AU10TIX Features
Intelligence (4)
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (3)
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Response (4)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Management (2)
Scheduled Data Checks
Schedule periodic (weekly, monthly, etc.) checks on existing address data to verify correctness and formatting.
Reporting
Produce reports and data visualization regarding address verification actions.
Functionality (8)
Address Verification
Checks address data against an authoritative address database (usually government).
Automation
Verify addresses automatically on the data source as new entries are added.
Cleansing
Purge or update incorrect data through corrective processes like fuzzy matching.
International Verification
Checks address data against authoritative databases from two more more countries.
Credential Templates
Provides credential template library.
QR-Based Workflow
Offers QR-based workflow for issuing and verifying credentials.
Customizable Credential Wallets
Offers customizable branding on credential wallets.
Integrations
Integrates with other credential wallets based on open standards.
Integration (3)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Administration (3)
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Functionalities (6)
Authentication Methods
Offers age authentication via methods such as document or identification card verification, telephone number checks, matching against consumer records or other similar methods.
Online Age Verification
Is primarily used to verify a person's identity online for e-commerce purposes.
Age Estimation
Offers age estimation functionality.
Integrations and SDKs
Offers integrations or software development kits (SDKs) for websites, applications, mobile apps, point-of-sale (POS) solutions, and kiosks
In-person Age Verification
Is primarily used to verify a person's identity in-person, such as at a bar, restaurant, event venue, or other similar places.
Liveness Check
Has a liveness check using selfies or other photograph technology to ensure the person being verified is real.
Generative AI (1)
AI Image-to-Text
Converts images into a textual description, identifying key elements.
Identity Verification Functions - Identity Verification (5)
Multi-Method Verification
Supports multi-method identity verification including documents, biometrics, and database cross-checks.
AI Document Check
Performs automated document authentication using OCR and AI/ML.
Biometric Face Match
Conducts biometric face matching (selfie-to-ID verification).
Integration Options
Offers identity verification functionality via API, SDK, or hosted interface.
Workflow Orchestration
Provides configurable identity verification workflows and logic-based orchestration.
Risk & Fraud Prevention - Identity Verification (3)
Liveness Detection
Offers liveness detection to prevent spoofing and presentation attacks.
AI Risk Scoring
Generates real-time identity risk scores using AI/ML or rule-based logic.
Document Forensics
Detects fraudulent or tampered documents through forensic analysis.
Compliance & Governance - Identity Verification (3)
Standards Compliance
Supports compliance with NIST Identity Assurance Levels (IAL2, IAL3).
AML/PEP Screening
Integrates AML, PEP, and sanctions list screening into the identity verification process.
Global Coverage
Supports global identity document verification across multiple countries and regions.


