Deduplication & Greylist Checks

DEDUPLICATION & GREYLIST CHECKS

Catch Repeat Fraud with Trust Stamp

Are you struggling with repeat fraudsters slipping through? A significant portion of fraud is carried out by repeat offenders who bypass traditional KYC checks. Despite changing their identities, their faces remain the same. With Trust Stamp, leverage our biometric tokens to prevent bad actors from getting through, thereby enhancing your account opening security. Fortify your defenses with our biometric-based identity verification solutions.


Get in Touch
Deduplication & Greylist Checks
Why Trust Stamp

Why Trust Stamp for Deduplication & Greylist Checks

Prevent duplicate identities

Prevent duplicate identities

Go beyond standard KYC processes by identifying faces registered under different names, improving fraud prevention at account opening.

Detect repeat attackers and synthetic identities

Detect repeat attackers and synthetic identities

Flag and stop identities previously linked to fraud or non-payment by using tokenized biometric searches during onboarding, ensuring that no biometric measurements are stored while still enable face matching.

Ensure compliance

Ensure compliance

Satisfy your compliance teams with an identity verification system tailored to meet GDPR, CPRA, PIPEDA, and other privacy regulations.

Set your own adjudication thresholds

Set your own adjudication thresholds

Customize how potential matches are handled with options for manual review or automated scoring for account opening fraud prevention.

Benefits

Intercept Fraudsters Before They Act

Data Ingestion

All biometric data, typically in the form of facial images, is ingested into the system. Each image is processed to extract unique biometric features, which are then tokenized using our IT2 technology.

Data Ingestion

Tokenization and IT2 Generation

Each biometric feature set is converted into an IT2 (Irreversibly Transformed Identity Token). This ensures that the data is non-reversible and secure, protecting user privacy throughout the deduplication process.

Tokenization and IT2 Generation

1:N and N:N Matching

The system performs both 1:N and N:N matching, where each token is compared against every other token in the dataset. This comprehensive comparison identifies instances where the same individual may have been enrolled multiple times under different identifiers.

1:N and N:N Matching

Clustering and Association

Once potential duplicates are identified, the system clusters these tokens together, associating them with a single biometric identifier. This ensures that each unique individual in the dataset is represented by one identifier, preventing multiple entries for the same person.

Clustering and Association
GET IN TOUCH

Eliminate Repeat Fraud. Protect Your Platform.

Don’t let repeat bad actors evade detection. Take control of your identity verification process today. Contact Trust Stamp to learn how our Deduplication and Greylist checks can enhance your fraud prevention strategy and safeguard your business.

Get in touch now

Our use of cookies

We use necessary cookies to make our site work. We'd also like to set optional analytics cookies to help us improve it. We won't set optional cookies unless you enable them. Using this tool will set a cookie on your device to remember your preferences.

For more detailed information about the cookies we use, see our Cookies page


Necessary cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.


Analytics cookies

We'd like to set Google Analytics cookies to help us to improve our website by collecting and reporting information on how you use it. The cookies collect information in a way that does not directly identify anyone. For more information on how these cookies work, please see our Cookies page.

Save and close
Cookie Consent