User verification check results

Review and manage ID verification, proof of address, watchlist screening, and many more check results in a single place.

On the Verification tab, you can review statistics on user verification (KYC).

Not all sections described below may be available, as it depends upon the verification level settings and checks passed by the applicant.

Summary

Summary provides you with the core information about the applicant level and allows you to quickly navigate through the completed steps, rejection reasons, checks, and regulations.

In this section, you can also manage the current verification level. For more information on how to create and edit verification levels, see this article.

Events

Events show the sequence in which applicant profiles are processed. For example, each time an email or SMS is sent to the applicant, a new document is uploaded, the applicant is declined or approved, and so on, a dedicated event is saved and displayed as a reference. You can also view the applicant’s creation date in this section.

Workflow runs

The Workflow runs tab shows the applicant’s verification journey, including all completed steps and their current status. This helps track where the applicant is in the process, as long as they belong to a workflow. For more information on Workflow Builder, see this article.

Notes

Notes help you preserve and share information (or memos) that you or Sumsub support operators may have saved to emphasize important aspects related to the given applicant. For example, when we decline an applicant as a possible PEP, and you decide to approve this applicant, you can let us know about your decision by leaving a note. Tags and file attachments can also be added to a note to provide context and supporting information.

Fraud segmentation notes

Fraud segmentation notes are system-generated records stored in the Notes section to provide an additional layer of information regarding rejection reasons. Each note includes the following information:

  • Identification number of modified image (video)
  • Fraud type (category)
  • Affected security features
  • Alteration characteristics
📘

Note

  • Fraud segmentation notes are visible only to Dashboard users with the Admin role.
  • You can edit and delete fraud segmentation notes, but you cannot assign them to applicant profiles manually.

Below you can find detailed information on each fraud category, outlining the associated security features, applicable document types, and specific signs of alteration.

Print Layer

Print layer fraud refers to various techniques used to imitate advanced printing-based security features.

Expand to review a lisf of print-layer security features and associated fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Microtext

  • PoI
  • PoA (PoI as PoA)
  • Replaced with fake low-resolution text

  • Micro-lines printed as blurry patterns or raster dots

  • Text unreadable under magnification

Guilloche Patterns

  • PoI
  • PoA (PoI as PoA)
  • Imitated using graphic software — visible line breaks

  • Incorrect symmetry

  • Repetitive noise patterns

Micro-images / Hidden Graphics

  • PoI
  • PoA (PoI as PoA)
  • Missing or replaced with bitmap copies

  • Fake details without micro-level precision

Optically Variable Ink (OVI)

  • PoI
  • PoA (PoI as PoA)
  • Reproduced with metallic paint or gradient fills

  • Don’t change color when tilted

UV / IR inks

  • PoI
  • PoA (PoI as PoA)
  • Missing fluorescence

  • Incorrect color tone

  • Uniform glow

  • Simulated with digital overlay

Material

Material fraud involves the falsification or replacement of the document’s base material and integrated security components, compromising structural and physical authenticity.

Expand to review a list of material security features and associated fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Polycarbonate / Laminated Layers

  • PoI
  • PoA (PoI as PoA)
  • Document printed on plain plastic

  • Document printed on photo paper

  • Covered with adhesive film or tape

  • Visible lamination edge or bubbles

Embedded Fibers / Security Threads

  • PoI
  • PoA (PoI as PoA)
  • Completely missing

  • Imitated with printed colored lines on paper

  • No reaction under UV light

Laser / Tactile Perforation

  • PoI
  • PoA (PoI as PoA)
  • Fake holes printed as dark dots or burned with needle

  • Irregular spacing or inconsistent light transmission

Laser Engraving / Embossing

  • PoI
  • PoA (PoI as PoA)
  • Simulated using gray printing or low-quality engraving

  • No tactile feel

  • Uniform color

Optical

Optical fraud targets the visual or light-responsive security elements of documents.

Expand to review a list of optical security features and associated fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Holograms / Kinegrams

  • PoI
  • PoA (PoI as PoA)
  • Printed imitation of hologram (flat, no color shift)

  • Sticker from another document

  • Mirrored placement

  • Reversed placement

Ghost Image / Secondary Portrait

  • PoI
  • PoA (PoI as PoA)
  • Manually added using photo editor or overlay

  • Manually overlay

  • Different photo style

  • Face features mismatch main portrait

Transparent Window

  • PoI
  • PoA (PoI as PoA)
  • Non-transparent printed area

  • Printed imitation of transparency

Electronic

Electronic fraud involves various manipulations aimed at falsifying digital and machine-readable security features.

