en
Search
close-tab-svgrepo-com image/svg+xml2021Timothée Giet
en
close-tab-svgrepo-com
Search result
showing 30 result for

    Glossary

    A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
    a

    Age Verification

    Age verification is the process of determining whether a person has reached the legally prescribed minimum age, for example for online gambling or accessing age-restricted content such as alcohol and tobacco. The procedure is used to protect minors and is often used alongside identity verification to comply with legal requirements, such as the EU Anti-Money Laundering Directive (AMLD5). Age verification serves to protect minors and is often used alongside identity verification to comply with legal requirements, such as the EU Anti-Money Laundering Directive (AMLD5).

    Authentication

    Verification of a person's identity or age verification - be it when opening a bank account or accessing online services - is usually carried out using recognised documents such as an ID card. The concept of authentication is based on checking the authenticity of these documents in order to detect and reject forgeries and unauthorised access attempts. Entering a username and the corresponding password to log in to an online platform is also a form of authentication.

    b

    Biometric Identification

    Biometrics are body measurements related to human characteristics. Biometric authentication is the act of using an individual’s biometrics as a form of identification and access control. Of the various biometric measurements used for this purpose, the most popular are: fingerprint, palm veins, facial recognition, palm print, hand geometry and iris/retina.

    Biometrics

    The term biometrics refers to the (automated) measurement and evaluation of individual physical or behavioral characteristics that can be used to uniquely identify or authenticate living beings.

    c

    Crypto KYC

    KYC helps to ensure the security of money when trading cryptocurrencies by verifying the identity of customers. This can help avoid risks such as money laundering or financial crime that could lead to money being lost or confiscated. There is a connection between KYC and crypto, as the KYC process is often carried out by centralised institutions. These institutions are usually required to adhere to strict KYC guidelines.

    d

    Digital Identity

    A digital identity is used to check whether an identity matches the identity in the physical world. This makes it possible to find out whether you are dealing with the right person. A digital identity includes all information about a person that is available in digital form. This information can be used to recognize a person's identity when it is merged.

    Digital Onboarding

    Digital onboarding is the process of identifying and verifying individuals or companies online via a secure portal. The aim is to register new customers for digital products or services quickly and legally, without any media discontinuity and without the need to appear in person or send documents by post.

    Document Coverage

    Document support refers to the ability to automatically recognise and verify a wide range of national and international identity documents, such as ID cards and passports, from over 165 countries. AI-supported technologies are used for this purpose, classifying documents and checking their authenticity, as well as analysing relevant security features such as watermarks, holograms and machine-readable zones. If compatible, the integrated NFC chip can also be read.

    Document Verification

    Document verification is a clearly structured process involving technical and security-related checks. The aim is to confirm the ID document's authenticity and detect any manipulation early on, without disrupting the customer journey.

    e

    eID

    An eID (electronic identity) is a digitally authenticated and verified identity that allows individuals and organizations to securely access online services, perform transactions, and provide electronic signatures. As a trusted digital identity solution, an eID identification system ensures secure authentication while minimizing the risks of identity theft and fraud.

    eIDAS 2.0

    eIDAS 2.0 is the planned legal and technical framework for recognising and using digital identities across Europe. The aim is to provide an interoperable digital identity that enables cross-border access to online services within Europe. Switzerland is currently working on introducing a state-recognised electronic identity (e-ID) that will meet the requirements of eIDAS 2.0, particularly with regard to security, data protection, and the ‘EU Digital Identity Wallet’.

    f

    Face Recognition

    Face recognition is an innovative biometric identification technology that allows people to be identified and verified based on their unique facial features. Companies and organisations are increasingly using it to control access to sensitive areas, enhance security, and improve customer experience.

    g

    GDPR

    The General Data Protection Regulation (GDPR) is an EU regulation that came into force on 25 May 2018. Its purpose is to regulate the protection of personal data and the rights of individuals when their data is processed.

    Governance

    Governance refers to the entirety of all rules, procedures and processes that ensure that a company is managed responsibly, efficiently and in a goal-oriented manner. It plays a central role in ensuring a company's long-term success. It helps to minimise risks and meet regulatory requirements more efficiently.

    i

    Identity Fraud

    In identity fraud, a person pretends to be someone else by using falsified or stolen data. The aim is to bypass the verification process and gain unauthorised access. Modern solutions therefore use biometric features and liveness detection to prevent this type of fraud.

    Identity Theft

    Identity theft involves the unauthorised acquisition and use of another person's personal information. This stolen data is often used to access accounts, services or sensitive information. Identity theft often forms the basis for further identity fraud.

    j

    JSFVG

    The Federal Act on the Protection of Minors in the Areas of Film and Video Games (JSFVG), which came into effect on 1 January 2025, has introduced a uniform system for age labelling and age control for films and video games in Switzerland. The Act protects children and young people from unsuitable content by imposing binding requirements on providers with regard to minimum ages, access controls, and parental protection systems.

    k

    Know Your Business (KYB)

    KYB stands for 'Know Your Business' and refers to the process by which companies verify the identity and integrity of their business customers. The aim is to prevent money laundering, fraud, and other illegal activities by verifying information such as company structure, beneficial ownership, and official registration data. KYB is a vital part of compliance, particularly for financial service providers and those in regulated industries.

    l

    Liveness Detection

    In computer vision, liveness detection is the process of distinguishing between genuine and falsified inputs. This is an important security measure for many systems to prevent spoofing. In a spoofing attack (or presentation attack), fraudsters attempt to deceive a biometric system in order to gain unauthorised access.

    m

    Machine Learning

    Machine learning (ML) is a branch of artificial intelligence whereby computer programmes learn from data without being explicitly programmed. These algorithms recognise patterns in the data and use them to make predictions or decisions.

    Multi Factor Authentication

    Multi-factor authentication (MFA) is an advanced method for securing user accounts and services. Unlike simple password-based authentication, MFA requires the combination of two or more authentication methods to confirm a user's identity.

    n

    NFC

    Near Field Communication (NFC) is an internationally standardised radio transmission process. It enables two devices to exchange data without contact over a distance of just a few centimetres. This process uses an electromagnetic induction field. The principle is similar to Bluetooth, but much more direct and secure, especially since the devices do not need to be paired and transmission only occurs in close proximity.

    o

    One-Shot Signature

    One-shot signature refers to a method for qualified electronic signatures (QES) optimised by PXL Vision for B2C processes. With this method, identification and signature are carried out in a single, seamless process - i.e. ‘in one go’ (one-shot).

    Online Identification

    Online identification is the digital verification of a person's identity without the need for them to physically appear. Companies verify both the authenticity of ID documents and the biometric characteristics of users - directly over the Internet.

    s

    Self-declaration

    Self-declaration involves a person independently and unverifiably providing personal data, such as their name, date of birth, address or nationality. This information is initially provided without external identity verification or reliable authentication features. Self-declarations are primarily used in digital processes where only one person's data is initially required.

    Selfie Identification

    Selfie-Ident, short for “selfie identity verification”, is a process for verifying a person's identity using a selfie. The photo is compared with stored reference data to verify the authenticity of the identity. In contrast to conventional methods of identity verification, which are based on personal data, passwords or biometric features, Selfie identification relies on visual confirmation through a self-portrait - which can be a photo or video.

    Smurfing

    Smurfing is a method of money laundering whereby large sums of money are divided into numerous small transactions to hide their illegal origin. This technique poses an increasing challenge for banks, fintechs and payment service providers, particularly in the digital age. They need to implement comprehensive digital identity checks, transaction monitoring and automated compliance measures to protect themselves.