Glossary

Experience the proven power of our computer vision solutions for yourself in a few simple steps.

Search Icon Close Icon
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Account Takeover (ATO)

Account Takeover (ATO) occurs when unauthorized individuals gain control over user accounts using phishing, keyloggers, or malware. Protect against ATO attacks with strong authentication, unique passwords, and advanced security tools.

Learn more

Account Takeover Fraud

Prevent unauthorized access to online accounts & safeguard personal information with strong passwords, authentication, monitoring, & anti-fraud tools.

Learn more

Account Validation Service

Account Validation Service verifies user-provided information for account creation or changes, preventing fraud and ensuring data integrity. Enhance security and maintain accurate user data.

Learn more

Active Liveness Detection

Enhance security & accuracy in biometric systems with active liveness detection. Verifies real-time presence & prevents impersonation. Detects dynamic facial movements to prevent spoofing attacks.

Learn more

Address Card

An address card is a compact and organized representation of an individual's contact information, typically including their name, phone number, and address.

Learn more

Address Risk

Address risk refers to vulnerability and exposure at a specific location, including natural disasters, crime rates, and proximity to danger. Assessing it helps make informed decisions and allocate resources effectively for safety and resilience. #AddressRisk

Learn more

Address Verification Service

Address Verification Service (AVS) validates customer address info for e-commerce & credit card transactions. Enhances security & prevents fraud.

Learn more

Advance Fee Fraud

Advance Fee Fraud, exemplified by the Nigerian Prince scam, deceives victims into paying upfront fees or providing personal info under false pretenses.

Learn more

Adverse Media Screening

Adverse Media Screening: Identify risks by analyzing news, social media, and legal data. Protect reputation, comply with regulations, and make informed business decisions. Advanced technology tools used for searching and analyzing vast amounts of data.

Learn more

Age Verification

Ensure legal compliance, protect vulnerable individuals, and prevent minors from accessing age-restricted content or services. Use various methods like ID checks, third-party services, and age estimation algorithms for robust age verification.

Learn more

Age-restricted Purchases

Age-restricted Purchases: Transactions involving products or services that are legally restricted to be sold only to individuals above a certain age.

Learn more

AI-powered

AI-powered refers to technologies, systems, or devices that utilize artificial intelligence to enhance their capabilities, performance, or functionality.

Learn more

Alien ID

Alien ID: Official identification document issued to non-citizens residing or visiting a country, providing legal recognition and verifying their immigration status.

Learn more

Alien Passport

The Alien Passport is an official document issued by a country to non-citizens, granting them legal identification and temporary residency status.

Learn more

AML Audit

AML Audit examines and evaluates an organization's Anti-Money Laundering program for compliance with laws, preventing illicit activities. Enhance controls, mitigate risks, and maintain financial system integrity. Required for transparency and safeguarding against financial crime.

Learn more

Anomaly Detection

Boost your SEO with anomaly detection - Identify outliers, errors, fraud, and unusual events in data using statistical methods and machine learning algorithms. Essential for cybersecurity, finance, healthcare, and more!

Learn more

Anonymised Data

Anonymised data refers to information that has been stripped of identifying details, ensuring the identities of individuals cannot be determined.

Learn more

Anti-Money Laundering (AML)

Anti-Money Laundering (AML) refers to regulations and procedures aimed at preventing illicit funds from disguising as legitimate money. It helps combat financial crimes like terrorism financing and corruption, ensuring the integrity of the financial system. Compliance is mandatory for banks and institutions.

Learn more

Anti-Money Laundering (AML) Regulators by Country

Discover the primary AML regulators worldwide: FinCEN in the US, FCA in the UK, AUSTRAC in Australia, FIU in Singapore, FSC in South Korea, and FSA in Japan.

Learn more

Application Fraud

Application fraud is intentional deception on applications to gain benefits. It occurs in finance, insurance, employment, and government. Verify information to prevent fraud.

Learn more

Area Under the Curve (AUC)

The Area Under the Curve (AUC) is a metric used in statistics and machine learning to assess binary classification models' performance. Learn more here.

Learn more

Artificial Intelligence (AI)

Discover the power of Artificial Intelligence (AI) in revolutionizing industries, automating tasks, and enhancing decision-making capabilities. Learn more about machine learning, natural language processing, computer vision, and robotics.

Learn more

Attack Vectors

Discover the various methods attackers use to exploit system vulnerabilities & gain unauthorized access. Mitigate attack vectors with effective security measures.

Learn more

Authentication

Securely verify user identity, grant access to resources, and maintain system security with authentication. Protect sensitive information with trusted credentials.

Learn more

Auto-Approval

Automate approval processes, streamline operations, and reduce manual intervention with auto-approval systems. Increase efficiency and reduce costs.

Learn more

Auto-Decision

Streamline decision-making with auto-decision systems powered by AI. Improve efficiency, accuracy, and reduce costs in finance, healthcare, and more. Stay transparent and accountable.

Learn more

B

Bad Actor

Protect integrity, security & fairness from bad actors engaging in unethical practices. Safeguard against fraud, corruption & data breaches - crucial for all domains.

Learn more

Bank Drop

Discover the dark world of bank drops, a method used by criminals to receive illicit funds through legitimate bank accounts, hiding their true source and minimizing detection.