Expand to review a list of electronic security features and associated fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

MRZ

  • PoI
  • PoA (PoI as PoA)
  • Edited characters with font mismatch

  • Misaligned text

  • MRZ copied from another document

NFC Chip

  • PoI
  • PoA (PoI as PoA)
  • Data cloned from another ID

Barcode / QR Code

  • PoI
  • PoA (PoI as PoA)
  • Invalid or mismatched data

Additional

Additional fraud refers to mixed manipulations targeting supplementary security mechanisms.

Expand to review a list of additional (mixed) security features and associated fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Tactile Zones

  • PoI
  • PoA (PoI as PoA)
  • Flat print with no relief

  • Texture simulated by gray gradients or varnish

Register Printing

  • PoI
  • PoA (PoI as PoA)
  • Аront and back misaligned

  • Offset image visible under light

  • Registration shifted

Latent Image

  • PoI
  • PoA (PoI as PoA)
  • Replaced with simple shadow or printed symbol 

  • Doesn’t change when tilted

Fluorescence (UV)

  • PoI
  • PoA (PoI as PoA)
  • Uniform glowing area instead of selective elements

  • Incorrect color spectrum

Serial Numbers

  • PoI
  • PoA (PoI as PoA)
  • Printed, not engraved

  • Font mismatch

Font mismatch

  • PoI
  • PoA (PoI as PoA, bill)
  • Payment methods

-

Edited data

The Edited data category identifies the specific personal data points to which alterations have been applied.

Expand to review a list of edited data points identified by the system.

Alteration characteristics

Document types

  • First name
  • Last name
  • Middle name
  • Full name
  • Document number
  • PoI
  • PoA (PoI as PoA, bill)
  • Payment methods
  • Year of birth
  • Month of birth
  • Day of birth
  • Date of birth
  • Issue date
  • Valid until date
  • Line 1 MRZ
  • Line 2 MRZ
  • Line 3 MRZ
  • Additional number
  • Photo is attached
  • AI-enhanced photo
  • PoI
  • PoA (PoI as PoA)
  • CVV / CVC
  • Bank card number

Payment methods

  • Inserted document
  • Hand with a document

Selfie + PoI

Deepfake

Deepfake refers to AI-generated or synthetically manipulated facial imagery or video used to falsify identity.

Expand to review a list of deepfake features and associated fraud indicators identified by the system.

Affected feature

Document types

Alteration characteristics

Face and Skin

Selfie

  • Unnatural skin texture — too smooth, waxy, or noisy

  • Inconsistent lighting — face illumination differs from neck or background

  • Skin tone mismatch between face and neck

  • Flickering or distortion around facial edges during movement

  • Blurred or “melted” mask edges (face blending artifacts)

  • Difference in quality, sharpness, colors, image noise level between face and surrounding

  • Face shape changes in different shots or attempts

Eyes

Selfie

  • Unnatural eye motion (too synchronized or “glassy”)

  • Gaze direction doesn’t match head position

  • Abnormal blinking — too rare, identical duration, or mechanical

  • Artifacts or distortions around eyelids during blinks

Mouth and Speech

Selfie

  • Lip movement doesn’t match the spoken audio (poor lip-sync)

  • Edges of the mouth shift unnaturally or jitter

  • Blurred or wobbly region around lips during talking

  • Teeth or gums merged; unrealistic texture

Lighting and Background

Selfie

  • Shadows inconsistent with the direction of light

  • Reflections on skin, glasses, or jewelry appear incorrect

  • Boundary between hair and face “shifts” during movement

  • Background shakes slightly when the head moves

Indirect Indicators of Identity Forgery

Selfie

  • Apparent age differs from ID photo

Proof of address

The Proof of address category identifies the specific PoA document data points to which alterations have been applied.

Expand to review a list of PoA fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Layout & Format

PoA (bill)

  • Misaligned margins

  • Misaligned tables

  • Inconsistent spacing

  • Unusual borders

  • Incomplete or broken table rendering

  • Different fonts in one document

  • Different font sizes in one document

Image Quality

PoA (bill)

  • mixed sharpness — some parts clear, some parts blurred

  • Cropped or pasted areas with visible edges or color differences

  • Pixel noise around text

Laser / Tactile Perforation

PoA (PoI as PoA)

  • Fake holes printed as dark dots or burned with needle

  • Irregular spacing or inconsistent light transmission

Data inconsistencies

PoA (bill)

  • Lack of consistency of dates throughout the document

  • Inconsistent language and localization

  • Unrealistic billing amounts

Templates

Template refers to a document template associated with elevated risk indicators.

Expand to review a list of templates-related fraud indicators identified by the system.

