Using IDV vendors
Existing customers can switch easily (by changing a few lines of code) between providers that meet their current needs.
Additionally, new customers can select to set the IDV provider in their initial configuration that meets their implementation requirements.
Biometrics-first
This use case lets customers to use this feature without having an existing entity. The FrankieOne platform will create a new entity and populate it with the OCR-extracted results. This use goes as follows:
- Run the IDV flow by initiating the process.
- The system will automatically capture the ID.
- Real-time checks will verify the quality of the ID image.
- OCR will be performed on the ID to extract relevant information.
- The system will validate the ID image to ensure its authenticity.
- The service will automatically capture the user's face and conduct liveness detection to confirm their physical presence, without requiring extra facial movements.
- A facial comparison will be made between the captured face and the ID image.
- Optionally, you can run a KYC check to verify customer-provided details against government data sources.
- Finally, if all data matches, onboard end users to grant them access to services.
OCR first
This feature provides the flexibility to exclusively run the OCR (Optical Character Recognition) flow, omitting the biometric verification process. Similar to the Biometrics-first option, there's no requirement for an existing entity to use this functionality.
When you activate the OCR flow, it goes through the following steps:
- The system will automatically capture the ID, ensuring a seamless process.
- Real-time checks will assess the quality of the ID image, maintaining a high standard of image quality.
- OCR technology will be employed to extract and analyze the information from the ID document.
- The system will then validate the ID image to ascertain its authenticity and legitimacy.
- Optionally, you have the choice to perform a KYC (Know Your Customer) check to verify customer-provided details against government data sources for added security and compliance.
- Finally, if all data aligns as required, you can proceed to onboard end users, granting them access to the desired services.
Updated 9 months ago