Daon uses several different presentation attack detection technologies across our entire suite of products to maximize fraud prevention.
Liveness detection
During both the onboarding and authentication processes, Daon’s xProof, xAuth, and xFace applications employ multiple, patented and proprietary liveness detection technologies to ensure that the selfie is both live and of a real person – not a photo, digital image, video, or injection. By blocking the means of presenting a deepfake image, our applications effectively eliminate the threat.
Document validation
While AI-powered tools have been created that can produce incredibly realistic images of IDs, they are just that – images. Daon’s identity verification solution, xProof, uses various patented processes, from liveness detection techniques to AI-powered analysis for modifications to checking the data against third-party data sources, so you can be certain that each document is real, valid, and unaltered before allowing the onboarding process to continue. xProof can also scan NFC-embedded documents, offering an extra layer of defense and data accuracy.
Voice replay and synthetic audio detection
Voice channels are a favorite target of fraudsters, and the ability of a machine to sound like a human has significantly simplified this type of identity fraud. Daon offers multiple technologies to protect your contact center from these synthetic voice attacks. Our biometric voice authentication application, xVoice, leverages replay detection to ensure that the voice on the line is live and not a recording or other form of device playback. We also developed xDeTECH, which monitors every call for cues that a voice is synthetically generated. It can be deployed with xVoice or on any voice communication platform.
Cross-channel multi-factor authentication
Integration of Daon’s entire application suite provides the ultimate failsafe against deepfake and other AI-generated fraud. Even if a bad actor were to find a way to fool one of our fraud prevention systems, every point of interaction has a completely unique and independent second factor to prevent the attack. Our advanced approach even allows for cross-channel authentication factors. For instance, when authenticating on the voice channel, a contact center agent, or an IVR, could push an in-app authentication on the customer’s registered device, or even require a face scan, as a secondary or step-up factor. The ability to deploy a full spectrum of authentication factors on every channel renders the chances of fraudulent access nearly non-existent.