
Glossary
Making sense of identity
Key Features
Trusted features, tailored process
The world of identity and compliance is full of jargon and acronyms.
Welcome to our glossary where we will be breaking down key terms in biometric IDV, KYC, and profiling to help people better understand the concepts behind the technology and our solutions.
Please feel free to send us questions or submit a term for inclusion.

Index
A
AGE ESTIMATION
The process of determining an approximate age of an individual using AI and biometric technologies, often to ensure compliance with age-related regulations.
AGE VALIDATION
Verifying an individual’s age based on official documentation or biometric data to confirm they meet the required age criteria for specific activities or services.
AML (Anti Money Laundering)
Regulations and processes designed to prevent criminals from disguising illegally obtained funds as legitimate income.
API (Application Programming Interface)
An API in trust identity enables secure communication between identity verification systems and applications.
It allows businesses to integrate identity checks, authentication, and compliance processes seamlessly into their platforms, ensuring trusted and frictionless user experiences.
AUTHENTICATION
The process of verifying that a user is who they claim to be.
B
BIOMETRIC AUTHENTICATION
Biometric authentication: Using unique biological traits, such as fingerprints, facial features, or voice, to confirm identity.
BIOMETRIC DATA
Personal data derived from unique physical or behavioural characteristics.
C
COMPLIANCE
Meeting legal and regulatory standards, such as AML, KYC, and GDPR requirements.
CUSTOMER DUE DILIGENCE (CDD)
A process where businesses gather and assess customer data to evaluate potential risks.
D
DIATF (Digital Identity Assurance Trust Framework)
A structured framework defining the standards and assurance levels for establishing, verifying, and managing digital identities securely and reliably.
DOCUMENT VERIFICATION
Verifying the authenticity of identity documents, such as passports or driver’s licenses, during onboarding.
DYNAMIC RISK PROFILING
Continuously assessing a user’s risk level based on various data points and behaviours.
E
ELECTRONIC KNOW YOUR CUSTOMERS (EKYC)
Digitized processes for verifying the identity of customers online.
END USER
The individual who ultimately uses a product, service, or system.
ENHANCED DUE DILIGENCE (EDD)
A more detailed investigation required for higher-risk customers.
F
FACE MATCHING
Comparing a live selfie or video to a photo on an official document to verify identity.
FRAUD DETENTION
Systems and processes to identify attempts to impersonate users or create false identities.
G
GDPR (General Data Protection Regulation)
European Union regulation focused on protecting personal data and privacy
I
IDENTITY VERIFICATION (IDV)
The process of ensuring an individual is who they claim to be using documents, biometrics, or other data.
IMPERSONATION FRAUD
A type of fraud where someone pretends to be another person to gain access or benefits.
K
KYC (Know Your Customer)
The process of verifying the identity of customers to assess risks, prevent fraud, and ensure compliance with regulations.
L
LIVENESS DETECTION
Ensuring that the biometric input (e.g., selfie) is from a live person and not a static photo or video replay.
M
MACHINE LEARNING
Algorithms that improve IDV and KYC accuracy by learning from data patterns over time.
O
ONBOARDING
The process of bringing new users or customers into the system, including identity verification steps.
P
PASSIVE BIOMETRICS
Biometric verification that happens seamlessly in the background without requiring specific actions from the user.
PEP (Politically Exposed Person)
An individual who poses a higher risk due to their position of influence, often requiring enhanced scrutiny
R
REAL-TIME VERIFICATION
Instant validation of a user’s identity during onboarding.
RIGHT TO RENT
Verification of an individual’s eligibility to rent property within a specific jurisdiction, ensuring compliance with legal and regulatory standards.
RIGHT TO WORK
Verification of an individual’s legal entitlement to work in a specific jurisdiction, based on documents such as work permits or visas.
RISK-BASED APPROACH
Tailoring verification measures based on the assessed risk level of each user.
S
SELFIE VERIFICATION
Using a selfie image to match an individual’s face with their ID document.I'm a paragraph.
SYNTHETIC IDENTITY FRAUD
Fraud that combines real and fake information to create a new, false identity.
T
TRANSACTION MONITORING
Continuously tracking user activity to detect suspicious patterns post-onboarding.
TWO-FACTOR AUTHENTICATION (2FA)
An additional layer of security requiring two forms of verification
U
USER EXPERIENCE (UX)
The overall experience customers have when interacting with the product, particularly during verification.
V
VERIFICATION LEVELS
Different tiers of identity checks based on risk and compliance needs (e.g., basic, standard, enhanced).
W
WATCHLIST SCREENING
Checking customer information against government and international watchlists to identify high-risk individuals.