0% found this document useful (0 votes)
77 views38 pages

TrueID AI Capability

TrueID is a specialist company focused on biometric-based identity management solutions, offering a range of services including card issuance, maintenance operations, and value-added services. The document discusses the evolution of identity management from traditional methods to AI-enabled biometric systems, highlighting the increasing sophistication of identity fraud and the need for advanced liveness detection technologies. TrueID's offerings aim to enhance security and user experience through automated processes and seamless integration of biometric verification systems.

Uploaded by

Adil reza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views38 pages

TrueID AI Capability

TrueID is a specialist company focused on biometric-based identity management solutions, offering a range of services including card issuance, maintenance operations, and value-added services. The document discusses the evolution of identity management from traditional methods to AI-enabled biometric systems, highlighting the increasing sophistication of identity fraud and the need for advanced liveness detection technologies. TrueID's offerings aim to enhance security and user experience through automated processes and seamless integration of biometric verification systems.

Uploaded by

Adil reza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

WE ARE THE IDENTITY ENABLERS

OF TOMORROW
TrueID:
An Identity Management
Specialist Company

We deliver Biometric Based Identity Management


Solutions
Agenda
1. About TrueID

2. TrueID Services Portfolio

3. Biometrics in Identity Management

4. AI enabled Biometric Systems

5. Changing nature of Identity Fraud

6. AI enabled Facial & Document Liveness :


A+ case study

7. Dashoards & Analytics


TrueID Services Portfolio

▪ Issuance
▪ Applications
▪ Issuance Back-end services
▪ Acquiring services
▪ Maintenance operations
▪ VAS –MIS & Dashboards,
Payroll, AML
Card Issuance Services
Channel Users Qi Master Card Co-Badge
Multi-Modal Biometric Users: ▪ New Issuance (Qi Instant Issuance) ▪ New Issuance (Pre-Issuance) ▪ New (Central, Pre-Issuance)
Enrolment Client ISC Operators, Agents ▪ Supplementary Issuance ▪ Update KYC ▪ Supplementary (Central)
▪ Maintenance Operations 1 ▪ Name Print on pre-issued cards ▪ Maintenance Operations 2
Locations: ▪ Update KYC ▪ Update KYC
Service Centres | Bank Branches |Ministries ▪ Re-carding (Qi to Co-Badge [Pre-Issued])

IDM Unification Portal Users: ▪ Re-carding ▪ New Issuance (Central, Pre-Issuance) ▪ New (Central [batch issuance])
ISC Operators, Agents ▪ (Qi to Co-Badge [Central]) ▪ Update Mobile ▪ Maintenance Operations 3
▪ Update Mobile ▪ Maintenance Operations 3 ▪ Update Mobile
Locations: ▪ Submission of account cancellation request ▪ Submission of account cancellation request ▪ Submission of account cancellation
Service Centres | Bank Branches |Ministries ▪ Merchant onboarding (COA, retail) request

Qi Services - Mobile App. Self ▪ Update mobile ▪ New Issuance (Central) - ISC-Travel-product only ▪ Maintenance Operations 4
▪ Maintenance Operations 4

Batch Issuance ISC Issuance Team ▪ New Issuance (Central) ▪ New Issuance (Central)

Qi Elite ISC RMs ▪ New Issuance (Central)

All About Me - AAM Self ▪ AAM portal - New and Addon cards (Central) ▪ AAM portal - Addon cards only (Central)

Ali Pay App. Self

Gini Self - Merchants ▪ New Issuance (Central)

Generate Replace with change PIN Counter Block/unblock Card authorization change Activate/deactivate Account authorization change
Replace Renew
New Pin embossing name (Central) Reset card (block/unblock) card (block/unblock)
Maintenance Operations 1 ✓ Y
Maintenance Operations 2 ✓ Y ✓ Y
Maintenance Operations 3 ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y ✓ Y
Maintenance Operations 4
(Self Services)
✓ Y ✓ Y ✓ Y ✓ Y
Maintenance Operations New card

Addon Card

Embossing file is created


Supplementary card

Re Carding

Replace

Renew

New Pin Generation

Replace with change embossing name (Central)

Block Account

Unblock Account

Block Card

Unblock Card

Activate Card

PIN Counter Reset

Card authorization (Debit is restricted)


Value Added Services

MIS
Value Added
Services De-Duplication

Value Added Services to support Payroll


Identity Management Services and
ISC operations Identity Services

AML
Identity Services

Facial Liveness OCR Verification


Fingerprint – Iris - Face

Identification Translation Document Liveness


Fingerprint – Iris - Face Ar to En & En to Ar

KYB KYC eKYC


New, Update New, Update Light KYC, Full KYC

CMS Perso Service


New, Maintenance Qi, MasterCard
Biometrics in
Identity Management
Evolution from ”What you Know” to “What you Are”
People are Identified using 3 basic means:

Something Something Something


that you that you that you
KNOW HAVE ARE

Password, ID document,
PIN, Smartcard or
Biometrics
(Face, Fingerprint, Iris, Voice
Pass Phrase Token, RFID etc)
Biometrics: Offer Highest Level of Security

Something you know + Something you have + Something you are

#4931
Biometric Modalities

Something you have + Something you are

Security Level Something you know + Something you have

#4931

Something you know (PIN, Password)

#4931
The Qi Platform - Biometric Based Identity Services

Identity thefts Duplicate Records Inaccurate Identification

Insufficient Authentication Inefficient Service Delivery Fraudulent Applications

IDM
Enrollment
`
Deduplication
Central
MIS Portal Fingerprint IRIS Face Voice
Components Fingerprint
IRIS
Reader
Camera
Micro-
phone
Smart
Card Client
Management
System
Matching Matching Matching Matching
System System System System

Biometric/Hardware Devices Software/Process Component Matching Systems

Impossible to theft others


Unique Records Accurate Identification
Identity

Service Delivery to Right Easy Identification


Robust Authentication
Beneficiary
AI Enabled Biometric image

Systems
Traditional vs AI Enabled Biometric Systems

Traditional AI Enabled
▪ Leverage machine learning and deep learning algorithms, which
▪ Compare predefined features extracted from biometric samples
learn and improve from data over time.
against those stored in a database.
▪ Continuously learn from new biometric data, environmental
▪ The matching accuracy and effectiveness remain constant, without
conditions, and attempt patterns, improving accuracy and reliability
improvement, unless new versions are implemented
over time.
▪ Limited scalability due to processing limitations
▪ Can scale to accommodate growing databases and user bases
▪ Variations in biometric data due to aging, environmental changes, or
vs without compromising performance
minor injuries, lead to higher false reject rates.
▪ Can account for variations in biometric data, even when there are
▪ Liveness detection, if present, is less sophisticated, making traditional
changes in biometric traits due to aging, injuries, or other factors.
systems more susceptible to spoofing and presentation attacks using
▪ Offer advanced liveness detection capabilities, effectively
photos, masks, or other replicas.
distinguishing between real biometric traits and artificial
representations, significantly reducing the risk of spoofing.
AI enabled Biometric Systems: The advantages

▪ Biometric matching systems are built using Advanced


Deep Neural Networks result in reduced error rates like
FAR, FRR etc
▪ Very High matching speeds for 1:N with Deep Learning
based Algorithms Put a relevant photo here
▪ Very effective for Liveness Detection, Presentation
Attack Detection (PAD)
▪ AI-driven systems can discern genuine biometric data
from spoofed ones with extremely high accuracy.
▪ Reduced Infrastructure foot print
Changing nature of image

Identity Fraud
Changing nature of Identity Fraud
▪ Globally, Identity fraud poses the biggest threat to the financial
sector

▪ Nature of Identity frauds is becoming more sophisticated with


threats like deep fakes, video injection attacks etc which traditional
liveness detection technologies cannot detect

▪ Fraudsters source digital images of Identity Documents from illicit


sources and then manipulate them digitally

▪ Fraudsters may also manipulate data in the document to obtain


benefits illegally

It is hard enough to deal with one person staging an attack once in a while. Imagine having hundreds of attackers
generating thousands of such attempts every single day.
2 Major Types of Identity Fraud

Facial Liveness Document Liveness


Facial Liveness Detection
To confirm that the face in question is genuinely alive and not a replica

▪ We use Algorithms that use PyTorch and PyTorch Lighting frameworks and advanced Deep Learning models to strike a balance
between security and user experience leading to low error rates
▪ For performance on mobile devices, Mobilenet architecture is used because of its accuracy & speed trade-off.
Document Presentation Attacks

What the attacker will do


▪ A document presentation attack is when a fraudsters try to
misrepresent their identity by presenting identity documents that
are either fully or partially reproduced.
▪ The reproductions can be either physical (full or partial) or digital,
and can include counterfeits or forgeries

▪ Over 90% of document based attacks on digital


onboarding are presentation attacks.
▪ While most KYC platforms focus on confirming the
authenticity of the document (correctness of structure,
text, bar codes), presentation attacks are usually not
detected.
Document liveness Detection

Is the uploaded ID document If live, is the document Does the photograph on the
“live” or a screen capture of the authentic? document substituted?
document?