Learn more

Bank Secrecy Act (BSA)

Learn about the Bank Secrecy Act (BSA), a federal law in the US aimed at preventing money laundering and financial crimes. Discover its requirements and importance.

Learn more

Banking as a Service (BaaS)

Enhance customer experience and build innovative financial solutions with Banking as a Service (BaaS). Seamlessly integrate banking services into your platform.

Learn more

Barcode Scanning

Barcode scanning technology enables efficient and accurate identification, tracking, and management of products, improving operational efficiency and customer satisfaction.

Learn more

Behavior-Based Fraud Analysis

Detect and prevent fraud with behavior-based analysis. Analyze behavioral patterns and use advanced analytics to identify suspicious activities.

Learn more

Behavioral Analytics

Gain insights and make informed decisions with behavioral analytics. Track user behavior, optimize strategies, and enhance user experiences. Drive growth with data-driven decisions.

Learn more

Beneficial Ownership

Discover the importance of beneficial ownership in finance, business, and property law. Learn how it helps identify true stakeholders and ensures transparency.

Learn more

Biometric

Biometric refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints or voice patterns, for identification or authentication purposes.

Learn more

Biometric Passport

Discover the benefits of a biometric passport – a highly secure and tamper-proof travel document with an electronic chip containing encrypted biometric information for efficient and safe international travel.

Learn more

Biometric Verification

Enhance security and prevent identity fraud with biometric verification. Confirm individual's identity using unique physical or behavioral characteristics.

Learn more

Border Crossing Card

The Border Crossing Card is a travel document issued by the US government for Mexican citizens to enter the US for specific purposes, such as tourism or business.

Learn more

Bot

Boost productivity & save time with bots, automated software applications that simulate human interactions & perform tasks in various domains.

Learn more

Business Email Compromise (BEC)

Protect your business from cyber scams with Business Email Compromise (BEC) awareness. Implement security measures and educate employees to stay safe.

Learn more

Bust Out

Bust Out: A deliberate and forceful escape from confinement. Involves physical force, clever strategies, and sometimes violence. Illegal and actively prevented by authorities.

Learn more

C

California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) grants California residents rights over their personal information, including the right to know, delete, and opt out of data collection and sales. Improving consumer privacy and control.

Learn more

Card Not Present Fraud (CNP)

Learn about Card Not Present Fraud (CNP) - unauthorized online, phone, or mail-order transactions without card present. Find out security measures to mitigate risk.

Learn more

Carding

Carding: Verifying stolen card data for malicious use. Carders obtain details from underground markets or data breaches to validate and sell for fraud.

Learn more

CEO Fraud

CEO fraud (BEC) is a cyber attack where fraudsters impersonate a CEO to deceive employees into taking unauthorized actions, leading to financial losses and compromise of sensitive data.

Learn more

Challenge-Response Authentication

Challenge-Response Authentication verifies identity by exchanging challenges and responses, enhancing security against replay attacks.

Learn more

Chargeback

Chargeback: A customer-initiated reversal of a card payment, used for consumer protection in cases like fraud or non-delivery. Merchants may face penalties.

Learn more

Check Fraud

Check fraud is the manipulation of checks for illegal gain, including forgery, alteration, counterfeit checks, and unauthorized use, posing a threat to individuals, businesses, and financial institutions.

Learn more

Children’s Online Privacy Protection Act (COPPA)

COPPA is a US law protecting online privacy of children under 13. It sets guidelines for websites collecting personal data, ensures parental consent, and allows control over information. FTC enforces compliance.

Learn more

Citizenship Certificate

A Citizenship Certificate is an official document that confirms an individual's citizenship status in a particular country.

Learn more

Clean Fraud

Clean fraud: Financial fraud using real information. Perpetrators use stolen or fake identities to bypass security measures and make unauthorized transactions. Difficult to detect.

Learn more

CNP Fraud (Card Not Present)

CNP fraud: Unauthorized transactions made using card details without physical presence. Businesses employ security measures to combat and protect against monetary losses.

Learn more

Compliance

Adhere to laws, rules, and standards with compliance. Ensure ethical boundaries, mitigate risks, and protect stakeholders' interests.

Learn more

Compliance Officer

A Compliance Officer ensures adherence to policies, laws, and regulations, mitigating risks and promoting ethical practices for an organization.

Learn more

Computer Vision

Explore the field of computer vision, an AI discipline focused on enabling machines to interpret visual information from digital images or videos. Learn about algorithms and applications.

Learn more

Consular ID

A Consular ID is an official identification document issued by a foreign government to its citizens residing or traveling abroad.

Learn more

Consumer Financial Protection Bureau (CFPB)

The Consumer Financial Protection Bureau (CFPB) promotes fairness and accountability in the financial marketplace, protecting consumers and enforcing regulations.

Learn more

Continuous Monitoring

Proactively analyze real-time data to detect risks, vulnerabilities, and breaches. Improve security, comply with regulations, and stay ahead of threats.

Learn more

Conversion Rates

Conversion Rates: The percentage of website visitors who complete a desired action, such as making a purchase or filling out a form.

Learn more

Credential Stuffing

Prevent unauthorized access & data breaches with unique passwords & multi-factor authentication. Learn about the risks of credential stuffing.

