KYC parameters

In Bynn’s system, you can configure KYC (Know Your Customer) levels to match your business needs. Choose from default presets or fine-tune settings with customizable parameters to balance security, compliance, and user experience. Adjust key factors such as FRR (False Rejection Rate) and FAR (False Acceptance Rate) to optimize throughput while minimizing fraud risk. Whether you prioritize maximum security or seamless onboarding, Bynn gives you full control to fine-tune identity verification based on your industry, region, and risk tolerance.

KYC Level Settings

  1. Navigate to Settings > Product Settings (Identity Verification).
  2. Here, you will find KYC Level Settings, where you can create and edit KYC levels to tailor your customer verification process to your specific needs.
  3. You can either send all applicants to a single KYC level or use a risk-based approach, assigning levels based on factors such as country, general profile, and risk assessment.

💡

Need help?

Our support team can assist you in setting up KYC levels for your business.

Default KYC Presets

By default, Bynn provides four preset KYC levels to help you get started:


Name

Description

Security

FRR (FAR)

Boost Onboarding

Streamlined identity verification to onboard more users with minimal friction. Focus on growth and user experience while meeting compliance requirements. Ideal for businesses that prioritize customer conversion, reducing drop-off rates, and faster onboarding without compromising basic security checks.

Low
(risk of false approvals - but high passthrough)

<0.1% (<5%)

Enhanched Growth Compliance

Built to protect your business and users with additional fraud prevention tools while maintaining a seamless onboarding experience. Minimize risks without compromising growth. Recommended for businesses balancing moderate regulatory obligations with a focus on efficient user acquisition.

Balanced Medium

c:a 0.56% (<4%)

Smart Secure KYC

Balance user conversion and security with biometric checks and enhanced fraud detection. Convert users faster while ensuring secure and compliant identity verification. Suitable for businesses scaling rapidly but needing to protect against basic fraud risks without slowing down onboarding.

Balanced High

c:a 0.7% (<2%)

Fraud Shield

Maximum fraud protection and compliance for businesses operating in high-risk or highly regulated sectors. Advanced tools ensure your enterprise can onboard users securely and mitigate fraud at scale. Perfect for businesses that need to stay ahead of fraudsters, meet complex regulatory requirements, and secure large-scale operations.

High (risk of false rejections - but very secure)

< 2% (<0.5%)


What is FRR (False Rejection Rate) & FAR (False Acceptance Rate)?

  • False Rejection Rate (FRR): The percentage of legitimate applicants who are incorrectly rejected by the AI identity verification system. A high FRR can lead to poor user experience, as valid users may struggle to verify their identity.
  • False Acceptance Rate (FAR): The percentage of unauthorized applicants who are mistakenly accepted as legitimate. A high FAR increases security risks by allowing fraudulent individuals to pass verification.

Balancing FRR and FAR is crucial in AI verification systems to ensure both high security and a seamless user experience.

⚠️

Important

While we provide a baseline configuration, adjusting even one of hundreds of available parameters will impact both FRR and FAR. There is no universal “one-size-fits-all” setting—optimal accuracy requires ongoing tuning based on your specific risk tolerance, industry, and user base.

We recommend starting with our default presets, which serve as an excellent foundation for general e-commerce businesses. However, different industries and geographic regions may require adjustments based on fraud patterns and regulatory requirements. To achieve maximum throughput and minimal risk, we highly encourage gradual adjustments and continuous optimization as you scale.

Maximum Passthrough – Want to Onboard Every Applicant?

No problem – you’re in control. Configure the system to send "rejected" applicants for manual review or automatically accept them with a different risk category. Adjust the settings to fit your needs while maintaining security and compliance.


