How It Works

Have a transaction or person that might be risky?

Notify them with an embedded form, E-mail, SMS or a hosted link to complete a self-verification.



User informed of review and directed to Trust Swiftly to complete verification.



The user provides identity verification or completes dynamic requirements according to any risk scoring.



Identity data is securely transferred to the business for confirmation and automated processing.

Dynamic Verification Paths


Each user is unique, and the complexity of the verification should be adjusted according to your business. One verification insight might lead to complete trust while another could raise the user’s level of risk. With 15+ verification types, you should have the confidence to verify with the optimal method. No more declines or lost growth due to your existing fraud prevention system. A verification journey might be short for a good user, while a fraudster will require a longer one with a higher chance of an identity mismatch.

Verification Methods

Verifying ownership of a phone number through a one time code is vital to collect additional information about a user. Phone numbers provide a wealth of data, including line type, names, addresses, and carrier associated with it. Using data from a phone number is only useful if you verify that the number can receive the code and be confirmed by the user. Due to many breaches and publicly available data, most fraudsters know numbers that match their victims but might not be able to receive a code sent to verify ownership. Blocking VOIP numbers such as Google Voice and Skype can also be enabled for extra protection.
Verify access to an email to confirm a user's identity. The email address provides critical information such as domain and estimated creation date. This information is essential to check if a user has a newly created mailbox, which tends to be a sign of a fake account. It can also be used as a backup verification method for private individuals who might be using a false address to prevent unwanted mail.
Verifying a real ID is another method to confirm a user's authenticity. Collect and check any ID worldwide through a secure upload tool. An ID might confirm a user's name and address. This information should be securely stored and helps prevent repeat fraud due to the difficulty to obtain. Another option is only to extract public information from the document to use for verification.
Verifying a user's liveness using a selfie with live video actions confirms your user matches an ID. More advanced fraudsters can bypass simple ID checks using fake or stolen information. Analyzing biometrics of a selfie can be a strong defense against forged documents.
Verifying a document such as a utility bill can further confirm a user's name and address. This option allows users a secure and straightforward method to share unique documents with your team. Automatically detect attributes and create rules to allow for verification.
Verifying a PayPal account protects against unauthorized charges and provides trusted information about a user. PayPal's long history and usage across the web make it a fast and easy method for users to verify their identity. Leverage the extra data to make decisions about a user with simple integration.
Verifying a user's information held at banks is another secure source to ensure the user is real. Obtain information securely, such as name, address, and phone from banks to correlate it with additional identity information. The user can complete the verification by connecting to their bank and only sharing their identity.
Verifying a user by their voice is another fast and private method to complete identity verification. Many fraudsters do not want their voice heard, and it can be another way to prevent and track more advanced fraud.
Verifying a user's credit card through a 3DS2 authenticated charge amount is reliable for confirming the user's ownership of the card. Quickly check SCA for risky transactions that weren't previously protected. This method validates the user has access to the card owner's banking account and if the card meets a liability shift requirement from the bank. The compromise of this verification method is difficult and allows for minimal sharing of data by the user.
Verify a person's identity with a live video chat session. Require multiple actions to confirm authenticity and connect securely over a scheduled interview appointment. This verification is not possible to spoof and used by companies such as Amazon and Upwork to verify their customers.
Verify a person's location using network signals and their device to get their most accurate location. This can be useful to detect fraudsters that are using VPNs and proxies to hide their true location.
Verifying users' social profiles such as Facebook, Twitter, and Google are other fast ways to confirm authenticity. Social profiles are typically simple to create, but the behavior on the platform takes time to create. Verifying their profile exists while limiting any access is another automated verification solution to confirm users.
Verify a user's ability to receive a physical letter with a code to confirm their home location. This is a rare verification method only used for extreme cases, such as a long term high net worth transaction.
Verify a user with the power of a friction-less redirect to a reCAPTCHA confirmation page. This verify method is passive and can be used to stop automated attacks by checking if the actions are automatic. Add reCAPTCHA analysis without any coding by leveraging Google's advanced detection capabilities.
Verifying a user's ability to use an authenticator is another method to check a user without implementing the complexity of the tool. Confirming they can enter the code from their 2FA device ensures they are real and prevents bot signups. The authenticator can also be used for the dynamic verification of high-risk transactions. Businesses that require following regulations such as PSD2 can also use the verification for withdrawal verification.
Verify a signature through a digital signature pad to agree to your own terms. Signatures can be verified against an ID or used later to proove the identity of the user.
Verify a custom set of questions or forms that your business creates. Create a seamless onboarding process by collecting unique and secure challenge responses.
Verify a U.S. social security number (SSN) against a real name to check authenticity and matching checks from a database. Multiple datapoints can be used to verify names and addresses from trusted sources.
Verify a user owns a specific address before transacting with them using Web3 wallet verifications. Useful to ensure you trade with the rightful owner and AML checks are made against the address.
Verify a user through a a passwordless device with biometric capabilties. Speed up repeat verifications by ensuring the user is the same identity verified during the intial signup. Stop bot attacks by requiring a physical verification step that detects emulators and jailbroken devices.
Verify user with additional review of all identity information collected. Enhance reviews further with database research and analysis of any automated verification tasks.

Secure global identity verification that scales with zero overhead.

Trust Swiftly provides a central and dynamic platform to verify your users no matter your size or attacks faced.

  • Rapidly respond to threats with dynamic verification
  • Uncover existing fraud and identify patterns of bad users
  • Global coverage allowing for growth without security compromises
  • Compliance with privacy regulations using cost-effective solutions

Stop fraud before it becomes a problem by only targeting the bad guys.

Dynamic friction is critical to staying ahead of your competition while keeping fraudsters at bay. Identify bad users quickly by requiring additional verification. Putting good users in the fast lane and higher risks in further checks will create an environment that is safe for everyone. Synthetic identities, friendly fraud, chargebacks, and more all become things of the past with Trust Swiftly.