Identity verification throughout the full customer lifecycle

A no-code solution for addressing falsified records, forged signatures and identity theft

1. Request identity verification from your customer

With EasyLinks, businesses can get started today by putting a link on their website, sharing a QR code or sending it via email communication to their customers.

2. Your customer receives an SMS or email to initiate the verification process

They will use either mobile web or their desktop to complete their verification - whatever is most convenient for them.

3. Your customer verifies their identity

Businesses can customize the level of verification for each transaction. Your customer will answer a few challenge questions based on the personal information provided (knowledge-based authentication), take photos of their ID (credential analysis), and we'll confirm their identity in seconds. You could also choose to verify a customer to the IAL2 standard, which is a higher level of identity verification.

4. Your customer verifies their presence

Your customer will take a selfie to verify that they are present. This step detects if a signer is holding up an ‘electronic replica’ of a photo during this automated check. The platform also verifies that the selfie matches the government-issued ID.

5. If necessary, your customer connects with a trusted referee on a video call

If the Proof platform uncovers any identity inconsistencies or your signer does not have adequate identification, we’ll step up the verification process to a trusted referee. Trusted referees are notaries who are trained in fraud detection. They’re available 24/7.

6. Access the Proof Identity Report

You will have immediate access to a complete Identity Report to review the transaction details and download the identity information or your records.

1. Request identity verification from your customer

With EasyLinks, businesses can get started today by putting a link on their website, sharing a QR code or sending it via email communication to their customers.

2. Your customer receives an SMS or email to initiate the verification process

They will use either mobile web or their desktop to complete their verification - whatever is most convenient for them.

3. Your customer verifies their identity

Businesses can customize the level of verification for each transaction. Your customer will answer a few challenge questions based on the personal information provided (knowledge-based authentication), take photos of their ID (credential analysis), and we'll confirm their identity in seconds. You could also choose to verify a customer to the IAL2 standard, which is a higher level of identity verification.

4. Your customer verifies their presence

Your customer will take a selfie to verify that they are present. This step detects if a signer is holding up an ‘electronic replica’ of a photo during this automated check. The platform also verifies that the selfie matches the government-issued ID.

5. If necessary, your customer connects with a trusted referee on a video call

If the Proof platform uncovers any identity inconsistencies or your signer does not have adequate identification, we’ll step up the verification process to a trusted referee. Trusted referees are notaries who are trained in fraud detection. They’re available 24/7.

6. Access the Proof Identity Report

You will have immediate access to a complete Identity Report to review the transaction details and download the identity information or your records.

Proof of identity use cases

Real Estate

More than $185B worth of real estate closings have been secured by Proof

  • Seller identity verification
  • Identity verification for ad hoc document recording requests
  • Confirmation of ACH wire instructions

Auto

With Proof, the auto industry is digitizing legacy workflows

  • IAL2 eSign (e.g. odometer disclosure statement)
  • Seller identity verification
  • Buyer identity verification

Financial Services

Proof makes online identity verification simpler, faster, and safer to secure your customer’s most valuable transactions

  • IAL2 eSign (e.g. SBA loans)
  • Wire transfer authorizations
  • Beneficiary changes
  • Account recovery
  • Changes of account information
  • Loan applications
  • Customer onboarding

4.7 / 5

Consumer satisfaction rating of the Proof platform, based on 20,000+ reviews

7K businesses

Reduction in document errors when using online notarization, compared to in-person

10%

Reduction in printing costs when using Proof

Get identity evidence on every transaction

With IAL2, you get evidence in every signature

IAL2 is quickly becoming the standard for securing someone’s identity. Especially when it comes to document signing, a basic eSign just isn’t enough.

AI-powered fraud detection for every customer

Proof's new transaction monitoring product, Defend, can be combined with Identify and used to analyze the risk for every Identify transaction.

A no-code solution for identity verification

An Easylink is a unique URL for businesses to share with customers to direct them to complete a transaction.

Learn more about identity verification with Proof

Customize identity proofing checks to the assurance level you need

With Proof, companies seamlessly incorporate Identify across the customer lifecycle to either verify or reconfirm a person's identity for any sensitive transaction.

Get built-in fraud detection with Proof's Defend

Proof is the only signature platform with AI-powered fraud detection to combat the $81B in annual losses to U.S. businesses due to false records and identity theft.

Meet the IAL2 identity proofing standard

Proof is the first company approved by the Kantara Initiative, that connects an electronic signature to an IAL2 identity all on one platform.

Reduce your fraud risk with identity verification

Have trust in every signature

Proof certifications, approvals, and standards

Proof adheres to strict security standards and regulations validated by thorough third-party assessments. We remain committed to the protection of customer data and accessibility.

SOC2 Certification Logo
Kantara Certification LogoWCAG Certification LogoMismo Certification Logo