Overview
Multi-layered fraud detection with real-time network analysis
7-Layer Fraud Signal Stack
- ✓ Device Fingerprinting: Hardware + OS + browser entropy
- ✓ Liveness Detection: Blink, head turn, smile challenges
- ✓ Velocity Checks: Applications per device/IP/email
- ✓ Network Analysis: Fraud ring detection with graph ML
- ✓ Document Verification: OCR + tamper detection + Vision AI
- ✓ Behavioral Biometrics: Typing rhythm, mouse patterns
- ✓ Watchlist Screening: PEP, sanctions, adverse media
Key Features
- ✓ 3D Network Visualization: WebGL-powered fraud graph with Three.js
- ✓ Vision-First Approach: Document + Selfie analysis in one pass
- ✓ Escalation Automation: Auto-route high-risk cases to L2 review
- ✓ Real-Time Scoring: < 3s end-to-end latency
- ✓ Explainable Output: Every decision backed by signals
- ✓ PII Masking: Automatic redaction in logs & exports
450-650%
Annual ROI
93%
Fraud Block Rate
0.2%
False Positive Rate
< 3s
P95 Latency
Tech Stack
Vision + Reasoning engines with graph ML
Technology Architecture
Vision Engine
- Document extraction (Aadhaar, PAN, DL)
- Liveness detection (3 challenges)
- Face matching (selfie vs ID)
- Tamper detection (shadows, fonts, pixels)
Reasoning Engine
- Signal aggregation (7 layers)
- Risk scoring (0-1000)
- Fraud ring detection
- Explainable output with chain-of-thought
Graph ML
- Neo4j for fraud networks
- Community detection (Louvain)
- PageRank for entity importance
- 3D visualization (Three.js + WebGL)
Data Flow
End-to-end fraud signal pipeline
Fraud Signal Pipeline
flowchart LR
A[Client Upload] --> B{Doc + Selfie}
B --> C[Vision Engine]
B --> D[Device FP]
C --> E[OCR + Face Match]
D --> F[Velocity Check]
E --> G[Reasoning Engine]
F --> G
G --> H{Risk Score}
H -->|Low| I[Auto-Approve]
H -->|Medium| J[Manual Review]
H -->|High| K[Auto-Reject]
G --> L[Graph DB]
L --> M[Fraud Network]
M -.Update.-> G
style C fill:#8B5CF6
style G fill:#A3E635
style M fill:#E10600
Signal Catalog
7-layer fraud detection framework
Signal Layer Sequence
sequenceDiagram
participant Client
participant FP as Device FP
participant Vision as Vision AI
participant Velocity
participant Graph as Network Graph
participant Reasoning
Client->>FP: Browser fingerprint
FP->>Reasoning: Device signals
Client->>Vision: Doc + Selfie
Vision->>Reasoning: OCR + Liveness
Velocity->>Reasoning: Velocity metrics
Graph->>Reasoning: Network risk
Reasoning-->>Client: Risk score + reasons
Benefits
For NBFCs and applicants
NBFC Gains
- 93% fraud block rate (vs 78% manual)
- 0.2% false positive rate (vs 3-5% industry)
- 450-650% annual ROI
- Auto-escalation reduces L1 workload by 60%
- 3D fraud network visualization for investigators
- Explainable decisions for audit trails
Borrower Gains
- Faster approvals (< 3s vs 20min manual)
- Lower rejection rate (fewer false positives)
- Seamless liveness checks (3 simple challenges)
- PII protection (automatic masking)
- Transparent reasons if rejected
- Single upload (doc + selfie)
Interactive Demos
Explore fraud detection in real-time
Mode: MOCK
Toggle between offline simulations (MOCK) and live API calls (LIVE)
FAQ
How does IDShield differ from traditional KYC?
Traditional KYC is binary (pass/fail) and manual. IDShield provides a continuous risk score (0-1000),
detects fraud rings through network analysis, and auto-escalates high-risk cases. Vision AI enables
document tamper detection that human reviewers often miss.
What is the 3D fraud network visualization?
IDShield builds a graph database (Neo4j) connecting applicants by shared signals (device, IP, email, phone).
Investigators can explore this network in 3D (Three.js + WebGL) to identify fraud rings. Nodes are color-coded
by risk level, and edges show connection strength.
How are false positives minimized?
IDShield uses a 7-layer signal stack with conservative thresholds. No single signal causes auto-rejection.
The Reasoning engine weighs all signals and requires multiple red flags to escalate. This achieves 0.2% false
positive rate vs 3-5% industry average.
What documents are supported?
Vision engine supports Aadhaar, PAN, Driving License, Voter ID, and Passport. OCR extracts text,
tamper detection checks for digital manipulation, and face matching compares selfie to ID photo.
All PII is automatically masked in logs and exports.
How does device fingerprinting work?
IDShield collects ~50 signals: browser version, screen resolution, timezone, installed fonts,
canvas fingerprint, WebGL renderer, battery level, etc. These create a unique device ID that persists
across sessions. Velocity checks track applications per device to detect farming attacks.
Is IDShield RBI compliant?
Yes. IDShield follows RBI Fair Practices Code 2003, DPDP Act 2023, and Aadhaar Authentication Guidelines.
All decisions include explainable reasons, PII is masked, and audit trails are exportable.
No biometric data is stored permanently.