Learn more

Credit Card Fraud

Unauthorized use of credit card details for fraudulent transactions. Learn about methods, consequences, and security measures to protect yourself.

Learn more

Cross-Channel Fraud

Cross-channel fraud: Exploiting vulnerabilities in online and offline channels for fraudulent activities. Learn how to protect your business and customers.

Learn more

Customer Churn

Customer Churn refers to the rate at which customers cease to do business with a company or unsubscribe from its services.

Learn more

Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is a process that financial institutions use to verify and assess the risk associated with their customers.

Learn more

Customer Identification Program (CIP)

Customer Identification Program (CIP) is a mandatory process conducted by financial institutions to verify and authenticate the identity of their customers.

Learn more

Customer Identity & Access Management (CIAM)

Customer Identity & Access Management (CIAM) refers to the process of managing and securing customer identities and their access to digital resources.

Learn more

Customer Onboarding

Customer Onboarding is the process of guiding and familiarizing new customers with a product or service to ensure a smooth transition and positive experience.

Learn more

Customer Risk Profiling

Customer Risk Profiling: The process of evaluating and assessing the level of risk associated with a customer to determine their suitability for a particular product or service.

Learn more

D

Dark Web

The Dark Web is a hidden part of the internet that is not indexed by search engines and is often associated with illegal activities.

Learn more

Data Breach

A data breach is the unauthorized access, disclosure, or loss of sensitive information, such as personal data or trade secrets, by a third party.

Learn more

Data Capture Automation

Data Capture Automation is a process of automating the collection, extraction, and processing of data from various sources, reducing manual efforts and improving efficiency.

Learn more

Data Entry Automation

Data Entry Automation: The process of utilizing software or systems to automatically input, validate, and manipulate data with minimal human intervention.

Learn more

Data Extraction

Data Extraction: The process of collecting and retrieving specific data from various sources, such as databases or websites, for analysis or storage.

Learn more

Data Protection Act 2018

The Data Protection Act 2018 is a UK law that safeguards individuals' personal data, ensuring it is processed lawfully and securely.

Learn more

Debit Card Fraud

Debit Card Fraud: Unauthorized use of a debit card to make fraudulent transactions, often resulting in financial loss for the cardholder.

Learn more

Deepfake

Deepfake: A deceptive technique that uses artificial intelligence to create manipulated videos or images, often replacing a person's face with another's, resulting in highly realistic but fabricated content.

Learn more

Demand Deposit Account (DDA) Fraud

DDA Fraud is a deceptive practice involving unauthorized access or manipulation of funds in a demand deposit account, often through cyberattacks or identity theft.

Learn more

Device Fingerprinting

Device Fingerprinting is the process of uniquely identifying and tracking devices based on their distinctive characteristics, such as hardware, software, or network configurations.

Learn more

Device Risk

Device Risk refers to the potential threats or vulnerabilities associated with electronic devices, including the risk of data breaches, malware attacks, and unauthorized access.

Learn more

Digital Certificate

A digital certificate is an electronic document that verifies the authenticity and integrity of digital information, ensuring secure online communication.

Learn more

Digital Footprint

Digital Footprint: The trail of information left by an individual's online activity, including social media posts, browsing history, and online interactions.

Learn more

Digital Forgery

Digital Forgery: Falsification or alteration of digital content, such as photos or documents, with the intent to deceive or mislead.

Learn more

Digital Identity

Digital Identity refers to the online representation of an individual or entity's personal information, activities, and interactions on the internet.

Learn more

Digital Manipulation

Digital Manipulation: The alteration or modification of digital images using software tools to enhance, correct, or create visual content.

Learn more

Digital Onboarding

Digital onboarding is the process of integrating new users into a digital platform or service, ensuring a seamless and efficient experience.

Learn more

Digital Passport

A Digital Passport is an electronic document that verifies a user's identity online, allowing them to securely access various digital services and platforms.

Learn more

Digital Tampering

Digital Tampering: Unauthorized manipulation or alteration of digital content, such as images or documents, with the intent to deceive or mislead.

Learn more

Digital Trust

Digital Trust is the confidence in the reliability, integrity, and security of digital technologies and online interactions.

Learn more

Document Capture

Document Capture refers to the process of digitally capturing and converting physical or electronic documents into a searchable and editable format.

Learn more

Document Type Recognition

Document Type Recognition is the process of automatically identifying and classifying different types of documents based on their content and layout.

Learn more

Document Verification

Document verification is the process of confirming the authenticity and validity of a document, typically through comparisons with trusted sources or by using advanced technologies.

Learn more

Driver Card

The Driver Card is a small identification card issued to licensed drivers, providing proof of their driving privileges and personal information.

Learn more

Drivers License

A government-issued document that grants individuals legal permission to operate motor vehicles on public roads.

Learn more

Drop Address

The drop address is a specific location where packages or items are delivered or picked up, often different from the sender's or recipient's address.

Learn more

Drop-off Rates

Drop-off Rates: The percentage of users who leave a website or app after visiting only one page or without completing a desired action.

Learn more

E

Egmont Group

The Egmont Group is an international organization of financial intelligence units that collaborate to combat money laundering and terrorist financing.

