Device Intelligence

Overview

IDWise's Device Intelligence feature enhances the security of identity verification by analyzing device-related smart signals during onboarding journeys. This feature helps detect fraudulent activity by identifying suspicious behavior patterns based on the characteristics of the devices used. Device Intelligence contributes to identifying potential risks, such as the use of compromised devices, multiple journeys from the same device, or devices with tampered settings.

Smart Signals

IDWise provides a rich set of Smart Signals to help detect fraud by evaluating the device and environment in which users are onboarding. These smart signals provide detailed insight into the user's device, browser, and network to help identify suspicious behavior.

Below are the smart signals supported by IDWise's Device Intelligence feature:

Smart SignalDescriptionSupported Platforms
High Device UsageDetects if the same device is being used frequently across multiple sessions or accounts.Android, iOS, Web
Incognito Mode DetectionDetects if the user is browsing in incognito or private mode, which may suggest attempts to conceal their browsing behavior.Web
VPN DetectionIdentifies if the user is using a VPN, which can mask the user's real location and network.Android, iOS, Web
Bot DetectionIdentifies if the activity originates from a bot by detecting non-human-like behavior, such as automation tools or crawlers.Web
Browser TamperingDetects if there are changes or manipulations in browser signals like User-Agent, often used to bypass detection and tracking mechanisms.Web
Virtual Machine DetectionIdentifies if the browser is running inside a virtual machine environment, which can simulate multiple devices.Web
Privacy Settings DetectionDetects if the browser is configured with heightened privacy settings, which may indicate an attempt to avoid tracking or data collection.Web
Rooted/Jailbroken Device DetectionFlags if a mobile device has been rooted (Android) or jailbroken (iOS), compromising the system's security controls.Android, iOS
Emulator Detection (Mobile)Detects if the onboarding or other activities are being carried out from an emulator, often used to simulate real devices in fraud scenarios.Android, iOS
App Cloners (Mobile)Identifies if app cloners are being used to run multiple instances of the same app, which can be used for fraud such as creating multiple accounts.Android
Frida Detection (Mobile)Detects if the Frida tool is being used to manipulate apps or perform dynamic analysis on the device, often used in hacking activities.Android, iOS
Geolocation Spoofing (Mobile)Flags if the device's geolocation has been falsified or manipulated using spoofing tools, which misrepresent the true location of the user.Android, iOS
Developer Tools DetectionIdentifies if the browser developer tools are in use, which may be an attempt to modify or inspect the app's source code and behavior.Web
Remote Control Tools DetectionDetects the use of remote control tools such as AnyDesk (Windows, macOS, Android Webview) and TeamViewer or RDP (Windows), which can indicate unauthorized access or fraud.Web
Tor Network DetectionDetects if the user is connected to the internet via the Tor network, commonly used to anonymize traffic and conceal the user’s true identity.Android, iOS,Web
IP Block List CheckChecks if the device's IP address is on a blocklist, often associated with suspicious or malicious activities.Android, iOS, Web
Proxy DetectionIdentifies if the user is routing traffic through a proxy server, potentially obscuring their true network and location information.Android, iOS, Web