Affected security feature

Document types

Alteration characteristics

Layout Uniformity

PoA (bill)

  • Identical spacing and alignment across dynamic fields

  • Static positioning of personal data blocks

  • Lack of issuer-specific variability

Background / texture

PoA (bill)

  • Repetitive background pattern

  • Uniform scan noise distribution

  • Identical lighting or shadow geometry across the document

  • Repeated watermark or graphic artifacts<

Document generation logic

PoA (bill)

  • Static template structure with only personal data replaced

  • Identical formatting across all fields

  • Non-natural rendering of issuer elements

  • Artificial consistency of document components

Transaction or billing structure

PoA (bill)

  • Repetitive billing structure

  • Non-natural uniformity of transactions

  • Mechanically generated invoice formatting

  • Implausibly standardized document composition

Bank card design

Payment methods

  • Card created digitally or physically “from scratch”

  • Non-issued card design not corresponding to any legitimate issuer

  • Use of publicly available sample bank card design

  • Generic card layout without issuer-specific security elements

  • Unrealistic embossing or flat printed card details

  • Artificially generated card number structure

  • Static card template with only PAN / name replaced

Risk labels

Risk labels are assigned during verification and indicate certain characteristics of an applicant. For more information, see this article.

Applicant information

The Applicant information section contains the applicant’s personal details, provided information, and data extracted from uploaded documents.

Additional documents can also be uploaded here if needed.

Profile information

The Profile information shows top-level applicant details, such as applicant email address, phone number, language, and source key. You can change or update this information at any time.

Add Documents and Fields

In this section, you can manually upload additional documents or add other document fields with information needed during the applicant’s verification process. For example, when performing a manual check or running Video identification. Documents that are not used for verification can also be added to enrich the applicant’s profile. For more information on how to add documents, refer to this article .

Personal info

These sections show the following:

  • Extracted information — displays the information recognized and extracted from the applicant documents. It is updated automatically when document data is changed.
  • Provided information — displays the information submitted by the applicant via the WebSDK or MobileSDK or via this API method.
  • Address — displays address information collected during verification:
    • Extracted from the applicant's PoA documents.
    • Submitted by the applicant via the WebSDK and MobileSDK.

      You can also submit this information using this API method.

Documents

Documents displays the applicant’s identity documents and the information automatically extracted from them. If the verification includes a questionnaire, the submitted answers are shown here as well.

Questionnaire

The Questionnaire section shows a questionnaire required to be completed by the applicant during or after verification. An operator who runs a video identification can also complete the questionnaire using the answers provided by the applicant.

After the questionnaire is complete, you can find the submitted answers and uploaded files in the Questionnaire section.

To resubmit the information for a completed questionnaire, you can reset the questionnaire by clicking Reset. Alternatively, you can use this API method providing the QUESTIONNAIRE parameter.

Checks

The Checks section includes the results of all checks required for verification, such as identity data and proof of address checks, email and phone confirmation, and other checks depending on the current verification level.

Identity Data Verification

Identity Data Verification indicates check results showing the reliability of the provided PoI documents:

  • The Provided data section shows the data obtained from the trusted government and commercial sources by the applicant PoI document number.
  • The Retrieved data section indicates the check status of the submitted document.

Based on the extracted data, we can confirm the validity of the submitted document:

  • The green () check label means that the identity document is valid.
  • The red () check label means that the document is invalid or it was not possible to extract the required data.

The timestamps that you can find next to the name of the check indicate the date and time when the given check was performed. They are also highlighted in the color corresponding to the check result.

Depending on the check results, the system assigns a label explaining the given status as per the following table.

Check label

Check state

Identity document is valid

Green () — Provided document meets the required criteria for being issued by a recognized government authority, and is not expired.

Lost

Red () — According to the databases, the provided document is listed as lost.

The identity document is incorrect

Red () — Provided document contains errors or inaccurate personal information.

Expired

Red () — Document validity period has expired.

Issued in violation

Red () — Provided document was obtained through fraudulent means or in violation of the issuing authority's regulations.

Seized, destroyed

Red () — Provided document has been seized or rendered unusable by authorities.

Technical defect

Red () — Not possible to extract the required data due to damage that affects document integrity.

This passport is invalid due to the owner's death

Red () — Provided document belongs to another person who has passed away.

Issue date is invalid

Red () — The issue date on the identity document is incorrect or falls outside the valid time frame.

Identity document not found

Red () — Provided document was not found in the databases.

Identity document data mismatch

Red () — The information on the identity document does not match the information provided by the applicant.

Identity document is suspended

Red () — Provided document has been suspended or revoked by the issuing authority.

Proof of address check

Proof of address checks indicate check results showing the reliability of the provided PoA documents.

