaluate the time to value

Reliability and completeness of checks are all good, but they won’t be of help if the integration process takes ages and blows up your budget. The pressure comes from multiple sides. On one side, there are regulators whose requirements are better met sooner than later. Then, there’s also your product and workflows, which will likely demand some customization from the identity verification solution. Add to it a learning curve that, for some solutions, can be rather steep, and lengthy.

Questions to ask a vendor:

  • Is it possible to build your solution into a web app?
  • How fast will we be able to get up and running?
  • What does the integration process look like?
  • What customization options does your solution offer? Are they available out of the box, or will they require additional configuration/costs?


Step 7: Check out the compliance of the workflows

Regardless of the industry, safeguarding customer data is of the utmost importance. Therefore, it’s crucial to find out how your identity verification provider addresses the matter. When it comes to working with customers’ personally identifiable information (PII) during identity verification, there are two primary approaches:


  • A Software-as-a-Service (SaaS) scenario, where vendors handle the storage and processing of customer data on their own infrastructure.

  • An On-premises approach, where you store and process your customers' PII within your own secured perimeter.


While the SaaS use case can save you time and the expenses associated with securing the data on your own, it’s even more critical to thoroughly examine the vendor’s procedures for customer data security and protection. Data breaches aren’t uncommon.


An on-premises option places a higher emphasis on data privacy and security. Since no third parties have access to PII, it reduces the risk of breaches. However, extra protection comes at a price. The maintenance of infrastructure and reliability for following security policies is on you, so you’ll need to budget resources for engineering and security training for employees.

Questions to ask a vendor:

  • What type of solution do you offer: cloud or on-prem?
  • Do you collect and store the personal data of end users?

If it’s cloud…

  • What certifications does your service have? (e.g., SOC1 type 2, HIPAA, etc.)
  • Where can I read your security policy?
  • What’s your service availability time?


Step 8: Try to contact tech support

Salespeople might be responsive before making the sale, but a company’s true colors show when a customer faces difficulties or has a request. If a vendor can provide prompt and professional technical support, it saves you a lot of time, effort, and headaches.


Ideally, it’s good to have more than one way to contact support: by phone, email, live chat, or messengers. In most companies, additional communication channels come with the premium support option. Such support may include a dedicated manager, and the ability to communicate with the vendor’s team in real-time, 24/7.


If this option is not available, pay attention to the response time SLA. This is the time in which the vendor commits to respond to a client’s issue. It’s usually defined by the support policy.

As for cases when a client needs off-hours assistance, the vendor’s website should provide all essential instructions, guides, and FAQs. Comprehensive documentation should answer 90% of the questions, so pay attention to how thoroughly it is made, if it includes demo examples, how often it is updated, and if it’s localized to your language.

Questions to ask a vendor:

  • What’s your response time for support requests?
  • Do you have a premium support option?
  • Is support documentation comprehensive and easy to navigate?


Step 9: Find customer references

If you made it through the steps above, you can confidently trust the results. Still, it’s always a good idea to look for additional social proof from companies that have already succeeded in what you’re trying to achieve.


Here, we advise you to conduct your own research and find as many reviews about the vendor as possible. The first go-to source of information is the case study section on the vendor’s website. There, you can look for stories from customers from your niche and find relevant use cases. For example, if you’re a crypto platform on a quest to deploy KYC, then KYC-related cases from banks will also give you valuable insights.


Also, pay attention to who a vendor’s existing customers are. The presence of well-known names is a good sign. If the vendor has state-level organizations and security agencies, such as border controls, among their customers, it’s also great, because they have the strictest requirements for identity verification.


Also, you may want to research what the media say about different vendors. Consider exploring not only so-called tier-one resources, such as The New York Times or Business Insider but focus more on industry-specific publications that specialize in covering identity verification and cybersecurity. This approach will broaden your research and provide a more comprehensive understanding of different vendors' reputations. Among such media outlets are: Biometric Update, Help Net Security, Infosecurity Magazine, Source Security, Identity Week, Find Biometrics, and others.

Try to find out:

  • Are there any references available in open sources from customers in my industry? Can the vendor provide those references on request?
  • Are there relevant use cases in the vendors’ customer success stories?
  • Are there any mentions of the vendor in the industry and/or tier-one media?


In conclusion, this 9-step guide empowers you to choose Identity Verification software that aligns with your specific needs while excelling in precision, security, and trustworthiness, ensuring your data and operations are in safe hands. With the right software, you can confidently navigate the evolving landscape of identity verification for a secure and seamless future.


If you’re struggling with finding the right solution for your business use case – feel free to get in touch.


Also published here.