Solutions

KYC & Background Checks

Security is a priority (we are ISO 27001 certified). Open Co handles the complete fraud prevention pipeline seamlessly for good customers.

  • Advanced Technology: We perform intelligent data extraction from documents submitted by photo/upload.
  • Biometrics and Bureau: Continuous cross-referencing with public and private databases, facial biometric verification, and automatic anti-fraud questionnaires.
KYC & Background Checks

A Complete and Orchestrated Platform

Our solution acts as a central brain, integrating and managing the best tools on the market to shield your process from end to end.

01

Intelligent Anti-Fraud Provider Orchestration

Don't rely on a single solution. Our platform dynamically orchestrates multiple data providers and fraud prevention mechanisms.

Sequential Triggering by Risk Level

Starts with CPF validation and, based on identified risk, triggers facial biometrics, bureau consultation, or geolocation analysis.

Cost × Security Balance

The most robust checks are applied only when truly necessary, optimizing operational cost without sacrificing protection.

02

A/B Testing for Continuous Policy Optimization

The fraud landscape changes constantly. Our platform enables A/B testing with different policies and prevention tools for decisions always based on data.

Provider Comparison in Controlled Environment

Evaluate the performance of a new biometrics provider against the current one before making the definitive switch.

Approval Optimization and Fraud Blocking

Measure the impact of new validation rules and adjust your policies to approve more good customers with surgical precision.

03

Transparent Integration with Modern APIs

Security cannot hinder the user experience. Our APIs are designed for transparent, low-latency integration with your websites and applications.

No Redirects

All validations — facial biometrics, document checking — occur within your own journey, without the customer noticing they are being verified.

Low Latency

Real-time responses so as not to add friction to the conversion funnel, keeping good customers flowing quickly.

04

Device Data Collection & Analysis

For an additional layer of security in the mobile environment, our platform collects and analyzes user device data (with consent) to identify suspicious behavior.

Emulator and Coordinated Fraud Detection

Location, device model, and usage patterns reveal fraud attempts that would go unnoticed in registration validations.

Complementary Protection Layer

Acts in conjunction with other validations to strengthen protection barriers without impacting the legitimate customer's experience.

05

Data Extraction & Validation with Cutting-Edge Technology

Document Intelligence with OCR

Automatic extraction of data from documents submitted by photo or upload, with validation and cross-referencing in public and private databases in real time.

Biometrics and Liveness Detection

We ensure the customer is who they claim to be: selfie comparison with the document photo and identification of fraud attempts using a photo or pre-recorded video.