Learn more

Email Risk

Email Risk: Potential dangers or vulnerabilities associated with the transmission, storage, and access of electronic messages via email platforms.

Learn more

Employment Pass

The Employment Pass is a work visa issued by certain countries that allows foreign professionals to work and reside in the country for a specified period.

Learn more

Emulator

An emulator is a software or hardware that enables a computer system to imitate and run programs or operating systems designed for a different device or platform.

Learn more

Enhanced Due Diligence (EDD)

Enhanced Due Diligence (EDD) is a thorough investigation process that involves gathering additional information to assess higher-risk customers or transactions.

Learn more

Entity Resolution

Entity Resolution is the process of identifying and merging duplicate records or entities within a dataset to ensure data quality and consistency.

Learn more

EU eIDAS Regulation

EU eIDAS Regulation: EU regulation that establishes a framework for electronic identification and trust services in the European Union.

Learn more

European Banking Authority (EBA)

The European Banking Authority (EBA) is an EU agency that ensures the effective and consistent regulation and supervision of banking activities within the European Union.

Learn more

European Securities and Markets Authority (ESMA)

ESMA is a European regulatory body overseeing securities and markets, ensuring investor protection, stability, and transparency in the EU financial system.

Learn more

e

eKYC

eKYC is an electronic process that allows individuals to verify their identity and authenticate themselves digitally, eliminating the need for physical documents.

Learn more

F

Facial Matching

Facial Matching: The process of comparing and analyzing facial features to determine whether two or more facial images belong to the same person.

Learn more

Facial Recognition

Facial Recognition is a technology that identifies and verifies individuals by analyzing unique facial features, used for security and authentication purposes.

Learn more

Fake Check Scams

Fake Check Scams: Fraudulent schemes where victims receive counterfeit checks, are instructed to deposit them, and then send money back to scammers before banks discover the fraud.

Learn more

False Negative

False Negative: A result that incorrectly indicates the absence of a condition or attribute, despite it actually being present.

Learn more

False Positive

False Positive: An incorrect result that indicates a condition or event is present when it is not.

Learn more

False Positive Ratio

The False Positive Ratio is the proportion of incorrect positive results among all positive results obtained in a test or system.

Learn more

Federal Trade Commission (FTC)

The Federal Trade Commission (FTC) is a government agency in the United States responsible for promoting consumer protection and preventing unfair business practices.

Learn more

Financial Action Task Force (FATF)

The Financial Action Task Force (FATF) is an intergovernmental organization that sets global standards to combat money laundering and terrorist financing.

Learn more

Financial Conduct Authority (FCA)

The Financial Conduct Authority (FCA) is a regulatory body in the UK that ensures financial markets are fair, transparent, and consumers are protected.

Learn more

Financial Crime

Financial Crime refers to illegal activities involving deceit, fraud, or manipulation of financial systems, resulting in monetary loss or illegal gains.

Learn more

Financial Crimes Enforcement Network (FinCEN)

FinCEN is a U.S. government agency that combats money laundering, terrorist financing, and other financial crimes through data analysis and regulation.

Learn more

Fingerprint Scan

Fingerprint scan is a biometric authentication method that uses unique patterns on a person's fingertips to verify their identity.

Learn more

First Payment Default (FPD)

First Payment Default (FPD) refers to the failure of a borrower to make the initial payment on a loan or credit agreement.

Learn more

First-Party Fraud

First-Party Fraud: Occurs when individuals deceive a business using their own identity to obtain goods, services, or money through fraudulent means.

Learn more

Fraud Alert

Fraud Alert: A warning or notification that is issued to protect individuals or organizations from potential fraudulent activities or identity theft.

Learn more

Fraud Analytics

Fraud Analytics is the practice of using data analysis techniques and algorithms to detect and prevent fraudulent activities within a system or organization.

Learn more

Fraud Detection

Fraud Detection refers to the process of identifying and preventing dishonest or deceptive activities, such as financial scams or identity theft.

Learn more

Fraud Investigation

Fraud Investigation is the process of examining and uncovering fraudulent activities or deceptive behavior to gather evidence for legal action or prevention measures.

Learn more

Fraud Management System

A Fraud Management System is a software solution designed to detect, prevent, and mitigate fraudulent activities within an organization's operations.

Learn more

Fraud Prevention

Fraud Prevention refers to measures and techniques implemented to detect, deter, and mitigate fraudulent activities, protecting individuals and organizations from financial losses and reputational damage.

Learn more

Fraud Ring

A fraud ring is a network of individuals collaborating to engage in illegal activities, such as identity theft or financial scams, for personal gain.

Learn more

Fraud Score

The 'Fraud Score' is a numerical value that assesses the likelihood of fraudulent activity, providing a measure to detect and prevent potential fraud.

Learn more

Fraud Triangle (Pressure, Opportunity, Rationalization)

The Fraud Triangle (Pressure, Opportunity, Rationalization) is a concept that explains the factors that typically lead individuals to commit fraudulent acts.

Learn more

Fraudulent Transaction

Fraudulent Transaction: An unauthorized or dishonest activity involving the deceitful use of funds or assets for personal gain or illegal purposes.

Learn more

Friction

Friction is the resistance encountered when two objects rub against each other, resulting in a force that opposes their relative motion.

