Businesses can detect fraud with the following rules:
- Detect with User Data: It compares the user’s data (e.g., first name, last name, middle name, and date of birth) against official government records.
- If a mismatch occurs, businesses can:
- Automatically fail the verification.
- Or pend the verification for manual review.

- Detect with Age Limit: It verifies if the user’s submitted date of birth matches government records.
- If discrepancies are found, businesses can:
- Automatically fail the verification for age-related compliance or eligibility violations.
- Or pend the verification for manual review.

- Detect with Liveness: It checks liveness verification for indicators of manipulation, like Brightness levels (to detect poor lighting or tampered images).
- If manipulation is detected, businesses can:
- Automatically fail the verification attempt.
- Or pend for manual review.

- Detect Duplicate ID: It checks if a user’s email address, reference ID, or government-issued ID has previously been used in a verification attempt. It helps identify users who are trying to reuse credentials that have already been verified or passed through the onboarding process.
- If a duplicate is detected, businesses can:
- Automatically fail the new verification attempt.
- Or pend for manual review.

- Detect with AML Screening: It cross-checks user information against global AML watchlists and sanctions databases to identify individuals involved in financial crimes, money laundering, or terrorism financing.
- If a match is found, businesses can:
- Automatically fail the verification attempt.
- Or pend for manual review for enhanced due diligence and further investigation.

- Detect with IP/Device Screening: It checks IP addresses against known blacklists and suspicious geolocations.
- If suspicious activity is detected, businesses can:
- Automatically fail the verification attempt.
- Or pend for manual review.
