How we verify documents

and eliminate fraud

How we verify documents


Fully-Verified delivers two main identity verification methods which follow a similar document verification process. As opposed to common selfie-to-document checks provided by competitors, everything we do (including the document capture) is a based on a live video stream.


Video Identification  by Fully-Verified

Fully-Verified provides a full video identification solution which is compliant with the highest level of KYC requirements. This process requires presence of a trained verification specialist for the whole duration of identity verification. It combines both the human element along with AI during a live video stream. The service is very flexible in adapting to client’s requirements and can be tailored to your company’s needs.

Video identification consists of a real-time video interview with a verification specialist and an automated technology that simultaneously runs in the background to provide full, reliable and secure identity verification.


Automated Video Identification by Fully-Verified

Our automated video identification is very similar to our full video identification procedure, however it’s performed without human assistance. All the user has to do is follow the on-screen instructions: capturing  a selfie, pictures of the document, and perform liveness checks ( which can be customised per customer).


The whole process is recorded on video and stored. It’s backed by automated document checks, machine learning, face recognition technology and AI used for anti-spoofing purposes. If needed it can be further checked by our verification specialists for extra security. This is done to ensure that the person is the rightful owner of the document and all details match.


Main document checks performed:

1. MRZ, checksums and data consistency

Many documents today have what’s called a Machine Readable Zone that can be read and analysed using optical character recognition technology. MRZ contains data that can be found on the whole document like full name, date of birth, document number, document expiration date etc. encoded in a specific format. Our technology:

  • Reads and extracts data encrypted in the MRZ
  • Checks if data from the MRZ strip is consistent with the information on the document and with the information provided by the user
  • Reads, analyses, and validates checksums on the document
  • Confirms that document has not expired
source of document template: Materiały Dydaktyczne nr 103 “Dowód osobisty – zabezpieczenia stwierdzające autentyczność dokumentu”.


2. Comparing to the templates, looking for any signs of manipulation or forgery

There are many ways fraudsters can try to cheat.

They can try to cover the original photo of a genuine document with another. However, this will leave visible edges around the photo that is usually printed onto the document. Altering the photo will also result in changes to the security features that are interlocked with the original image.

source: National Document Fraud Unit UK “Guidance on examining identity documents” June 2016.



New face printed onto a clear laminate and placed on top of the original image.







Documents are also protected by specific typography, security marks, and holograms. Fraudsters may attempt to make some data alterations (using computer imaging software or making physical changes) in information printed onto the document and the data encrypted in MRZ. As a result leaving signs of manipulation and slightly different fonts. That is why we ensure that:

  • Fonts on the document are correct
  • Make sure that security features and designs that are expected from this type of document are there
source: National Document Fraud Unit UK “Guidance on examining identity documents” June 2016.


Intaglio printing on the genuine document (left) and printing from the counterfeit document (right).





  • There are no manipulation signs that could suggest the possibility of the fraudulent document
source: National Document Fraud Unit UK “Guidance on examining identity documents” June 2016.



Visible sign of manipulation – forger scraped the original pen ink to write a new date





  • The document is consistent with their respective government made template. Our database covers ID cards, passports and driving licences from over 190 countries.


3. Holograms check:

Unlike our competitors, our identity verifications are video based. As a result we can have a holistic 3D view of the whole document. We can ask the user to tilt his document in different ways to fully show the holograms which are especially hard to forge in a convincing way. It is something that is possible only on video. Simple photos are often not able to show them.










4. Checking edges of document

Thanks to doing the identity verification process on video, we can easily eliminate common spoofing methods. One of them is taking pictures of  fake printouts of documents. By having a 3D overview of the document we can easily check all edges of a document and verify it’s thickness.


  5. Overall quality of the document check:

Our software and our verification specialists are trained to recognise manipulations on the documents that can suggest document is potentially fraudulent. Identity documents are made to be very difficult to copy or to be manipulated in any way. They have many security features like tilted laser images, holograms, optically variable ink, watermarks, text overlay, complicated designs in the background. Our system can check their consistency, quality,  and compare them to the templates of the genuine documents.