Digital Security

As people’s daily lifestyles become more digitized, they’re interacting with online services more frequently, hence generating more and more personal data. It is crucial to provide top-level security to protect customer’s digital identity without sacrificing the user experience.

Development

Our approach towards tokenization is replacing sensitive data with unique information that holds similar field type properties as the original data. The unique information or reference is used to recover sensitive information and does not compromise the overall security of the system. All forms of data can be tokenized, including credit cards, social security numbers, medical records, personally identifiable information, etc. While this approach may be suitable in some instances, tokenization, in itself, is not a complete data protection offering. In a world of digital payment, tokenization is more than mainstream: it’s a must-have. Every player in the digital payment flow has a need for token technology: from payment card issuing banks to payment processors, from domestic schemes to retailers, and from private-label issuers to manufacturers of wearables.​ Tokenization requires less computational power than encryption. This allows the tokenized information to be processed faster and with less computer resources. It’s a key aspect as the volume of payment transactions is high and response time needs to be very fast.

Service

  • Top security for mobile & web channels

  • Allowance for other channels to be secure as well.

  • Option to integrate biometric authentication methods

Development

We offer an identification solution that is compatible within a large range of technologies, from smartphone to specialized high end scanners. By our solution, identity attributes are captured in-store or remotely. Those attributes are ID documents such as passports, driving licenses, ID cards and also biometrics such as faces. While authentication aims to verify user genuinity by Multi Factor Authentication (MFA), digital authentication focuses on verifying the authenticity of the end user ID document and validating if the person is who they claim to be. This may require a combination of solutions, depending on the level of assurance needed. After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user's digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint.

Service

  • Verify and authenticate different types of documents in a simple and efficient manner.

  • Can be applied to new account enrollment.

Development

We offer applications that use Gemalto SDK which is capable of automatically detecting the ID document in the frame, check if the image quality enables proper document verification and capture the document instantly. Also it has the feature of extracting data from the Machine Readable Zone. Then the image is compared with 2000+ unique types of documents. ID Verification performs an extensive series of security checks, to assess its authenticity. Once the document is verified, ID Verification extracts the subscriber’s personal and biometric information such as the user's portrait. Scanners are being offered for more enhanced and secure solution. To verify that the holder of the ID document is the legitimate user, ID verification performs a face matching between the document portrait and a selfie picture. To prevent spoofing attacks from fraudsters trying to acquire someone else’s privileges (using photos or masks), ID verification performs liveness detection when requesting a selfie.
The whole process is fully automated, using encrypted data flows. No information shared or stored. No Human intervention.

Partners