Learn more

Friendly Fraud

Friendly Fraud: A deceptive practice where a customer disputes a legitimate transaction, resulting in chargebacks, often due to forgetfulness or intentional abuse.

Learn more

Fullz

Fullz: Refers to a complete set of stolen personal information, including name, address, social security number, and credit card details, sold on the dark web.

Learn more

Fuzzy Matching

Fuzzy Matching: A technique used to find approximate matches between similar but not identical strings of text or data.

Learn more

G

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a set of regulations that governs the protection and processing of personal data within the European Union.

Learn more

Ghost Employee (a fake identity on a company’s payroll)

A ghost employee is a fictitious identity listed on a company's payroll, typically used for fraudulent purposes or embezzlement.

Learn more

Global Entry Card

The Global Entry Card is a travel document issued by the U.S. government that grants expedited clearance for pre-approved, low-risk travelers at airports and land borders.

Learn more

Global Watchlist

The Global Watchlist is a comprehensive database of individuals or entities subject to scrutiny due to potential risks or suspicious activities worldwide.

Learn more

H

Healthcare Fraud

Healthcare Fraud: Illegitimate activities committed by individuals or organizations to deceive or defraud healthcare systems for personal or financial gain.

Learn more

Heuristic Analysis

Heuristic Analysis: Evaluating the usability of a product or system by identifying and uncovering potential design flaws and user experience issues.

Learn more

I

Identity Access Management (IAM)

Identity Access Management (IAM) is a system that manages and controls user access to resources, ensuring security and reducing unauthorized access risks.

Learn more

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is a cloud-based solution that enables businesses to manage user identities and access privileges securely and efficiently.

Learn more

Identity Document Verification

Identity Document Verification: Process of confirming the authenticity and accuracy of a person's identification documents, such as passports or driver's licenses.

Learn more

Identity Fraud

Identity Fraud: The deliberate use of someone else's personal information without their consent to commit crimes or fraudulent activities.

Learn more

Identity Fraud Detection and Prevention Software

Identity Fraud Detection and Prevention Software: A tool that identifies and prevents unauthorized use of personal information, mitigating the risk of identity theft and fraud.

Learn more

Identity Fraud Detection in Banking

Identity Fraud Detection in Banking: Process of identifying and preventing fraudulent activities involving the theft or misuse of personal information in banking transactions.

Learn more

Identity Graph

The Identity Graph is a database that associates and links individuals' data across different devices and platforms, creating a unified profile.

Learn more

Identity Proofing

Identity Proofing is the process of verifying a person's identity by collecting and validating their personal information and credentials.

Learn more

Identity Theft

Identity Theft: Unauthorized acquisition and misuse of personal information, such as social security numbers or bank account details, for fraudulent purposes.

Learn more

Identity Verification

Identity Verification: The process of confirming an individual's identity, often through the use of personal information, documents, or biometric data.

Learn more

Identity Verification Service Provider (IVSP)

An Identity Verification Service Provider (IVSP) is a company that offers solutions for confirming the authenticity and accuracy of individuals' identities.

Learn more

Image Capture Application

An Image Capture Application is a software program that enables users to capture, edit, and save images from various sources, such as cameras or scanners.

Learn more

Image Pre-processing

Image pre-processing is the initial step in image analysis where raw images are enhanced or transformed to improve their quality and suitability for further analysis.

Learn more

Image Processing

Image processing is the manipulation and analysis of digital images to enhance or extract useful information, using algorithms and computer systems.

Learn more

Image Quality Assessment (IQA)

IQA is the evaluation of the overall visual fidelity and perceived quality of an image, typically based on metrics and algorithms.

Learn more

In-browser SDK

In-browser SDK is a software development kit that allows developers to create and integrate web applications directly within a web browser.

Learn more

Indian IT Act (2000)

The Indian IT Act (2000) is a legislation that governs electronic transactions, data protection, and cybersecurity in India.

Learn more

Insider Trading

Insider Trading: Illegal practice of trading stocks or securities based on non-public information obtained by individuals within a company.

Learn more

Insurance Fraud

Insurance Fraud: Deliberate deception to obtain financial gain from insurance companies by submitting false claims or inflating the value of legitimate claims.

Learn more

International Monetary Fund (IMF) – Financial Integrity Group

The International Monetary Fund (IMF) - Financial Integrity Group is a department that promotes and monitors global financial integrity and transparency.

Learn more

Interpol

Interpol is an international organization that facilitates global police cooperation to combat crime, terrorism, and other cross-border threats.

Learn more

Invoice Fraud

Invoice Fraud is a deceptive practice where scammers create fake invoices or manipulate existing ones to trick individuals or businesses into making unauthorized payments.

Learn more

ISO Certifcation

ISO Certification is a globally recognized accreditation that certifies an organization's compliance with international standards for quality management systems.

Learn more

K

Know Your Customer (KYC)

KYC (Know Your Customer) is a process used by businesses to verify the identity and assess the risk of clients before engaging in a business relationship.

Learn more

Knowledge Based Authentication (KBA)

Knowledge Based Authentication (KBA) is a security method that verifies a person's identity by asking them questions only they should know the answers to.