Parameters

ParameterDescription
Data Processing Consent LinkSpecify a custom URL for the data processing consent page. If left blank, the system will use the default link provided by the platform.
Data Processing Consent TextProvide custom text for the data processing consent agreement. If not specified, the default consent text will be used.
WebSDK Return URLDefine the URL where applicants are redirected upon completing the verification process via the WebSDK. If left empty, a default 'Thank You' page will be displayed. You can also dynamically pass the return URL in the WebSDK for flexible routing.
Mobile Phone Verification EnforcementEnforce that the verification process is completed on a mobile device. This enhances security by leveraging mobile-specific sensors, though it may exclude users without smartphones.
United States Residency RestrictionsAutomatically disqualify applicants who indicate residency in the United States. This bypasses the verification process for USA residents.
Automatic TranslationEnable automatic translation of the KYC application into the applicant's preferred language for enhanced accessibility.
Data Retention OverrideEnable a custom data retention period specifically for this level, overriding the default retention policy set at the account level.
Data Retention TimeSpecify the custom duration for retaining data once the override is enabled. This setting determines how long data will be stored before deletion.
Name SourceChoose the source for the applicant's name: either manually provided by the applicant/API or automatically extracted from the applicant’s ID documents.
AI Decision EngineActivate the AI-powered decision engine that automates the approval or rejection of applications, enhancing efficiency, accuracy, and consistency.
Decision Engine TypeSelect the specific AI decision engine model to use for processing applications. This determines the logic and parameters applied during decision-making.
Decision Engine Uncertain TypeDefine how the system should handle cases when the AI decision engine is uncertain about the outcome, including fallback procedures or additional review steps.
Custom Session ExpirationSpecify a custom expiration time for verification sessions. By default, sessions expire after 24 hours if not completed. Adjust this period as needed.
Session Expiry Time HoursDefine the duration (in hours, between 1 and 8760) for which a verification session remains valid before it expires.
Capture ID DocumentsEnable the collection of ID documents from applicants and trigger the verification process to authenticate the submitted documents.
Age RestrictionsAutomatically reject applicants who do not meet the legal age requirement (typically 18 or 21 years old) based on their country or state of residency.
Minimum Residual ValiditySet the minimum remaining validity period required for ID documents to ensure they are current and acceptable for verification purposes.
Minimum Residual Validity MonthsDefine the minimum number of months that an ID document must remain valid to be considered acceptable for verification.
Enforce Live CaptureForce applicants to capture ID documents in real time using their device's camera. This minimizes the risk of using pre-edited or fraudulent images.
Live Capture MethodSelect the mode for live document capture. Options may include direct camera capture or guided photo capture to ensure document authenticity.
Live Capture Fallback MethodConfigure an alternative method to be used if live capture fails, ensuring that document submission can still be completed.
Document TypesSelect the acceptable types of ID documents (e.g., passport, driver’s license, national ID) for verification. This limits submissions to supported document types.
Camera Capture QualityChoose the quality level for camera captures. Higher quality improves fraud detection and forensic analysis but may require increased bandwidth and storage.
Liveness CheckEnable liveness detection (anti-spoofing) to verify that the applicant is physically present. This feature detects and blocks AI-generated images, deepfakes, or other fraudulent attempts.
Liveness Check TypeSelect the liveness detection model to employ during the verification process. This defines the specific anti-spoofing method applied.
Record Audio and VideoEnable recording of audio and video during the verification session. This provides a comprehensive record for forensic analysis and helps detect fraudulent document submissions.
Capture BiometricsConfigure settings for capturing biometric data (e.g., facial recognition, fingerprints). This ensures compliance with regulations while improving security and fraud detection.
Capture Biometrics TypeSelect the method for capturing and processing biometric data. Options may vary based on the security requirements and available technology.
Fraud Forensic AnalysisActivate AI-driven fraud forensic analysis to scrutinize documents for signs of forgery, manipulation, or tampering, enhancing overall verification security.
Synthetic Identity ProtectionAutomatically reject applications when biometric data matches but the provided personal information does not correspond with that on the submitted document, preventing synthetic identity fraud.
Automatic Image Quality AssessmentAutomatically assess the quality of submitted images and flag or reject those that do not meet predefined standards, ensuring clarity for accurate verification.
Image Quality HandleDefine the process for managing low-quality images. Options may include prompting the applicant to resubmit or applying automated enhancements before processing.
