WE ARE THE IDENTITY ENABLERS
OF TOMORROW
TrueID:
An Identity Management
Specialist Company
We deliver Biometric Based Identity Management
Solutions
Agenda
1. About TrueID
2. TrueID Services Portfolio
3. Biometrics in Identity Management
4. AI enabled Biometric Systems
5. Changing nature of Identity Fraud
6. AI enabled Facial & Document Liveness :
A+ case study
7. Dashoards & Analytics
TrueID Services Portfolio
▪ Issuance
▪ Applications
▪ Issuance Back-end services
▪ Acquiring services
▪ Maintenance operations
▪ VAS –MIS & Dashboards,
Payroll, AML
Card Issuance Services
Channel Users Qi Master Card Co-Badge
Multi-Modal Biometric Users: ▪ New Issuance (Qi Instant Issuance) ▪ New Issuance (Pre-Issuance) ▪ New (Central, Pre-Issuance)
Enrolment Client ISC Operators, Agents ▪ Supplementary Issuance ▪ Update KYC ▪ Supplementary (Central)
▪ Maintenance Operations 1 ▪ Name Print on pre-issued cards ▪ Maintenance Operations 2
Locations: ▪ Update KYC ▪ Update KYC
Service Centres | Bank Branches |Ministries ▪ Re-carding (Qi to Co-Badge [Pre-Issued])
IDM Unification Portal Users: ▪ Re-carding ▪ New Issuance (Central, Pre-Issuance) ▪ New (Central [batch issuance])
ISC Operators, Agents ▪ (Qi to Co-Badge [Central]) ▪ Update Mobile ▪ Maintenance Operations 3
▪ Update Mobile ▪ Maintenance Operations 3 ▪ Update Mobile
Locations: ▪ Submission of account cancellation request ▪ Submission of account cancellation request ▪ Submission of account cancellation
Service Centres | Bank Branches |Ministries ▪ Merchant onboarding (COA, retail) request
Qi Services - Mobile App. Self ▪ Update mobile ▪ New Issuance (Central) - ISC-Travel-product only ▪ Maintenance Operations 4
▪ Maintenance Operations 4
Batch Issuance ISC Issuance Team ▪ New Issuance (Central) ▪ New Issuance (Central)
Qi Elite ISC RMs ▪ New Issuance (Central)
All About Me - AAM Self ▪ AAM portal - New and Addon cards (Central) ▪ AAM portal - Addon cards only (Central)
Ali Pay App. Self
Gini Self - Merchants ▪ New Issuance (Central)
Generate Replace with change PIN Counter Block/unblock Card authorization change Activate/deactivate Account authorization change
Replace Renew
New Pin embossing name (Central) Reset card (block/unblock) card (block/unblock)
Maintenance Operations 1 ✓ Y
Maintenance Operations 2 ✓ Y ✓ Y
Maintenance Operations 3 ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y
Maintenance Operations 4
(Self Services)
✓ Y ✓ Y ✓ Y ✓ Y
Maintenance Operations New card
Addon Card
Embossing file is created
Supplementary card
Re Carding
Replace
Renew
New Pin Generation
Replace with change embossing name (Central)
Block Account
Unblock Account
Block Card
Unblock Card
Activate Card
PIN Counter Reset
Card authorization (Debit is restricted)
Value Added Services
MIS
Value Added
Services De-Duplication
Value Added Services to support Payroll
Identity Management Services and
ISC operations Identity Services
AML
Identity Services
Facial Liveness OCR Verification
Fingerprint – Iris - Face
Identification Translation Document Liveness
Fingerprint – Iris - Face Ar to En & En to Ar
KYB KYC eKYC
New, Update New, Update Light KYC, Full KYC
CMS Perso Service
New, Maintenance Qi, MasterCard
Biometrics in
Identity Management
Evolution from ”What you Know” to “What you Are”
People are Identified using 3 basic means:
Something Something Something
that you that you that you
KNOW HAVE ARE
Password, ID document,
PIN, Smartcard or
Biometrics
(Face, Fingerprint, Iris, Voice
Pass Phrase Token, RFID etc)
Biometrics: Offer Highest Level of Security
Something you know + Something you have + Something you are
#4931
Biometric Modalities
Something you have + Something you are
Security Level Something you know + Something you have
#4931
Something you know (PIN, Password)
#4931
The Qi Platform - Biometric Based Identity Services
Identity thefts Duplicate Records Inaccurate Identification
Insufficient Authentication Inefficient Service Delivery Fraudulent Applications
IDM
Enrollment
`
Deduplication
Central
MIS Portal Fingerprint IRIS Face Voice
Components Fingerprint
IRIS
Reader
Camera
Micro-
phone
Smart
Card Client
Management
System
Matching Matching Matching Matching
System System System System
Biometric/Hardware Devices Software/Process Component Matching Systems
Impossible to theft others
Unique Records Accurate Identification
Identity
Service Delivery to Right Easy Identification
Robust Authentication
Beneficiary
AI Enabled Biometric image
Systems
Traditional vs AI Enabled Biometric Systems
Traditional AI Enabled
▪ Leverage machine learning and deep learning algorithms, which
▪ Compare predefined features extracted from biometric samples
learn and improve from data over time.
