Introduction
Device Risk Assessment (aka Device Blacklisting) flags devices that are known to be involved in criminal activities. This prevents fraudulent signup attempts and helps identify criminal activities.
How It Works
- During the eKYC process, the module references the devices's unique ID and cross-checks in with a database of known Device IDs involved in criminal activity.
- Device blacklisting can also be run when a user logs attempts to log in using a new device.
- If there is a match, the module will prevent the user from accessing the platform and notifies the company of a potential fraud threat.
- Blacklisted users can appeal the decision by conducting video verification or visiting a physical branch.
- During the appeal process, the user provides additional information to verify their identity and prove that they are not involved in criminal activities.
Benefits
- Device blacklisting does not affect the user experience of genuine customers.
- Device blacklisting is an easy way to dissuade fraud attempts — requiring fraudsters to spend resources to obtain "clean" devices for each sign-up attempt.
- The process is entirely automated, with manual intervention reserved for the review and appeal process
Return:
Innov8tif Wikipage