idenTT Verification System
enables automatic verification of an identity document. It checks its correctness, integrity and originality. Significantly speeds up the customer service process, at the same time increasing the credibility level of client authentication and helps to prevent fraud. The entire verification process is carried out within a dozen seconds and the result is available immediately..
One system - many possibilities
Depending on the needs, the data to the system can be delivered using various media. The stationary option assumes the use of a scanner (dedicated or ordinary copier). For those who work in the field, we recommend a mobile application. For companies offering their services on the Internet, we also recommend a version that works online.
Selected functionalities of the solution
The system ensures full security of customer data at every stage of operation. It can be installed inside the institution.
Data integrity and correctness
The system automatically checks the integrity of data throughout the entire document, comparing individual fields. In addition, the MRZ code and other information read from the document are verified.
As part of the system, a client panel is available, where the institution administrator can view the details of verification processes and the collection of customer data. There is information about individual verification steps, the ability to view photos of documents and obtained data read from documents.
Full data security
System zapewnia pełne bezpieczeństwo danych klientów na każdym etapie działania. Może być instalowany wewnątrz instytucji.
A system tailored to your needs
During the implementation of the tool, we offer the possibility of adapting to the current customer requirements, integration with already functioning tools and the implementation of additional functionalities.
A package of additional functionalities
The system includes many additional functionalities, some of them are: the possibility of archiving the verification results, integration with databases of lost and stolen documents, using the internal black list of documents, support of a qualified team of experts.