Know-Your-Customer

Do you know your customer?

Laws and regulations require organisations to know their customer. Are you allowed to do business with this person or organisation? Is this person the same as they claim to be? Does this organisation exist? Digidentity Know-Your-Customer (KYC) service identifies your customer in accordance with applicable laws and regulations. After successful identification, Digidentity can provide you with the verified identity evidence we received during identification. Our Verified Credential Report provides you with the KYC evidence required. Our remote identification solution offers your customer to perform the identification anywhere and anytime.

Scroll

KYC

Custom

eID Custom

Digidentity can identify your customer fit-for-purpose. Let us know which verified attributes you need. Contact us and select eID Custom.

eIDAS High

Digidentity identifies your customer in accordance with EU Regulation 910/2014 (eIDAS) level High

eIDAS Substantial

Digidentity identifies your customer in accordance with EU Regulation 910/2014 (eIDAS) level Substantial

Identification, Validation & Verification

Digidentity identifies your customer. We validate identity evidence using automated validation technology e.g cryptographic validation of identity documents. Digidentity also verify the identity attributes such as name and date of birth that you require to obtain. We use authoritative sources the confirm the identity attributes are correct e.g. an identity document issued by the government is considered an authoritative source.

Identification, Validation & Verification

Newsroom

News
  • Categories
  • Latest

News

Renewal of Authorizations

Authorisations are an essential part of eHerkenning. To guarantee continuity of your business and workflow, it is important that authorisations are renewed on time. Continue reading to learn more.

Read More

Case Study

Shared Signals - Proof of Concept

Sharing signals is as old as civilization. What is new and important is deploying signaling systems that demonstrably improve the security of existing infrastructure.

Read More
01 - 00