Learn more

L

Liveness Detection

Liveness Detection is a biometric technology that verifies the presence of a live person by distinguishing real faces from fake ones.

Learn more

Loan Fraud

Loan Fraud: Deceptive practices involving misrepresentation or falsification of information to obtain a loan, often resulting in financial losses for lenders.

Learn more

Lottery or Prize Scam

Lottery or Prize Scam: a fraudulent scheme where individuals are deceived into believing they have won a lottery or prize, often resulting in financial loss.

Learn more

M

Machine Learning (ML)

Machine Learning (ML) is a branch of artificial intelligence (AI) that enables computers to learn from and make predictions or decisions without explicit programming.

Learn more

Machine Readable Zone (MRZ)

The Machine Readable Zone (MRZ) is a section on official documents, such as passports, that contains encoded personal information for automated scanning.

Learn more

Mail Fraud

Mail Fraud: A criminal offense that involves using the postal system to deceive or defraud individuals or businesses.

Learn more

Manual Review

Manual Review: A process of evaluating and analyzing information or transactions by human reviewers instead of relying solely on automated systems.

Learn more

Marketplace Fraud

Marketplace Fraud: Deceptive activities involving online marketplaces where sellers or buyers engage in illegal or dishonest behavior to manipulate or exploit the platform.

Learn more

Mobile Payment Fraud

Mobile Payment Fraud: Unauthorized or fraudulent transactions made using mobile payment platforms, exploiting vulnerabilities in mobile devices or payment systems.

Learn more

Mobile Proxy

A mobile proxy is a server that acts as an intermediary between a mobile device and the internet, allowing for anonymous and secure browsing on mobile devices.

Learn more

Money Laundering

Money Laundering: The illegal practice of making illegally-gained proceeds appear legitimate by disguising their true origin.

Learn more

Money Mule

A Money Mule is an individual who transfers illegally obtained funds on behalf of criminals, often unaware of their involvement in money laundering schemes.

Learn more

Mortgage Fraud

Mortgage Fraud: Deceptive practices involving misrepresentation or omission of information in a mortgage loan application for personal gain.

Learn more

Multi-factor Authentication (MFA)

Multi-factor Authentication (MFA) is a security measure that requires multiple forms of identification to access a system, providing an extra layer of protection.

Learn more

N

National Institute of Standards and Technology (NIST)

NIST is a federal agency that promotes innovation and industrial competitiveness by developing and applying technology, measurements, and standards.

Learn more

New Account Fraud

New Account Fraud is the act of creating unauthorized accounts using stolen or fabricated identities for illicit purposes.

Learn more

O

Office for Foreign Assets Control (OFAC)

OFAC is a U.S. government agency that enforces economic sanctions against foreign entities to protect national security and foreign policy interests.

Learn more

Office of the Comptroller of the Currency (OCC)

The Office of the Comptroller of the Currency (OCC) is a U.S. federal agency responsible for overseeing and regulating national banks.

Learn more

Omnichannel Verificaiton

Omnichannel Verification: A seamless and integrated process that verifies the identity of customers across multiple channels, ensuring a consistent and secure user experience.

Learn more

On Device Processing

On Device Processing: The execution of computational tasks and data processing directly on a device, such as a smartphone or computer, without relying on a remote server or internet connection.

Learn more

Onboarding

Onboarding is the process of integrating and familiarizing new employees with an organization, its culture, and their roles and responsibilities.

Learn more

Online Fraud (or Cyber Fraud)

Online Fraud (or Cyber Fraud) refers to illegal activities conducted on the internet with the intention to deceive or trick individuals or organizations for financial gain.

Learn more

Optical Character Recognition (OCR)

OCR is a technology that converts printed or handwritten text into digital format, enabling computers to recognize and process it for various applications.

Learn more

Organization for Economic Co-operation and Development (OECD)

The OECD is an international organization that promotes economic growth and social well-being through cooperation and policy recommendations among member countries.

Learn more

Out of Wallet Questions (OOW)

Out of Wallet Questions (OOW): Security questions used to verify a user's identity by requesting personal information not commonly known to others.

Learn more

P

P2P Fraud

P2P Fraud: Illicit activities that involve the fraudulent use of peer-to-peer (P2P) networks or platforms for financial gain.

Learn more

Passive Liveness Detection

Passive Liveness Detection is a method used to verify the authenticity of a user's identity by analyzing biometric traits without active user participation.

Learn more

Payment Services Directive 2 (PSD2)

The Payment Services Directive 2 (PSD2) is an EU regulation that aims to regulate payment services and promote competition and innovation in the market.

Learn more

Payroll Fraud

Payroll Fraud is the illegal manipulation of financial records or processes related to employee compensation, resulting in unauthorized gains for the perpetrator.

Learn more

Peel Chain

The Peel Chain refers to a blockchain scaling solution that enhances the performance and efficiency of transactions by using a multi-layered approach.

Learn more

Personal Information Protection and Electronic Documents Act (PIPEDA)

PIPEDA is a Canadian law that governs the collection, use, and disclosure of personal information by private businesses during commercial activities.

Learn more

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) refers to any data that can be used to identify an individual, such as their name, social security number, or address.

Learn more

Phishing

Phishing is a form of cyber attack where scammers impersonate trustworthy sources to deceive individuals into revealing sensitive information or performing malicious actions.

