facekom automated id

Verify your customers with a completely automated,
fully compliant identification process

Facekom automated id

Automation by AI

Clients only need their smart devices or laptops to verify their identity. Our AI guides them through the process of supplying the necessary documents and automatically checks the resulting data for anomalies.

Powered by NFC

All NFC-capable identity documents can be easily verified using FaceKom’s technology. The Computer Vision module provides state-of-the-art technologies such as liveness detection, facial comparison and holocheck.

Highly Customizable

FaceKom is fully compliant with domestic and international regulations. All of our products are white-labels, so they can be easily customized to fit your clients’ needs.

Archived Video Sessions

A searchable archive of your customers’ recorded video sessions can help you resolve potential issues and complaints.

PSD2 ready

We can provide more information about a client's financial history, thus banks can give the best offers in terms of personal loans or new bank accounts.

Digital Signature

After identification the client has the possibility to sign documents digitally by using FaceKom Application which makes the whole procedure convenient, fast and more effective.


Automatic identification can be managed by setting up your own workflow. This feature makes it possible to control processes and add comments.


After contacting text chat embedded in the website, the built-in chatbot helps to navigate clients and find important information without having to wait for the operator.

OCR Identification

After gathering information and personal documents from the clients, an OCR software integrated into FaceKom extracts the necessary information from the clients’ personal documents to compare them with the details provided by the clients in advance.

Available 24/7 service

This feature makes it possible to have no opening and closing hours, so your service is accessible any time of the day.

Supervised Recording

During all virtual administration events, actions, video image, sound and logs are all recorded. Timeflags are used for saved sessions.

Form Filler

Personal details can be asked from the clients by using the Form filler feature, before entering the surface of the virtual customer service. Documents can be uploaded by the clients and these can be checked.

LDAP Authentication

FaceKom software can be connected to existing active directories where you can set-up user and group management and control accesses and rights.

Delivery Models


We can deliver the product as an on-premise solution for partners who want to keep their clients’ data in-house. The system runs on our partner’s servers, and can be integrated with other solutions on-demand. After the application goes live, we don’t need to have access to these servers.


For partners who don’t want to handle software updates or maintain their own servers, we can deliver FaceKom services in an outsourced way. We run FaceKom on our secure servers dedicated to the partner.

NFC Typeless Identification

All NFC-capable identity documents can be easily verified using FaceKom’s technology which result in a completely typeless process throughout client onboarding.

OCR & MRZ Capabilities

With Computer Vision, FaceKom products become capable of using Optical Character Recognition (OCR) technology to gather information from the document.

MRZ or Machine Readable Zone reading capabilities can be used to collect basic personal information from ID cards and passports. It can be found on most passports and some driver's licenses and IDs.

These technologies can decrease the amount of manual input required from the customer, increasing general customer experience.

ID Card Recognition & Hologram Recognition

Computer Vision is capable of identifying ID cards based on their unique patterns. The system recognizes the ID and is capable of showing the operator the necessary security elements that the operator has to look for.

Hologram detection is also used for ensuring the validity of the documents. Every country has their own unique security elements on their identification documents. FaceKom’s hologram detection can find and validate these.

Over 600,000 verifications and counting.

FaceKom also provides operator-assisted identity verification services for an outstanding and thorough customer due diligence.

FaceKom Video-ID

Face Recognition and Liveness Detection

During customer identification, the administrator has to ensure that the customer’s identity is valid. Computer Vision can support admins in this task by using facial recognition and facial comparison technologies.

The system compares the picture shown on the identification document and the person on the screen or photo (in case of non-real time identification).

FaceKom also uses Liveness detection to detect spoofing attempts by determining whether the source of a biometric sample is a live human being or a fake representation (e.g. a photo).

Code Scanning

Barcodes and QR codes are used frequently to store information on certain documents. Leveraging Computer Vision’s code scanning capability, this information becomes accessible for the user, so it can be used later during various processes, making it a smoother experience.

How it works

Facekom step1
STEP 1 The customer has to provide basic information about themselves to start the automatic identification session
Facekom step2
STEP 2 After registration, the customer has to go through a compatibility check to ensure that their devices and network connection is capable of conducting the automatic identification
Facekom step3
STEP 3 The customer arrives to the self-service room where they can initiate the self-service (‘selfie identification’)
Facekom step4
STEP 4 In the identification session, the customer sees an easy-to-use, intuitive UI that is a responsive website in case of a web-based process, offering optimal UX
Facekom step5
STEP 5 In the process, the customer must show both sides of ID or passport and proof of address
Facekom step6
STEP 6 To validate the customer, the system will run automatic liveness detection and other form of checks
Facekom step7
STEP 7 The platform is capable of handling two-factor-authentication in accordance with PSD2 legislation
facekom step8
STEP 8 At the end of the session, the customer can be redirected to a feedback page or to any other website, defined by the partner

Regulatory Requirements

FaceKom products are compliant with eIDAS, PSD2 and GDPR legislations and the highest security standards and data management regulations. FaceKom also has access to national and international databases (e.g. Thompson Reuters) to ensure high-quality background checks and high-level AML checks on customers.

Regulatory Requirements

Got questions?