How Veridocs Enhances Your ID Authentication
These three technologies help you be certain
TrueAuthentication® goes beyond a barcode ID scan, using multiple light sources, data matching, and a vast domestic and global ID database to authenticate a document in seconds. Our ID authentication technology verifies the wide array of security features unique to a particular ID against our proprietary database of domestic and global identification, including passports, government IDs and state drivers’ licenses.
These three technologies help you be certain

Advanced communication technology allows users to quickly and securely authenticate the mobile driver's license (mDL) using a scanner. The technology allows patrons to reveal information necessary for entry, maintaining personal privacy.

Facial comparison technology matches the biometric features of an ID photo to the person’s facial features using a webcam to verify the individual’s identity who presented the ID. It decreases potential human error during an ID check.

Browser-based mobile application verifies IDs using a mobile device to extend ID management across the venue or for use in areas with limited space such as entryways and lobbies.

TrueAuthentication does so much more than a visual inspection ever can. Multiple light sources confirm advanced security features and a cross-match helps catch counterfeit IDs.
| ID Verification | ID Authentication | ||||
|---|---|---|---|---|---|
| Others | Veridocs with Evolution | ||||
| Visual Inspection | Barcode Scan | Mobile Scan | Veridocs Mobile Scan |
TrueAuthentication® | |
| Confirm UV and Infrared Security features | ![]() |
![]() |
![]() |
![]() |
![]() |
| Age Verification | ![]() |
![]() |
![]() |
![]() |
![]() |
| Image of ID | ![]() |
![]() |
![]() |
![]() |
![]() |
| Data for integration | ![]() |
![]() |
![]() |
![]() |
![]() |
| Watch list integration | ![]() |
![]() |
![]() |
![]() |
![]() |
| Data within Firewall | ![]() |
![]() |
![]() |
![]() |
![]() |
| Match barcode to other data | ![]() |
![]() |
![]() |
![]() |
![]() |
| Audit Trail | ![]() |
![]() |
![]() |
![]() |
![]() |
| Preferred by regulators | ![]() |
![]() |
![]() |
![]() |
![]() |
Let's connect to see how TrueAuthentication can protect your business. Contact us for more information or to schedule a demo.