Learn more

Phone Risk

Phone Risk: The potential danger or negative consequences associated with using a mobile phone, such as distractions, privacy breaches, or exposure to harmful radiation.

Learn more

Piggybacking

Piggybacking refers to the act of unauthorized access to a wireless network by using someone else's internet connection without their knowledge or permission.

Learn more

Politically Exposed Person (PEP) Check

A Politically Exposed Person (PEP) Check is a due diligence process to identify individuals who hold high-profile positions and may pose a higher risk for corruption or money laundering.

Learn more

Pollination

Pollination is the transfer of pollen from the male part of a flower to the female part, enabling fertilization and the production of seeds.

Learn more

Ponzi Scheme

A Ponzi Scheme is a fraudulent investment operation that pays returns to existing investors using funds contributed by new investors.

Learn more

Predictive Analytics

Predictive Analytics is the practice of extracting information from data to forecast future outcomes or behavior, enabling informed decision-making.

Learn more

Presentation Attack Detection (PAD)

Presentation Attack Detection (PAD) is the process of identifying and preventing attempts to deceive biometric systems by using fake or altered data.

Learn more

Pyramid Scheme

A pyramid scheme is a fraudulent business model that recruits members through a hierarchical structure, where participants make money by recruiting others.

Learn more

Q

QR Code Scanning

QR Code Scanning is the process of using a mobile device's camera to scan and decode Quick Response (QR) codes, allowing users to quickly access information, websites, or perform actions.

Learn more

R

Red Flags

Red Flags: Warning signs or indicators of potential problems, risks, or suspicious behavior that should be carefully considered or investigated.

Learn more

Regulatory Reporting

Regulatory Reporting is the process of submitting accurate and timely financial information to comply with regulations set by governing authorities.

Learn more

Rental Scam

Rental Scam: A fraudulent scheme where individuals pose as landlords or agents to deceive potential renters, often requesting payment for fake listings or properties.

Learn more

RESTful API

A RESTful API is a web-based application programming interface that follows the principles of Representational State Transfer (REST).

Learn more

Return Fraud

Return Fraud: Unauthorized return or exchange of merchandise, typically involving stolen goods or fraudulent receipts.

Learn more

Risk Assessment

Risk Assessment: Process of identifying, analyzing, and evaluating potential risks to determine their impact on objectives and develop appropriate responses.

Learn more

Risk-Based Authentication (RBA)

Risk-Based Authentication (RBA) is a security method that assesses user behavior and potential threats to determine the level of authentication required.

Learn more

Romance Scam

Romance Scam: Fraudulent scheme where individuals manipulate emotions to deceive victims for financial gain.

Learn more

S

Sanctions List

A Sanctions List is a compilation of individuals, organizations, or countries subject to restrictions or penalties due to violations of international laws or policies.

Learn more

Sanctions Screening

Sanctions Screening is a process of checking individuals or entities against government lists to ensure compliance with regulations and avoid engaging in prohibited activities.

Learn more

Securities and Exchange Commission (SEC)

The Securities and Exchange Commission (SEC) is a government agency responsible for regulating and overseeing the securities industry in the United States.

Learn more

Securities Fraud

Securities Fraud refers to the illegal practice of deceiving investors by providing false information or engaging in manipulative activities in the securities market.

Learn more

Self-hosted API

A self-hosted API is an application programming interface that is hosted and managed by the user themselves, rather than by a third-party provider.

Learn more

Selfie Checks

Selfie Checks are verification processes that require individuals to submit a selfie as proof of identity or to confirm their physical presence.

Learn more

Shipping Fraud

Shipping Fraud: A form of fraudulent activity that involves deceiving individuals or businesses during the process of shipping goods, often resulting in financial loss.

Learn more

Sigma Fraud Score

Sigma Fraud Score is a numerical measure that assesses the likelihood of fraudulent activity based on specific indicators and patterns.

Learn more

Single Frame Liveness Detection

Single Frame Liveness Detection: A method that verifies the authenticity of an individual using a single image, ensuring they are physically present and not a spoof.

Learn more

Skimming

Skimming is a reading technique where one quickly glances over a text to get an overall understanding of the main ideas and key points.

Learn more

Sleeper Fraud

Sleeper Fraud: A deceptive scheme where fraudulent activity remains dormant or undetected until a later time, causing significant financial harm.

Learn more

Smishing (SMS-based phishing)

Smishing is a form of phishing where cybercriminals attempt to deceive individuals by sending malicious messages via SMS or text messages.

Learn more

SOC 2 Type 2 Controls

SOC 2 Type 2 Controls refer to the measures and safeguards implemented by organizations to ensure compliance with the SOC 2 Type 2 certification requirements.

Learn more

Software Development Kit (SDK)

The Software Development Kit (SDK) is a collection of tools and resources that enables developers to create software applications for a specific platform or framework.

Learn more

Spear Phishing

Spear Phishing: A targeted form of cyber attack where individuals or organizations are deceived into revealing sensitive information through personalized and deceptive emails.

Learn more

Sponsor Bank

A sponsor bank is a financial institution that supports and oversees the operations of a prepaid card program or other financial services.

