Assure Identity Verification Process
A Strong Identity Verification Process is Vital
As a business providing an identity verification & storage solution, ensuring that we are able to validate with confidence & 100% accuracy who a person is could be considered the most fundamental aspect of our offering.
The actual process of identity verification & level of depth which KYC providers go to ensure the parties completing the process are known varies widely. The sophistication of software used, the data collected, the analytics performed, the databases available for cross-checking, the expertise of the reviewers, etc all play a major factor in the quality of any identification process.
Assure Identity Verification Process - The Gold Standard
Assure offers one of the most robust identity verification services on the market today. When a project is Assure Verified, stakeholders can be confident that the process used for verification was thorough and that the identities are known & accurate.
The sophisticated process that Assure has implemented starts by leveraging a fully integrated AI-powered software, which allows our clients to seamlessly complete the end-to-end identity verification approval in only 2-3 minutes on their smartphone or tablet!

What Documents Do I Need to Get Verified?
To get verified you will need to provide a current, physical, genuine Government-issued ID.
Acceptable forms of ID include:

passport

driving licence

Government issued ID card
*Party must have physical possession of the identification document. KYC approval will be rejected if a physical ID that you actually have in your possession is not provided during the verification process. Please do not post pictures of pictures, screenshots, etc.
What Makes Our Verification Process The Gold Standard?
Our verification process supports over 10,000 government-issued IDs from 190 countries. Our global reach allows us to verify project owners from all corners of the world, which is paramount with the crypto space being such a diverse global market.
Our system scans the identity documents and performs the following checks:
Barcode/QR scanning
MRZ # Data Extraction
Registered document database check
Expiration date check
With over 10,000 government documents in our database, our verification system can verify documents nearly anywhere in the world. The AI-powered technology used is able to detect whether a government-issued identity document has certain correct features that could detect a counterfeit or altered document.
For example, the following are some of the more prominent parts of IDs that we analyze to catch fakes:
Security features
Material integrity
Portrait photo inconsistencies
Data cross-referencing
Format validation
Data dependencies
Font detection
Handwriting validation
And more
The AI relies on Machine Learning model that detects and matches the presented document in the session with the specimen in our database. When a document is fake or tampered with, the session is declined.
Our identification system uses a multi-prong solution to prevent synthetic fraud. It uses device and network fingerprinting, which allows for behavioral analytics to be applied to catch fraud.
Also, crosslinking takes behavioral analytics further. The system groups verification sessions together and points out risk factors based on user behavior that may seem abnormal and provides that data to our clients. Crosslinking analyzes the person, network, and more.
Additionally, velocity abuse prevents the same person, device, or document (depending on the configuration of the decision engine) from opening multiple accounts, which is common in financial services.
Standard Compliance Data (5 points)
First name, last name, DOB, Expiration date, Document #
Assure Data Collected (10 points)
First name, last name, DOB, Expiration date, Document #, Issue Date, Personal #, Gender, Nationality, Address
As a fraud prevention measure,the platform analyzes the device and network used for a verification session and assigns each a fingerprint. Along with hundreds of other parameters, including personal data on the ID, the data is then cross-checked with PEP and sanctions lists, past behavior, and other inconsistencies before a decision is made with respect to approval.
Though the automated system we have implemented is robust by itself, the KYC by Assure process also includes a manual review by our team to provide a further layer of validation.
Biometric information is extracted from photos and non-disruptive background video to confirm that a user is who they say they are. Assure takes live video data & uses facial recognition technology integrated into the AI-powered software to provide a deeper level of verification than is standard in the industry.
Through various tests, we can determine if a session or user is real. These checks involve analyzing photos and video and are conducted behind the scenes. This is a strong means of preventing fraud tactics like deepfakes which become prevalent in the crypto space.
During every verification, Politically Exposed Persons (PEP) checks are undertaken, which screen multiple government databases to identify individuals entrusted with a prominent public function. Every individual will also undergo Sanctions checks, making it possible for us to run user data through government sanction databases to see if there are any matches.
Assure provides ongoing monitoring of all our clients who have completed identity verification. Our platform will automatically notify us if any existing users have been added to the PEP or Sanctions lists as outlined above & allow us to take action with respect to their approval.
Speed, Ease & Convenience of Process
Automated Data Extraction
To make sure our process is quick and efficient, we use AI to extract data from IDs as soon as they are submitted to speed up verification sessions and provide a fantastic user experience for our clients without sacrificing integrity.
Global Multinational Support
Our verification process supports over 10,000 government-issued IDs from 190 countries. Our global reach allows us to verify project owners from all corners of the world, which is paramount with the crypto space being such a diverse global market.
High Security of All Sensitive Identity Data
When you verify yourself with Assure you can be confident in the safety of your data. Our identity verification software provider is fully compliant to CCPA, GDPR, WCAG & AICPA SOC accessibility standards, providing audited 3rd party validation of how they handle the data. Assure’s Data Storage & Handling Policy is based around the GDPR guidelines and our processes are designed to ensure we limit risks which could potentially lead to compromised data.
View the details of our Data Protection Policies at the following link:





Assure prides itself on being the Gold Standard in Verification for project owners. Not only do we provide the most value, but our service is focused on compliance, security & integrity.