Device Intelligence
Overview
IDWise's Device Intelligence feature enhances the security of identity verification by analyzing device-related smart signals during onboarding journeys. This feature helps detect fraudulent activity by identifying suspicious behavior patterns based on the characteristics of the devices used. Device Intelligence contributes to identifying potential risks, such as the use of compromised devices, multiple journeys from the same device, or devices with tampered settings.
Smart Signals
IDWise provides a rich set of Smart Signals to help detect fraud by evaluating the device and environment in which users are onboarding. These smart signals provide detailed insight into the user's device, browser, and network to help identify suspicious behavior.
Below are the smart signals supported by IDWise's Device Intelligence feature:
Smart Signal | Description | Supported Platforms |
---|---|---|
High Device Usage | Detects if the same device is being used frequently across multiple sessions or accounts. | Android, iOS, Web |
Incognito Mode Detection | Detects if the user is browsing in incognito or private mode, which may suggest attempts to conceal their browsing behavior. | Web |
VPN Detection | Identifies if the user is using a VPN, which can mask the user's real location and network. | Android, iOS, Web |
Bot Detection | Identifies if the activity originates from a bot by detecting non-human-like behavior, such as automation tools or crawlers. | Web |
Browser Tampering | Detects if there are changes or manipulations in browser signals like User-Agent, often used to bypass detection and tracking mechanisms. | Web |
Virtual Machine Detection | Identifies if the browser is running inside a virtual machine environment, which can simulate multiple devices. | Web |
Privacy Settings Detection | Detects if the browser is configured with heightened privacy settings, which may indicate an attempt to avoid tracking or data collection. | Web |
Rooted/Jailbroken Device Detection | Flags if a mobile device has been rooted (Android) or jailbroken (iOS), compromising the system's security controls. | Android, iOS |
Emulator Detection (Mobile) | Detects if the onboarding or other activities are being carried out from an emulator, often used to simulate real devices in fraud scenarios. | Android, iOS |
App Cloners (Mobile) | Identifies if app cloners are being used to run multiple instances of the same app, which can be used for fraud such as creating multiple accounts. | Android |
Frida Detection (Mobile) | Detects if the Frida tool is being used to manipulate apps or perform dynamic analysis on the device, often used in hacking activities. | Android, iOS |
Geolocation Spoofing (Mobile) | Flags if the device's geolocation has been falsified or manipulated using spoofing tools, which misrepresent the true location of the user. | Android, iOS |
Developer Tools Detection | Identifies if the browser developer tools are in use, which may be an attempt to modify or inspect the app's source code and behavior. | Web |
Remote Control Tools Detection | Detects the use of remote control tools such as AnyDesk (Windows, macOS, Android Webview) and TeamViewer or RDP (Windows), which can indicate unauthorized access or fraud. | Web |
Tor Network Detection | Detects if the user is connected to the internet via the Tor network, commonly used to anonymize traffic and conceal the user’s true identity. | Android, iOS,Web |
IP Block List Check | Checks if the device's IP address is on a blocklist, often associated with suspicious or malicious activities. | Android, iOS, Web |
Proxy Detection | Identifies if the user is routing traffic through a proxy server, potentially obscuring their true network and location information. | Android, iOS, Web |
Updated 23 days ago