Granting verified access to your visitors and contractors

Granting verified access to your visitors and contractors

Verifying the identity of visitors and contractors is important and will become even more so. With the rise of globalisation, it is becoming increasingly difficult to know if the right people are on site. More and more individuals have similar appearances. This means that lookalike fraud (an emerging form of identity fraud) is lurking! Lookalike fraud is a form of fraud in which someone uses an authentic identity document from another person to whom he or she bears a resemblance.

To give you more certainty that you are dealing with the right person, you can integrate one or even a combination of our smart applications in your business software. You are then able to both check (verify) and establish (identify) the identity of a person. You then know at all times who exactly is on your site! It also means that you can act appropriately in case of emergency.

Do you know to whom you are granting access?
The identity document is first machine checked and read by means of a document reader. Within a few seconds, a definitive answer is given as to whether the document contains the correct authenticity characteristics. You then perform face comparison. A camera is used to determine immediately whether a person is the same person shown on the identity document. This provides you with certainty about the identity of the person.
 
By deploying these technologies, you can perform additional checks on people who wish to enter your building or site. This minimises lookalike and identity fraud and ensures security.
 
Curious how this works in practice? Read here how LCL applied this through successful co-creation.