Know-Your-Customer

Do you know your customer?

Laws and regulations require organisations to know their customer. Are you allowed to do business with this person or organisation? Is this person the same as they claim to be? Does this organisation exist? Digidentity Know-Your-Customer (KYC) service identifies your customer in accordance with applicable laws and regulations. After successful identification, Digidentity can provide you with the verified identity evidence we received during identification. Our Verified Credential Report provides you with the KYC evidence required. Our remote identification solution offers your customer to perform the identification anywhere and anytime.

Scroll

KYC

Custom

eID Custom

Digidentity can identify your customer fit-for-purpose. Let us know which verified attributes you need. Contact us and select eID Custom.

eIDAS High

Digidentity identifies your customer in accordance with EU Regulation 910/2014 (eIDAS) level High

eIDAS Substantial

Digidentity identifies your customer in accordance with EU Regulation 910/2014 (eIDAS) level Substantial

Identification, Validation & Verification

Digidentity identifies your customer. We validate identity evidence using automated validation technology e.g cryptographic validation of identity documents. Digidentity also verify the identity attributes such as name and date of birth that you require to obtain. We use authoritative sources the confirm the identity attributes are correct e.g. an identity document issued by the government is considered an authoritative source.

Identification, Validation & Verification

Newsroom

News
  • Categories
  • Latest

News

Change of bank account number

As of November 2022, Digidentity has switched bank account number for customers. We respectfully want to ask our clients to update this data in your administration at your earliest convenience.  

Read More

Case Study

Shared Signals - Proof of Concept

Sharing signals is as old as civilization. What is new and important is deploying signaling systems that demonstrably improve the security of existing infrastructure.

Read More
01 - 00