AI-Generated Content DetectionEnable detection of AI-generated content (e.g., deepfakes) in images and videos. This advanced (beta) feature automatically rejects media that appears artificially generated.
Document Type IdentificationAutomatically verify the document type and country of origin using an extensive template database. Documents that cannot be identified are rejected.
Visual Zone Verification (VIZ)Analyze the critical visual elements of an ID document. If the Visual Inspection Zone (VIZ) cannot be accurately processed, the document will be rejected.
Machine Readable Zone Verification (MRZ)Validate the Machine Readable Zone (MRZ) of the ID document. Documents with unreadable or unprocessable MRZ data are automatically rejected.
Barcode ReadingEnable barcode reading to extract data from 1D or 2D barcodes. Documents with unreadable or inconsistent barcode data will be rejected.
NFC VerificationUtilize NFC verification to read embedded data in e-Passports, e-IDs, and e-DLs. If the NFC data cannot be read or verified, the document may be flagged or rejected.
NFC HandleDefine procedures for handling NFC verification failures. Options include prompting for a rescan, falling back to another method, or rejecting the application.
Lexical AnalysisAutomatically process and standardize text from documents. Documents that fail to be analyzed, transliterated, or converted into a standardized format will be rejected.
Date ValidationPerform thorough checks on document dates, including expiry, issue, and format validation. Documents with inconsistent or invalid date formats are rejected.
Cross ValidationConduct cross validation across multiple data sources (MRZ, VIZ, barcode, RFID) to ensure consistency. Documents with significant mismatches are rejected.
Data Presence CheckAutomatically verify that all mandatory data fields are present on the document. Documents missing required data are rejected.
Deprecated Blanks DetectionEnable detection of outdated or deprecated document templates. Documents identified as no longer valid for use are automatically rejected.
Hologram CheckActivate hologram verification to ensure that the document includes a valid hologram. This advanced (beta) feature flags or rejects documents without proper holograms.
Hologram HandleDefine the action to take when hologram verification fails, such as prompting for resubmission, flagging for review, or automatic rejection.
Copy DetectionEnable detection of duplicate or non-original documents. Documents identified as copies (either soft or hard) are rejected to ensure authenticity.
Screenshot CheckDetect and reject documents submitted as screenshots or directly captured from digital devices, ensuring only original, physical document scans are accepted.
Textual Data ValidationValidate the formatting of textual data on documents (including font, spacing, and color). Documents failing these standards are rejected.
Barcode Format CheckExamine the format, type, and content of barcodes on documents. If the barcode is missing or does not meet required standards, the document is rejected.
Security Feature CheckVerify that all required security features (such as microprinting or watermarks) are present and meet specified criteria. Documents lacking these features are rejected.
Document Number FormatEnsure the document number is correctly formatted and matches expected patterns. Documents with an incorrect document number are rejected.
Personal Number CheckValidate the format and check digits of personal identification numbers on documents. Documents that do not pass validation are rejected.
IPI Presence CheckPerform an advanced check for Invisible Personal Information (IPI) within the document image. Documents failing this check are rejected.
LASINK™ Photo CheckEnsure the document's portrait is printed using LASINK™ technology. This advanced check rejects documents that do not incorporate the required secure printing method.
Biometric Portrait ComparisonCompare the portrait on the document with multiple biometric sources (e.g., main image, ghost image, NFC data, liveness selfie). Mismatches result in rejection.
Document LivenessEnable dynamic liveness detection to ensure the document exhibits valid, live security features. Failure of this check results in rejection.
Fraud IntelligenceUtilize advanced AI and network data to assess fraud risk in real time, thereby enhancing the security and reliability of the verification process.
Network Document FraudAutomatically reject documents that are flagged by the fraud intelligence network based on known fraudulent patterns.
Biometrics MismatchDetect and reject biometric data that does not match previously verified identities, preventing the reuse of biometric information across different individuals.
Risky BehaviourFlag or reject applications when indicators of risky or fraudulent behavior are detected based on network activity or historical data.
Device ActivitiesMonitor device activity during verification. Devices with a history of suspicious or risky behavior may be flagged or rejected.
Device Activities HandleDefine the response for suspicious device activity, which may include manual review, additional verification steps, or outright rejection.
Phone Online PresenceEvaluate the online presence of the applicant’s phone number. Numbers lacking associated messaging apps or web service links may trigger additional scrutiny.
Phone Online Presence HandleSet procedures for addressing phone numbers with limited online presence, which might include extra verification or manual review.
