Verify Subscriber Identity Through Mobile Phones

  • Post author:
  • Post category:Blog

If your company is required to meet Know Your Customer regulations, you may be interested in learning about new ways how to do so. One of how you could meet KYC requirements is through a customer’s cell phone.

Continue Reading Verify Subscriber Identity Through Mobile Phones

Account Takeover

Account Takeover is a Fraud form involving non-consensual usage of another person’s account details to obtain products and services paid by the victim’s account or extract funds from the victim’s…

Continue Reading Account Takeover

Active Security Feature

Active Security Feature is a characteristic designed to identify an original ID document by sight or touch. This Active Security Feature is effective primarily in document-present situations where the original…

Continue Reading Active Security Feature

Anti Copying Mark

Anti Copying Mark is a barely visible mark “hidden” in a pattern that is printed on the document but becomes visible after the document has been copied. This Anti Copying…

Continue Reading Anti Copying Mark

Anti Money Laundering (AML)

Anti Money Laundering (AML) is a set of procedures, laws or regulations designed to prevent criminals or terrorists from generating income through illegal financial actions. In most cases money launderers…

Continue Reading Anti Money Laundering (AML)

Application Programming Interface (API)

Application Programming Interface (API) is a set of routines, protocols, and tools for building software applications or integrating them with an external service. ID authentication services are increasingly available as…

Continue Reading Application Programming Interface (API)

Artificial Watermark

Artificial Watermark is a printed simulated watermark applied by the paper manufacturer or by the form manufacturer, as opposed to a true Fourdrinier watermark produced during paper manufacturing. An Artificial…

Continue Reading Artificial Watermark

Attributed Identity

Attributed Identity is a Identity that refers to components of an individual, given at birth:  • Full name• Social security number • Date of birth • Place of birth •…

Continue Reading Attributed Identity


Learn why AU10TIX was selected by Microsoft to unlock the future of Identity verification.