Learn more

Spoofing

Spoofing is a fraudulent act of impersonating or masquerading as someone else in order to deceive or gain unauthorized access to information or systems.

Learn more

Suspicious Activity Report (SAR)

A Suspicious Activity Report (SAR) is a document used to report potentially illegal or suspicious activities to law enforcement agencies.

Learn more

Synthetic Identity Fraud

Synthetic Identity Fraud: A type of fraud where thieves create new identities by combining real and fake information to commit financial crimes.

Learn more

Synthetic Identity Theft

Synthetic Identity Theft: A form of identity theft where a new identity is created by combining real and fake information to commit fraudulent activities.

Learn more

T

Tax Fraud

Tax fraud is the illegal act of intentionally evading or manipulating tax obligations, such as underreporting income or inflating deductions, to avoid paying full taxes.

Learn more

Text Extraction

Text extraction is the process of extracting relevant information from text documents, such as extracting data from invoices or extracting keywords from articles.

Learn more

The Basel Committee on Banking Supervision (BCBS)

The Basel Committee on Banking Supervision (BCBS) is an international forum that develops banking regulations to promote global financial stability.

Learn more

The Joint Money Laundering Steering Group (JMLSG)

The Joint Money Laundering Steering Group (JMLSG) is a UK industry body that provides guidance on anti-money laundering and counter-terrorist financing measures.

Learn more

The Payment Card Industry Security Standards Council (PCI SSC)

The Payment Card Industry Security Standards Council (PCI SSC) sets security standards for the protection of cardholder data and promotes secure payment transactions.

Learn more

The Wolfsberg Group

The Wolfsberg Group is an association of global banks that works together to develop best practices for anti-money laundering and counter-terrorism financing.

Learn more

Thin File

Thin File: A term used to describe a credit report with a limited history, typically due to a lack of credit accounts or recent credit activity.

Learn more

Third-Party Identity Fraud

Third-Party Identity Fraud: The unauthorized use of another person's personal information by an individual or entity not directly involved in the original transaction or relationship.

Learn more

Transaction Filtering

Transaction Filtering is the process of identifying and sorting transactions based on specific criteria, such as type, amount, or time, for better organization and analysis.

Learn more

Transaction Monitoring

Transaction Monitoring is the process of tracking and analyzing financial transactions to detect and prevent fraudulent activities or money laundering.

Learn more

Travel or Vacation Scam

A travel or vacation scam refers to fraudulent schemes aimed at deceiving individuals when booking or planning their trips or holidays.

Learn more

Triangulation Fraud

A type of fraud where a scammer uses a third party to deceive and exploit a victim, often involving fraudulent transactions or communication.

Learn more

Two-factor Authentication (2FA)

Two-factor Authentication (2FA) is an additional layer of security that requires users to provide two different authentication factors to access an account.

Learn more

U

Unbanked

The unbanked refers to individuals who do not have access to traditional banking services or do not possess a bank account.

Learn more

Underbanked

Underbanked: Individuals or businesses with limited access to traditional banking services and rely on alternative financial solutions.

Learn more

Unstructured Documents

Unstructured Documents: Informal and disorganized files lacking a predefined structure, making them difficult to search, analyze, and extract information from.

Learn more

USA PATRIOT Act

The USA PATRIOT Act is a US law passed in response to the September 11 attacks, expanding surveillance powers to combat terrorism.

Learn more

User transactions

User transactions are a record of interactions and activities carried out by individuals on a platform, typically involving the exchange of goods, services, or information.

Learn more

V

Velocity Checks

Velocity checks are used to assess the speed at which something is moving or changing, ensuring it stays within predetermined limits.

Learn more

Vishing

Vishing is a form of phishing that uses voice communication, usually over the phone, to deceive individuals into providing sensitive information.

Learn more

W

Warranty Fraud

Warranty Fraud: Deceptive act of intentionally misrepresenting or falsifying information to exploit or abuse warranty claims for personal gain.

Learn more

Whaling

Whaling is a cyberattack method that focuses on high-profile individuals or executives, aiming to deceive them into revealing sensitive information or access credentials.

Learn more

Wire Transfer Regulations

Wire Transfer Regulations: Rules and guidelines governing the electronic transfer of funds between financial institutions.

Learn more

World Bank – Financial Market Integrity Unit

The World Bank - Financial Market Integrity Unit combats corruption and promotes transparency in global financial markets.

Learn more

Z

Zelle Fraud

Zelle Fraud refers to unauthorized and deceptive activities aimed at exploiting the Zelle digital payment platform for personal gain.

Learn more

Try It Yourself

Take a firsthand look at our our tried-and-true AI-powered products.

See Demos
Discover Our Solutions
Exploring our solutions is just a click away. Try our products or have a chat with one of our experts to delve deeper into what we offer.

Unlock More Insights

News

2022 Deloitte Technology Fast 500â„¢ Ranks Microblink Among Faste…

Esteemed group includes global, award-winning, SaaS company with industry-leading number of customer…

Read more
Blog

3 ways automated document verification software speeds up onboard…

Automated document verification software speeds up onboarding by reducing manual effort, improving a…

Read more
Industry Use Case

A guide to getting remote identity verification right

We live in an age where we have dozens, if not hundreds, of online accounts. They form a core link 

Read more
Explore Resources