Discover how AI, deepfakes, and market shifts are transforming ID verification. Learn why low-code integration and enhanced fraud detection are key to the future of digital onboarding.
As we head into the second quarter of 2024, the ID market is entering a transition period as portable digital identity solutions are starting to mature, which in the next five years will reduce the demand for identity verification solutions.
Alongside this, competition is having a particular influence on the market with a large number of vendors offering what appear to be similar core identity verification processes to verify the client's identity.
This is causing confusion among buyers and forcing vendors to offer additional features such as enhanced fraud detection and low-code integrations in order to differentiate.
This amalgamation of the ID market is set to continue as customers require a multiple solution for each KYC journey (document authentication, mobile authentication, email fraud risk checks etc) so just providing one point solution ID is no longer valid for the market.
As a result, revenues are under pressure as the race to the bottom for transaction fees gains momentum.
At the same time, the malevolent use of AI stands as a key concern for ID verification providers as it becomes increasingly sophisticated.
Although generative AI is not new, the accessibility of tools using this AI – commonly known as deepfakes - and the public awareness of its capabilities have accelerated massively.
Gartner recently reported a significant increase in clients asking about the integrity of the identity verification process now that attackers have the potential to use deepfakes.
Such attacks can broadly be carried out in two ways through ‘presentation attacks’ where the deepfake image or video is displayed on the screen of a secondary device and ‘injection attacks’ where the deepfake image or video is digitally inputted into the identity verification process.
Academic research shows that deepfakes are almost five times better at spoofing verification solutions. Traditional spoofing methods like printed photos placed in front of the camera or realistic 3D masks succeed in 17.3 % of cases. Meanwhile, deepfake-enabled spoofing techniques to succeed in 86% of cases.
This is essentially a new world problem and organisations need new world solutions to counteract them putting further pressure on the ID verification market.
So what makes the ideal ID verification solution? Firstly, more mature offerings will allow an organisation to configure the look and feel of the UI with respect to colours and logos to enable some alignment with corporate branding. The most advanced offerings provide drag-and-drop interfaces that enable deeper configuration of the UI and hence UX, such as requested data fields for the user to complete, flexibility for the user to select document types, and also calling out to third-party data affirmation sources that the vendor has integrated.
These low-code implementation approaches are proving to be attractive as they enable far faster implementations requiring fewer skilled resources, and encourage organisations to try vendor solutions, safe in the knowledge that their initial investment is relatively low. This is also enabling many small organisations to take advantage of such remote identity verification flows. There is a long tail of small independent businesses such as realtors or estate agents, lawyers or solicitors, financial advisors or tax specialists, who need to verify their customers’ identities for regulatory purposes and a remote identity verification process triggered by a QR code with results available for lookup on a portal opens up opportunities for new business processes and modes of interaction.
And what of digital onboarding providers? What role should they be playing as the ID verification market experiences a period of flux?
Most vendors have typically offered organisations an API for browser implementation and a software development kit (SDK) for mobile app implementation. Outside of the core document and selfie image capture UX, organisations have developed and managed the UI components that form the broader identity verification journey. However, vendors are increasingly offering low-code implementation approaches in which the vendor hosts and manages all of the UI components and the entire user journey related to identity verification.
A typical low-code implementation consists of the organisation either sending an SMS to the user containing a link or asking the user to scan a quick response (QR) code, both aimed at getting the user onto their mobile device and on their mobile browser, eventually onto a site hosted by the vendor. More accurate results are generally achieved when the user goes through identity verification on their mobile device as the camera quality is far superior to a laptop or desktop webcam. This also improves UX by reducing requests to the user to retake images due to poor quality.
Once the user has gone through the identity verification process, the vendor will then send data pertaining to the identity verification to the organisation. This may be achieved by the organisation through polling a vendor’s systems, using web hooks, or even simply looking up the results on the vendor’s administrative portal. At the basic end of the spectrum, vendors may offer a fixed UI that the organisation has no control over.
Identity verification is the process of confirming the identity of an individual or organization, typically through the use of documents, biometric data, or other forms of authentication. In the context of digital onboarding, identity verification is a critical step in ensuring that customers are who they claim to be, and that they are not attempting to commit fraud or other illicit activities.
Identity verification can take many forms, including:
Identity verification is an essential component of digital onboarding, as it helps to prevent fraud and ensure compliance with anti-money laundering (AML) and know your customer (KYC) regulations. By leveraging advanced technologies, financial institutions can enhance the security and efficiency of their customer onboarding processes, ultimately safeguarding against financial crimes.
Digital onboarding is a critical process for financial institutions, as it enables them to acquire new customers and verify their identities remotely. Digital onboarding involves the use of digital technologies, such as mobile apps and websites, to facilitate the onboarding process.
Financial institutions use digital onboarding to:
Digital onboarding is an essential component of financial institutions’ digital transformation strategies, as it enables them to improve customer experience, reduce costs, and increase efficiency. By streamlining the customer onboarding process, financial institutions can enhance their competitive edge in the rapidly evolving banking sector.
Know Your Customer (KYC) and customer due diligence are critical components of anti-money laundering (AML) and counter-terrorism financing (CTF) regulations. KYC involves verifying the identity of customers, while customer due diligence involves assessing the risk profile of customers and monitoring their activity.
KYC and customer due diligence are essential for preventing money laundering and terrorism financing, as they enable financial institutions to:
KYC and customer due diligence are critical components of digital onboarding, as they enable financial institutions to verify customer identities and assess their risk profiles remotely. By integrating these processes into their digital onboarding solutions, financial institutions can enhance their compliance with regulatory requirements and mitigate the risk of financial crimes.
Anti-money laundering (AML) regulations are designed to prevent money laundering and terrorism financing. AML regulations typically include:
AML regulations are critical components of digital onboarding, as they enable financial institutions to prevent money laundering and terrorism financing. Financial institutions must comply with AML regulations, including KYC and customer due diligence, to prevent money laundering and terrorism financing.
AML regulations are enforced by regulatory bodies, such as the Financial Crimes Enforcement Network (FinCEN) in the United States. Financial institutions that fail to comply with AML regulations may face penalties, including fines and reputational damage. By adhering to these regulations, financial institutions can protect themselves and their customers from the risks associated with financial crimes.
Replace complex integrations with one unified API. Cut costs by 40% and accelerate compliance with no-code automation.