Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/customer/www/paycasso.com/public_html/wp-includes/functions.php on line 4861
How VeriSure™ works
VeriSure™ employs the same processes we see used by the world’s border control agencies, whilst removing all the barriers to commercial deployment. ID images and live user video capture are functions fully supported through Paycasso’s iOS and Android SDKs. The user-facing screens in our SDKs are fully customisable thereby ensuring a seamless user experience. All information captured through the user’s device is securely transmitted to Paycasso servers with 256-bit encryption. Transactional data is provided in a configurable format for integration into your systems. Security of data is maintained throughout the Paycasso platform, from the initial point of capture through to the delivery of transactional data into our client environments.
STEP 1 – The user presents their ID
Users are visually guided to frame their ID, and VeriSure™ then automatically captures a copy. ID data is instantly extracted making it available to not only pre-populate the user’s registration form details but providing your organisation with the critical data points needed to trigger your additional compliance processes.
- Data and security
- Data and Biometrics extracted
from eChip (if present)
- Verifies ID data matches eChip data
STEP 2 – Validating the ID document
When users presents IDs that contain chip security features, they again are visually guided to simply place their phone on their ID. VeriSure™ automatically extracts all data contained on these chips, verifies both its security features and that the chip data is consistent with the printed ID.
- Data extracted
- Photo extracted
STEP 3 – Verifying the ID holder
Users are again visually guided to position their face within a displayed frame. VeriSure™ then automatically confirms whether the “live” user biometrically matches with their ID photo. ID chip security features contain a second photo of the holder. Users presenting IDs with a chip are biometrically matched with this photo too.
- Biometrically verifies eChip (if present) stored photo matches live user
- Biometrically verifies ID photo matches live user
- Capturing ‘live’ user