SCREEN PRINTED PORTRAIT


REPLAYS COPIES SUBSTITUTIONS
Presentation of documents Presentation of documents Presentation of documents
displayed on a digital screen copied, printed on paper, and with an altered facial
cut to size portrait image, such as an
overlay
AI for Document Liveness Detection
OCR & Data Consistency Check

▪ Data extracted from VIZ Zone & MRZ


▪ Data validation, Cross Check (VIZ vs MRZ) &
Check Digit Validation
▪ Validation of Country & Doc Expiry
▪ AI based Age & Gender estimation from Selfie
validated against Age and Gender of document
holder
AI enabled Facial &
Document Liveness :

A+ case study
Biometric based IDM
Transition from Traditional to Digital

Digital
o Automated processes
o Streamlined onboarding
o Highly scalable
o Seamless User Experience

Traditional
o Manual Processes
o Time consuming
o Limited access
o Poor User Experience
Face Verification Liveness Detection

Identity Fraud Prevention


Selfie Auto-Capture
Comprising several neural networks, the
With pre-configured quality liveness detection is trained to detect
parameters working in the
various types of presentation attack
background, we make sure the
vectors, like print, display and 3D mask
selfie is captured automatically attacks.
when suitable for biometric
identity verification .
Well Balanced User Experience and
Security
Face Verification Liveness detection offering for any type
To biometrically verify that the ID of use case. The best option can be
belongs to the same person, our chosen to suit the specific requirements
facial recognition algorithm
compares a holder’s photo on the
ID with a selfie of the user.

Types ▪ Passive liveness


▪ Smile liveness
▪ MagniEye liveness
Backed by Robust Technology and Flexible Architecture

Identity Document Verification


Seamless Auto-Capture Component
Auto-capture components guides users to take a photo of their ID
with the best possible quality for OCR.
Can be integrated easily via
API with other components Al-Powered OCR & Automated ID Classification
Supports a wide range of alphabets & the OCR technology extracts
as per the requirement.
biometric & biographic data from an identity document.

Can be either deployed on- Biometric Verification and Data Consistency Check
premise or served in the Extracts a holder’s photo on the ID for biometric verification. To
cloud. validate the data extracted by OCR, data are cross-checked against
data in MRZ and/or RFID chip.

Document Authenticity Validation


The document verification SDK also detects some of the most
common document fraud attempts.
Seamless User Experience to the Customer

1 2 3

Document Verification Face Verification & Identity verified


Face Verification & Liveness in less than 1
Liveness Identity verified in less minute!
Identity verified in less than 1 minute! ID Auto-Capture
than 1 minute!
• ID Auto-Capture
• ID Auto-Capture • AI-Powered OCR
• AI-Powered OCR • Automated ID
• Automated ID Classification
Classification • Biometric Verification &
• Biometric Verification & Data Consistency Check
Data Consistency Check • Document Authenticity
• Document Authenticity Validation
Validation
User Onboarding User Identification
Print Copy

Front Document Back Document


Attacker presents a physical copy of the
document which can be a colored
printed copy or B/W Xerox copy of a
document in front of the camera.

• Printed cut outs without lamination


• Laminated cutouts
• Printed cutouts with lamination imitation
• Plastic printed forgery
Screen Replay

Front Document Back Document

Attacker presents a digital reproduction of a


counterfeit, forged or stolen document using a
laptop, tablet or mobile

Screen
Replay
Portrait Substitution

Front Document Front Document

Portrait
Substitution
Duplicates

Case 1

Case 2
Emerging Technologies

Contactless Fingerprint Capture


Emerging
Technologies Cryptograph Technology

Passkey

Biometric ID Tablet
Contactless Fingerprint Capture

Touchless Finger capture is designed to increase the scalability of


fingerprint-based solutions reducing the dependency on costly
purpose-built hardware that traditionally drive costs in large-
scale projects.

❑ Finger detection, including angle detection and wrong hand


detection.
❑ Fingerprint capture.
❑ Quality assessment.
❑ Scaling to 500dpi.
❑ Image processing to generate legacy compliant gray scale images.
❑ Liveness detection.
❑ Packaging and sending the data.
Cryptograph Technology

This platform is a unique combination of top-


tier biometric and non-biometric technologies Stores up to 9 times more of data

designed for cost effective Digital Identity


management that allows for 100% Offline
Authentication.
Triple level security

Cryptograph technology is a digital container


able to package various categories of data for CRYPTOGRAPH - CODE

Digital ID.
Stores biometric templates, personal
data & compressed face and finger
images

36
Biometric ID Tablet

One unique platform

Access to all mobile biometrics


needs
• Fingerprint
• Face
• Iris
• Document capture
• 1:1 authentication
• 1:N verification
Thank you

You might also like