Common scenarios
This section introduces you to the common scenarios for ID Network.
Typical application scenarios of ID Network include discovering identity fraud groups and duplicate authentication performed by the same person during online authentication, as well as discovering of batch attacks and other behaviors during face login and payment processes.
Online identity verification
When performing an online real-person authentication, users will need to upload their ID photos, take selfies, and submit a series of identity information. Using ID Network, the information submitted by users can be compared with the historical information previously collected during the identity authentication process, as well as detect in real-time whether there is identity fraud risk. If a risk is detected, businesses can choose to intercept the authentication attempt or introduce a secondary manual review.
Offline risk inquiry
Offline risk query identifies possible identity fraud risks by comparing the relationship between a specific record and a historical record. Specific risk types are the same as the real-time risk query types in an online authentication scenario.
Since offline risk query takes a shorter amount of time for ID Network to return results, the scope of risk query can be expanded. When the size of historical data is large, the time spent to retrieve a database is longer. During the real-time processes for eKYC, this can have a great impact on the user experience. In cases like these, offline risk query can be performed instead.
It is recommended to use a combination of real-time query and offline query to check for recent fraud risks during the real-time business processes. Once the process is complete, for users who are deemed to be high-risk, an additional layer of offline risk detection can be performed.