Trust Stamp works with organizations on the cutting edge of financial security to do just that.
Hashed identity data is anonymized and can never be reversed, making it safe to use, store, and share without risk of leaking useful information
Trust Stamp technology works with any identity data from any source, breaking vendor and modality lock in while being device agnostic
Customer experience is critical in successful implementation of security procedures. Our authentication process is low friction, fast, and user friendly
The EgHash is stored in an Identity Lake and matched against all prior and future EgHashes to prevent duplicate identities (even those that pass KYC by using apparently valid identity documents). This process continues to catch fraudsters using the same face for multiple accounts, allowing our clients to give their customers a piece of mind that their accounts and identities are safe.
By also contributing some (or all) of their EgHashes to a Consortium Identity Lake, participating organizations can query new EgHashes against a larger pool to achieve inter-institutional identity de-duplication without exposing PII or competitive data.
We provide an additional layer of automated authentication when bank clients have failed knowledge-based- authentication and need to regain access to their account. By comparing the secure selfie to the biometric EgHash collected at registration, you can quickly authenticate legitimate customers and provide instant account access.
1. Complete a basic form
2. Take a “secure-selfie” and photograph the ID
3. Upon passing proof-of-liveness & ID verification: receive a PIN number to regain access