Arabic / English Transliteration
Convert names from Arabic to English characters without changing their meaning
We use state of art Artificial Intelligence technologies combined with user biometrics for remote, reliable & secure Digital Identity Verification
For any service provider facing risks of fraud, money-laundering, or funding of illicit activities, we believe that the most important identifier of customers is their National ID, which should be the standard requirement for KYC. Further documents, such as phone numbers, email, and proof of residence/address are also key in providing businesses with channels through which they can reach their customers whenever needed.
Using only a smartphone camera, We scan the ID front and back to extract all details from the Egyptian National ID Card, in less than 5 seconds. The result is structured data that can simplify the sign-up process and automate otherwise necessary manual user input
Our technology also goes further by using more than 40 security checks that verify the authenticity of the ID itself – that it has not been tampered with, is not fake, and that the customer is holding a physical ID and not a paper or a photocopy.
Next, we ensure that the person undergoing KYC is conscious and aware and not a pre-recorded video or photo by presenting video instructions to do random actions to verify the investor is not a robot nor someone submitting documents on behalf of one another. Checks if the person undergoing the liveness check is the same as the person whose picture is on the scanned National ID
Biometric data, obtained either directly or covertly from a person online or through hacked systems, is sometimes used to attack a biometric system by creating spoofs or fakes. This attack might use a printed photo, an image, or video of a person on a tablet or by presenting a 3D mask or fake silicone fingerprint. A biometric spoof that is detected when presented to a biometric sensor is known as presentation attack detection (PAD).
The specific detection of whether a sensor is viewing a live biometric – as opposed to a recording, picture or another non-living spoof – is commonly known as liveness. We have the customer complete a series of randomized actions through the selfie camera, such as looking to the left or right, smiling, and closing one eye – to ensure that the person undergoing e-KYC is a real-life person and not a photo or pre-recorded video.
Whether you need to process for custom documents or have specific verification requirements that are not covered by the above services, Valify develops custom identity verification solutions that fit every use case and cover every sector. We are already in the process of adding new documents that can be used in the future and are open to customizations
Whether you need to process for custom documents or have a specific verificaiton requirements that are not covered by the above services, Valify develops custom identity verification solutions that fit every usecase and cover every sectors. We are already in the process of adding new documents that can be used in the future and are open to customisations.
Our team not only develops standardized services but also helps you establish solutions to best suit your needs. Our services are customizable and offered with different levels of automation to best complement your processes. Our solutions are composed of multiple building blocks, enabling businesses to create the combination which best suits their needs