Phone PII MismatchCompare phone-linked data with the applicant’s provided identity information. Discrepancies may trigger a rejection or flag the application for further review.
Phone PII Mismatch HandleDefine the process for managing discrepancies between phone-associated personal information and the submitted identity data.
Phone Biometric AnalysisPerform biometric analysis on phone-linked images (such as social media profile pictures) and compare them with the ID document. Mismatches can lead to rejection or flagging.
Phone Biometric Mismatch HandleEstablish guidelines for handling cases where biometric data from phone sources does not match the ID documents, which may include additional checks or rejection.
Disposable Phone DetectionDetect the use of disposable or virtual phone numbers. Applications using such numbers may be flagged for further review or automatically rejected.
Disposable Phone HandleDefine the actions to take when a disposable phone number is detected, such as additional verification or outright rejection.
SIM Swap DetectionEnable detection of SIM swap attacks by identifying phone numbers with suspicious porting histories. Such cases can be flagged or rejected.
SIM Swap HandleSpecify the procedure for handling suspected SIM swap incidents, including additional verification steps or rejection.
Email Biometric AnalysisPerform biometric analysis on email-associated profile pictures and compare them with the ID document. Inconsistencies may trigger flagging or rejection.
Email Biometric Mismatch HandleSet guidelines for managing cases where email biometric data does not match the provided identity information.
Disposable Email DetectionDetect disposable or temporary email addresses. Applications using such emails may be flagged for extra review or rejected outright.
Disposable Email HandleDefine the process for handling disposable email addresses, including additional verification measures or rejection.
IP Privacy DetectionIdentify cases where the applicant’s IP address is masked via VPNs, proxies, or Tor networks. Such instances may trigger rejection or additional checks.
IP Privacy HandleSet procedures for managing masked IP addresses, which may include manual review or further security checks.
IP Geolocation IntelligenceCompare the geolocation of the applicant’s IP address with the claimed country. Discrepancies can result in the verification being flagged or rejected.
IP Geolocation HandleDefine the response when IP geolocation does not match the applicant’s claimed country, including additional verification or rejection.
Behavioral AnalysisMonitor user interactions such as mouse movements, keystroke dynamics, and browsing patterns. Anomalies in behavior may trigger further verification or rejection.
Behavioral Analysis HandleEstablish procedures for addressing suspicious behavioral patterns detected during the verification process, which may include extra security measures or rejection.
AML ScreeningEnable AML screening by cross-checking applicant data against global sanctions lists, politically exposed persons (PEP) databases, and adverse media sources.
Ongoing Monitoring FrequencySet how frequently the system should perform AML re-screening on the applicant to capture any new risk indicators.
Matching SensitivityAdjust the strictness of the identity matching process. A higher sensitivity enforces stricter matching criteria, reducing false positives at the risk of false negatives.
Influential Role MatchDefine how to handle matches with individuals in influential roles, such as Politically Exposed Persons (PEPs) or their close associates, which may require additional review.
Sanctioned MatchSpecify the response when an applicant is matched with an entity on global sanctions lists, which may include automatic rejection or manual review.
Crime MatchDetermine the process for handling cases where an applicant is linked to criminal activities as identified by matching against criminal databases.
Wanted MatchDefine the procedure for managing matches with individuals on international wanted lists. Such matches may require immediate rejection or further investigation.
Military Officers MatchSet guidelines for handling matches with high-ranking military officers, considering the sensitivity and special processing these cases may require.
Debarred Individual MatchSpecify how to handle cases where an applicant matches individuals barred from specific professions or activities, ensuring regulatory compliance.
Adverse Media ScreeningActivate adverse media screening to search global media sources for negative news associated with an applicant. This advanced check helps identify potential risks not captured in standard databases.
Adverse Media HandleDefine the action to take when adverse media screening returns a match, such as manual review, additional verification, or rejection.
  • These presets are fully adjustable—you can modify requirements such as ID verification, proof of address, and biometric checks to ensure compliance and security.
  • You can also create new KYC levels to fit your unique business needs.
  • Each level has a unique identifier displayed next to it. Use this Identifier in your SDK or API requests to direct applicants through the appropriate KYC workflow.

💡

Need help?

For further assistance, contact Bynn Support to optimize your KYC workflow! 🚀


Article

Ever had a legitimate customer blocked by your KYC system even though they were who they claimed? That’s an example of a false rejection. Or worse, imagine a fraudster slipping through as a verified user – a false acceptance.... read more