Articles, videos, ebooks, and more. Find more information here. 


Recent Posts

Identity Theft vs. Identity Fraud: How are They Different?

Identity Theft vs. Identity Fraud: How are They Different?

Increasing cases of cybercrime have become a huge cause for concern among enterprises. In the first three quarters of 2021, it’s estimated that over 281 million data breaches have occurred and that the average cost of an attack is now at $4.24 million per incident....

Single Sign-On Solutions: Benefits and Drawbacks

Single Sign-On Solutions: Benefits and Drawbacks

Modern-day companies have become highly reliant on web applications, cloud-based software, and other digital tools. Through these technologies, they gain cost-efficient automation that perfectly syncs with their database and devices. But along with mainstream adoption...

Fraud Risk Management for Your Remote Workforce

Fraud Risk Management for Your Remote Workforce

The COVID-19 pandemic has truly left a major impact on American workplaces. After discovering the cost savings and greater efficiencies of both remote and hybrid working arrangements, many organizations are choosing to remain with these setups permanently. But while...


Tune In to Our Latest Videos

*voice functionality coming soon

*voice functionality coming soon 

*voice functionality coming soon 

Q5id Proven Identity Implementation Guide

Our low-code implementation makes it easy to integrate Q5id into your existing identity verification flows. You can learn more about what’s required to implement our biometric verification technology into your IAM systems by reading the implementation guide linked below:


Frequently Asked Questions

Once enrolled, where does Q5id store personal data?

Data, such as name, address, email, and phone number are encrypted and saved. Biometrics are converted into a character string using a hashing algorithm which cannot be reverse engineered. 

Q5id Privacy Policy 

Do you store a consumer's facial and palm biometric data?

Unless required, the answer is no. Face and palm biometrics are converted into a character string using a hashing algorithm.  That algorithm cannot be reverse engineered.

Images may be stored when required by law or regulations specific to a given business. Any images we do store are secured in a data vault.

Why do you require face and palm biometrics to enroll?

Q5id prides itself on being the most comprehensive identity proofing and authentication platform available. Using multiple biometrics ensures it is nearly impossible for someone to spoof multiple biometrics. This provides consumers and businesses with industry leading protection against identity theft and fraud. 


Will enrollee's data ever be sold or shared?


Information gathered during the onboarding process, such as biometrics and documentation are never sold or shared.

What if someone enrolls and then changes their mind?

Q5id is compliant with CCPA and GDPR, meaning that any user can request to have their profile and associated data removed. 

Can I use Q5id services with my company’s app instead of the Q5id app?

Yes. Q5id provides a variety of ways for companies to utilize Q5id’s identity proofing and authentication services. Contact us to learn more. 

How does Q5id use biometrics for identification?

Enrolling with Q5id involves submitting multiple biometric measurements. Your facial scan is used to verify you against your government issued ID, while the palm scans are used for future verification. Liveness is confirmed via our patented process, with live advisers on hand to verify users.  

Q5id uses a combination of biometric measurements to ensure that the user enrolling matches their government issued ID. Once enrolled, the biometric measurements captured at the time of enrollment are used to ensure that the person trying to authenticate is truly who they claim to be.  

Using a hashing algorithm, face and palm biometrics are converted into a character string that cannot be reverse engineered. 

Once enrolled, how long does an authentication take?

Authentications only take a few seconds.

How comprehensive is Q5id’s verification search?

When authenticating a profile, Q5id accesses a repository of rich data of more than 45 billion records, including state licensing bureaus, courthouses, college directories, utilities and over 10,000 other sources.  

What countries does Q5id support?

We have the capability to provide our services in nearly every country. 

Does Q5id adhere to regulatory compliances and industry standards?

Absolutely. Q5id is compliant with vertical industry requirements such as KYC and AML, as well as regulatory compliance with CCPA, and GDPR.

Q5id has also been independently certified as SOC2 Type I compliant. 

Can a customer have more than one ID in the system?

No. Each individual has only 1 identity.

If a consumer wants to use their Q5id digital identity with more than one company do they have to enroll multiple times?

No. Enrollment is a one-time process.

Consumers can use that identity to authenticate transactions with an unlimited number of companies.

What is biometric capture? How does Q5id capture biometrics?

Q5id captures biometrics by using a hashing algorithm. Face and palm biometrics are converted into a character string that cannot be reverse engineered.

Q5id Privacy Policy 

Schedule a Demo

14 + 2 =


6679 NE Bennett St. 

Hillsboro, OR 97124

Call Us

(503) 208-7607