The results may include the following parameters:

  1. Layout and format
    • Misaligned margins
    • Misaligned tables
    • Inconsistent spacing
    • Unusual borders
    • Incomplete or broken table rendering
    • Different fonts in one document
    • Different font sizes in one document
  2. Image quality
    • Mixed sharpness when some parts of the image are clear, and some are blurred
    • Cropped or pasted areas with visible edges or color differences
    • Pixel noise around text
  3. Data Inconsistencies
    • Lack of consistency of dates throughout the document
    • Inconsistent language and localization
    • Unrealistic billing amounts

The following table explains the check labels, their description, and possible check states as indicated by colors:

  • The green () check label means that the identity document is valid.
  • The yellow () check label means that it was not possible to extract enough data for a given check.
  • The red () check label means that the address information is invalid.

Check label

Description

Check state

Unexpired

Indicates that the document is valid.

Red () — The issue date or expiry date of PoA document does not match client settings.

Acceptable type

Shows whether the type or subtype of PoA document is acceptable.

Red () — Type or subtype is forbidden by client settings or in case of ID as PoA, certain ID doc type is forbidden by client settings (for example — ID_CARD).

Address check

Shows whether the business address or PO box is acceptable.

Red () — Business address or PO box is forbidden by client settings.

POI and POA are different documents

Verifies that PoI and PoA documents do not match.

Red () — PoI and PoA are the same document, which is forbidden by client settings.

Matches Proof of Identity country

Indicates if PoI country matches with PoA country.

Red () — PoI and PoA countries do not match.

Gray () — Сheck is disabled in client settings.

Acceptable region

Verifies that the applicant address does not belong to disputed territories.

Red () — PoA document contains the address of disputed territories.

Acceptable language

Reveals if PoA document contains languages forbidden by your settings.

Red () — PoA contains languages forbidden by client settings.

AML screening

During the auto-check, Sumsub uses the watchlist screening to determine if your applicants belong to any of the various sanction lists and watchlists across the globe.

The watchlist screening helps find applicants that are:

  • Known or suspected terrorists
  • Sanctioned persons
  • Politically exposed persons (PEPs)
  • Persons with criminal background
  • Persons mentioned in adverse media

All applicants that belong to any of these categories are rejected automatically during the watchlists (WL) screening. To approve such applicants, follow the instructions given in this article.

You can also generate a screening report and save it as PDF.

Email and phone confirmation checks

Email and phone checks display the verification results that indicate the reliability of the provided email address and phone number.

IP check

The IP check displays the verification results that indicate the reliability of the applicant's IP address used during verification.

Liveness check

Liveness shows the results of the Liveness & Face match check passed by the applicant.

You can see such statistics as the date and time when the Liveness check was performed, information about the platform and device used during the Liveness session, view a video snippet, and pictures from the recorded selfie.

📘

Note

The Liveness check is performed only if the Selfie step (Advanced Liveness check) is added to the verification level.

Face match

Face match displays the verification results that indicate whether the person in the identity document (PoI) is the same person presenting the selfie. The system does this by comparing facial representations extracted from both images.

Face match works in the following way:

  1. Face localization. The system identifies the portrait on the identity document using a database of known document templates (for example, passports, ID cards, driver’s licenses). This allows it to determine the face location for each document type and use the correct image region for further processing.
  2. Face detection and alignment. The document image and the selfie are processed to detect the face and align it into a consistent format. This step accounts for differences in orientation, scale, and lighting conditions.
  3. Feature extraction. Each detected face is converted into a numerical representation (embedding or feature vector). These vectors capture patterns learned from large datasets and encode the identity of a person for comparison.
  4. Face comparison. The embeddings from the document image and the selfie are compared to evaluate whether they correspond to the same identity. This comparison is based on overall similarity rather than any single feature.
  5. Face match result. The system determines whether the two images correspond to the same person. The result is a match or no-match outcome, displayed on the applicant page and used in the identity verification process.

Duplicates

Shows duplicate profiles.

To detect duplicates, Sumsub searches for profiles that have the same full name, ID documents, email addresses, phone numbers, or even facial features.

For more information on how to configure duplicate processing, see this article.

Photos

The Photos section contains a list of documents submitted by applicants during verification in accordance with the verification level settings.

For example, you may want to request applicants to submit identity documents, such as a passport, driver's license, or resident permit, along with some additional proof of identity, such as the second identity document (for example, student ID or vehicle passport) and/or residence permit, and so on.

Each of the documents submitted by your applicants is listed independently, one after another, showing its verification status and rejection reasons (if any).

You can perform the following actions on documents:

  • Change the current status of any document if needed.
  • Edit document information in case the OCR engine could not recognize it properly.
  • Change document information, such as its country and type, and remove the document.

Attachments

In the Attachments section, the applicant can upload specific documents that were not included in the standard set of documents for certain checks. You can use such documents on other stages.

For example, the applicant needs to complete the questionnaire with a particular document, such as Form W8-BEN, and provide a Water Bill. It can be marked as a PoA document, but we do not request it during the regular PoA check.