Articles, videos, ebooks, and more. Find more information here.
Six Benefits of OIDC That You Should Take Advantage of Right Now
The 3 A’s of Access Control: A Guide to the Fundamentals
Q5id Proven Identity Implementation Guide
Our low-code implementation makes it easy to integrate Q5id into your existing identity verification flows. You can learn more about what’s required to implement our biometric verification technology into your IAM systems by reading the implementation guide linked below:Learn More
Data, such as name, address, email, and phone number are encrypted and saved. Biometrics are converted into a character string using a hashing algorithm which cannot be reverse engineered.
Unless required, the answer is no. Face and palm biometrics are converted into a character string using a hashing algorithm. That algorithm cannot be reverse engineered.
Images may be stored when required by law or regulations specific to a given business. Any images we do store are secured in a data vault.
Q5id prides itself on being the most comprehensive identity proofing and authentication platform available. Using multiple biometrics ensures it is nearly impossible for someone to spoof multiple biometrics. This provides consumers and businesses with industry leading protection against identity theft and fraud.
Information gathered during the onboarding process, such as biometrics and documentation are never sold or shared.
Q5id is compliant with CCPA and GDPR, meaning that any user can request to have their profile and associated data removed.
Enrolling with Q5id involves submitting multiple biometric measurements. Your facial scan is used to verify you against your government issued ID, while the palm scans are used for future verification. Liveness is confirmed via our patented process, with live advisers on hand to verify users.
Q5id uses a combination of biometric measurements to ensure that the user enrolling matches their government issued ID. Once enrolled, the biometric measurements captured at the time of enrollment are used to ensure that the person trying to authenticate is truly who they claim to be.
Using a hashing algorithm, face and palm biometrics are converted into a character string that cannot be reverse engineered.
Authentications only take a few seconds.
When authenticating a profile, Q5id accesses a repository of rich data of more than 45 billion records, including state licensing bureaus, courthouses, college directories, utilities and over 10,000 other sources.
We have the capability to provide our services in nearly every country.
Absolutely. Q5id is compliant with vertical industry requirements such as KYC and AML, as well as regulatory compliance with CCPA, and GDPR.
Q5id has also been independently certified as SOC2 Type I compliant.
No. Each individual has only 1 identity.
If a consumer wants to use their Q5id digital identity with more than one company do they have to enroll multiple times?
No. Enrollment is a one-time process.
Consumers can use that identity to authenticate transactions with an unlimited number of companies.