against those stored in a database.
▪ Continuously learn from new biometric data, environmental
▪ The matching accuracy and effectiveness remain constant, without
conditions, and attempt patterns, improving accuracy and reliability
improvement, unless new versions are implemented
over time.
▪ Limited scalability due to processing limitations
▪ Can scale to accommodate growing databases and user bases
▪ Variations in biometric data due to aging, environmental changes, or
vs without compromising performance
minor injuries, lead to higher false reject rates.
▪ Can account for variations in biometric data, even when there are
▪ Liveness detection, if present, is less sophisticated, making traditional
changes in biometric traits due to aging, injuries, or other factors.
systems more susceptible to spoofing and presentation attacks using
▪ Offer advanced liveness detection capabilities, effectively
photos, masks, or other replicas.
distinguishing between real biometric traits and artificial
representations, significantly reducing the risk of spoofing.
AI enabled Biometric Systems: The advantages
▪ Biometric matching systems are built using Advanced
Deep Neural Networks result in reduced error rates like
FAR, FRR etc
▪ Very High matching speeds for 1:N with Deep Learning
based Algorithms Put a relevant photo here
▪ Very effective for Liveness Detection, Presentation
Attack Detection (PAD)
▪ AI-driven systems can discern genuine biometric data
from spoofed ones with extremely high accuracy.
▪ Reduced Infrastructure foot print
Changing nature of image
Identity Fraud
Changing nature of Identity Fraud
▪ Globally, Identity fraud poses the biggest threat to the financial
sector
▪ Nature of Identity frauds is becoming more sophisticated with
threats like deep fakes, video injection attacks etc which traditional
liveness detection technologies cannot detect
▪ Fraudsters source digital images of Identity Documents from illicit
sources and then manipulate them digitally
▪ Fraudsters may also manipulate data in the document to obtain
benefits illegally
It is hard enough to deal with one person staging an attack once in a while. Imagine having hundreds of attackers
generating thousands of such attempts every single day.
2 Major Types of Identity Fraud
Facial Liveness Document Liveness
Facial Liveness Detection
To confirm that the face in question is genuinely alive and not a replica
▪ We use Algorithms that use PyTorch and PyTorch Lighting frameworks and advanced Deep Learning models to strike a balance
between security and user experience leading to low error rates
▪ For performance on mobile devices, Mobilenet architecture is used because of its accuracy & speed trade-off.
Document Presentation Attacks
What the attacker will do
▪ A document presentation attack is when a fraudsters try to
misrepresent their identity by presenting identity documents that
are either fully or partially reproduced.
▪ The reproductions can be either physical (full or partial) or digital,
and can include counterfeits or forgeries
▪ Over 90% of document based attacks on digital
onboarding are presentation attacks.
▪ While most KYC platforms focus on confirming the
authenticity of the document (correctness of structure,
text, bar codes), presentation attacks are usually not
detected.
Document liveness Detection
Is the uploaded ID document If live, is the document Does the photograph on the
“live” or a screen capture of the authentic? document substituted?
document?
