Selfie and ID card verification for onboarding

Access & Identity Management Handbook 2022 Editor's Choice, Access Control & Identity Management, Integrated Solutions

Using your mobile device to identify yourself, open accounts and streamline the onboarding process in businesses has been spoken of in the past, but become a reality over the past few years. The question that remains, however, is how reliable ‘selfie onboarding’ is, especially when opening a bank account and registering for other sensitive applications – such as voter registration.

A new player in this market, a market which had about US$4 billion invested in it in 2021, is Trustmatic. The company has turned the onboarding process into a Software-as-a-Service (SaaS) business model, where the application and primary processing is done in a secure cloud environment. Naturally, the company has iOS and Android apps available for people to download and use in their verification process.

Donal Greene, founder and CEO of Trustmatic spoke to Hi-Tech Security Solutions about the company and its solution, including why it’s onboarding process has a 97% completion rate as opposed to the average of around 67%. (One of the reasons is because the end user has very little to do as almost everything is automated.)

Government-quality identity to the enterprise

Greene’s background has been in the biometrics world for many years where he assisted in government identity projects in over 80 countries – he spent six years as the head of EMEA for Innovatrics. He launched Trustmatic with the goal of bringing the same quality and reliability used in government identity projects to the enterprise.

This goal is achievable today now that technology available to everybody has advanced to the stage where remote authentication is reliable. However, the costs can become significant if organisations decide to use on-premises solutions, hence the Trustmatic SaaS model, which reduces costs significantly without compromising on accuracy. The full solution from Trustmatic is cloud-based, meaning there are no individual modules or ID formats to buy. (Of course, the mobile app is on the user’s device, but it is free and uses the cloud for verification and secure data storage.)

The SaaS model also means the solution is affordable for large enterprises or small, as the companies pay a per transaction fee.

The solution has been adopted in various countries (including in the Middle east and Africa where Trustmatic has a presence in Uganda), in the organisations one would expect to be interested in this technology, like banks and telcos. However, an interesting market the company has also found traction in is the sharing economy – such as ride sharing or rentals etc.

Less than a minute

As noted, the onboarding process has been made as simple as possible to avoid failures in registration as well as people simply giving up because the process is to complex or burdensome.

It starts with the user downloading the app and registering for something, such as a bank account. The first thing that happens is the app asks for a scan of the person’s identity card. Unlike most apps where the user must move their phone to place the card in a box on the screen, they simply hold their camera over the card. The AI algorithm identifies the corners of the card, checks the image for lighting, glare, focus and so on and when the image is clear enough to use, takes a picture automatically. This automatic process avoids the user having to move their device up and down and worry about shadows and lighting etc., resulting in significantly fewer failures.

At the same time the app makes some on-the-fly fraud checks by checking the machine-readable zone (MRZ) and finding many of the hidden features used on real ID cards. If these checks fail, the card is not captured. Once captured it is then sent to the server for more processing.

Another user-friendly feature is that the user is not required to enter what type of ID card is being used. The system has over 1000 different ID cards on file (increasing all the time, as Trustmatic is able to add in new cards or formats with ease) and it automatically identifies which identity document it is.

Cards with NFC chips can also be read by holding them to the back of the mobile device (if it has NFC enabled) and the app extracts the user detail and image from the chip – which is really the only 100% reliable way of getting this information remotely.

Once on the server, optical character recognition (OCR) is run to extract the user data and image (assuming it is not read from a chip) and more checks are made to ensure the card is not a fraud – such as checking the hologram etc. This is all captured in a file which will be sent to the client once the process is complete.


Live faces only

The next step is to capture a facial image of the user. Again, to make it simple, all the user has to do is put their face in a circle on the screen and the automatic processing captures the image when it detects the face and lighting conditions, among other checks, allow for capturing an image of high enough quality for facial recognition algorithms. In addition, passive liveness detection is used to make sure the image is a real, live person not a photo or video.

Passive liveness means the AI uses various mechanisms to check for liveness without user interference. Active liveness detection would be asking the user to do something (like smile) to ensure the image is real. This has been used in many apps in the past (and still is in some cases), but modern spoofing technology can fake even facial movements.

Greene says the whole process takes less than 60 seconds. Moreover, as mentioned above, the simplicity involved for the user means Trustmatic has a 97% completion rate for its registration and/or onboarding process, well above the average in these types of applications of 67%. Customers pay Trustmatic per transaction and Greene says the costs, due to the SaaS model, are 30% to 50% cheaper than other options.

The most secure algorithms

Trustmatic does have some of its own algorithms for facial recognition and ID card verification, but Greene explains that the solution is ‘algorithm agnostic’. It makes use of the best algorithms available to ensure it produces the best results, including a combination of core technologies from Innovatrics. For example, the FaceTrust API is powered by the Innovatrics algorithm, top-ranked globally in the NIST (National Institute of Standards and Technology) Facial Recognition Vendor Test. Of course, this depends on the use case. A bank would want the best technology to ensure the highest accuracy, while other customers may be happy with less.

Trustmatic’s solution is in use at high-security sites in the Middle East as well as in schools where attendance is recorded and the management wants to know if unknown persons enter the premises. In an access control scenario, staff and visitors or contractors can register remotely via their mobile devices and obtain easier access. This is simply accomplished by storing their facial image on the company’s database and then using images from a surveillance camera to verify they are allowed onsite – opening the door automatically. If the face is not recognised the door won’t open and they will be directed to a reception area, or a security guard can be alerted.

The SaaS model allows Trustmatic to offer a flexible solution that can be adapted to almost any organisation’s processes, offering a reliable onboarding and verification process that can be tailored to various situations.

Greene admits that the market for digital onboarding is becoming increasingly crowded, making it difficult for organisations to find the right remote identity verification partner. The key, he says, is to look in-depth at the technology being used:

• Can it be customised and scaled?

• Has it been benchmarked and certified?

• Will it be compliant with local data, financial and anti-money laundering regulations?

• Is the technology user-friendly and intuitive?

The most important element he says, is to adapt technology to humans and to efficiently address digital age business needs.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.