SCREEN PRINTED PORTRAIT
REPLAYS COPIES SUBSTITUTIONS
Presentation of documents Presentation of documents Presentation of documents
displayed on a digital screen copied, printed on paper, and with an altered facial
cut to size portrait image, such as an
overlay
AI for Document Liveness Detection
OCR & Data Consistency Check
▪ Data extracted from VIZ Zone & MRZ
▪ Data validation, Cross Check (VIZ vs MRZ) &
Check Digit Validation
▪ Validation of Country & Doc Expiry
▪ AI based Age & Gender estimation from Selfie
validated against Age and Gender of document
holder
AI enabled Facial &
Document Liveness :
A+ case study
Biometric based IDM
Transition from Traditional to Digital
Digital
o Automated processes
o Streamlined onboarding
o Highly scalable
o Seamless User Experience
Traditional
o Manual Processes
o Time consuming
o Limited access
o Poor User Experience
Face Verification Liveness Detection
Identity Fraud Prevention
Selfie Auto-Capture
Comprising several neural networks, the
With pre-configured quality liveness detection is trained to detect
parameters working in the
various types of presentation attack
background, we make sure the
vectors, like print, display and 3D mask
selfie is captured automatically attacks.
when suitable for biometric
identity verification .
Well Balanced User Experience and
Security
Face Verification Liveness detection offering for any type
To biometrically verify that the ID of use case. The best option can be
belongs to the same person, our chosen to suit the specific requirements
facial recognition algorithm
compares a holder’s photo on the
ID with a selfie of the user.
Types ▪ Passive liveness
▪ Smile liveness
▪ MagniEye liveness
Backed by Robust Technology and Flexible Architecture
Identity Document Verification
Seamless Auto-Capture Component
Auto-capture components guides users to take a photo of their ID
with the best possible quality for OCR.
Can be integrated easily via
API with other components Al-Powered OCR & Automated ID Classification
Supports a wide range of alphabets & the OCR technology extracts
as per the requirement.
biometric & biographic data from an identity document.
Can be either deployed on- Biometric Verification and Data Consistency Check
premise or served in the Extracts a holder’s photo on the ID for biometric verification. To
cloud. validate the data extracted by OCR, data are cross-checked against
data in MRZ and/or RFID chip.
Document Authenticity Validation
The document verification SDK also detects some of the most
common document fraud attempts.
Seamless User Experience to the Customer
1 2 3
Document Verification Face Verification & Identity verified
Face Verification & Liveness in less than 1
Liveness Identity verified in less minute!
Identity verified in less than 1 minute! ID Auto-Capture
than 1 minute!
• ID Auto-Capture
• ID Auto-Capture • AI-Powered OCR
• AI-Powered OCR • Automated ID
• Automated ID Classification
Classification • Biometric Verification &
• Biometric Verification & Data Consistency Check
Data Consistency Check • Document Authenticity
• Document Authenticity Validation
Validation
User Onboarding User Identification
Print Copy
Front Document Back Document
Attacker presents a physical copy of the
document which can be a colored
printed copy or B/W Xerox copy of a
document in front of the camera.
• Printed cut outs without lamination
• Laminated cutouts
• Printed cutouts with lamination imitation
• Plastic printed forgery
Screen Replay
Front Document Back Document
Attacker presents a digital reproduction of a
counterfeit, forged or stolen document using a
laptop, tablet or mobile
Screen
Replay
Portrait Substitution
Front Document Front Document
Portrait
Substitution
Duplicates
Case 1
Case 2
Emerging Technologies
Contactless Fingerprint Capture
Emerging
Technologies Cryptograph Technology
Passkey
Biometric ID Tablet
Contactless Fingerprint Capture
Touchless Finger capture is designed to increase the scalability of
fingerprint-based solutions reducing the dependency on costly
purpose-built hardware that traditionally drive costs in large-
scale projects.
❑ Finger detection, including angle detection and wrong hand
detection.
❑ Fingerprint capture.
❑ Quality assessment.
❑ Scaling to 500dpi.
❑ Image processing to generate legacy compliant gray scale images.
❑ Liveness detection.
❑ Packaging and sending the data.
Cryptograph Technology
This platform is a unique combination of top-
tier biometric and non-biometric technologies Stores up to 9 times more of data
designed for cost effective Digital Identity
management that allows for 100% Offline
Authentication.
Triple level security
Cryptograph technology is a digital container
able to package various categories of data for CRYPTOGRAPH - CODE
Digital ID.
Stores biometric templates, personal
data & compressed face and finger
images
36
Biometric ID Tablet
One unique platform
Access to all mobile biometrics
needs
• Fingerprint
• Face
• Iris
• Document capture
• 1:1 authentication
• 1:N verification
Thank you