HomeGuidesChangelog
Log In
Guides

Checks

Comprehensive suite of identity checks that run on every query, collapsing multiple data providers into one call.

Check Packages

Each Check is packaged thematically oriented around what input is provided as well as connections we make through Fideo's patented identity graph. Generally, customers receive full Verify Suite of packages, but based on use case they may have interest in only one or a few.

  • Synthetic Identity
    Spot fabricated profiles through mismatched personal details and abnormal device/IP linkages.

  • Breached
    Surface recent credential exposures to block account takeovers and credential‐stuffing attacks.

  • Digital
    Measure online footprint cohesion via social profiles and browsing behavior to detect synthetic or mule identities.

  • Email
    Evaluate address age, activity, deliverability and format to distinguish disposable or invalid accounts.

  • Identity
    Screen against global sanctions lists, check age vs. birthday consistency, and flag compromised or over‐connected identities.

  • IP Address
    Classify connection types (e.g. TOR, VPN, residential) and verify geolocation against declared address.

  • Location
    Confirm that supplied addresses are valid, properly formatted, and residential versus business.

  • Phone
    Track number origin, usage recency and formatting to catch burner lines and port‐based evasion.

By orchestrating these checks in real time, Fideo helps businesses reduce fraud losses, streamline user onboarding, and safeguard genuine customers from identity theft. Our forward-thinking approach continuously adapts to emerging threats—ensuring every digital interaction meets the highest standards of trust and security.

Check Field Reference

  • id
    Unique string key for each check (e.g. IDENTITY_FULL_NAME_MISMATCH). Usage: Use as a “hot route” lookup in your logic or UI to trigger workflows, alerts, or conditional rendering based on which check fired.

  • state
    Outcome of the check (one of the enum values that map to a risk level). Usage: Drives decisioning—e.g. if state is UNKNOWN or FALSE, map to risk and enact hold, review, or decline flows.

  • name
    Short, human‐friendly label for tooltips and badges. Usage: Display in condensed UI elements (e.g. hover tooltips, status chips) to convey the check result at a glance.

  • description
    Longer explanation of what the check result means. Usage: Surface in detail panels or help dialogs to guide analysts or end‐users through why a check passed or failed.

  • risk
    Categorized severity (NONE, LOW, MED, HIGH). Usage: Feed into your overall risk score, throttling rules, or alert thresholds to prioritize investigations.

  • checkPackage
    Logical grouping (e.g. “Synthetic Identity”, “Email”, “Digital”). Usage: Organize reports and dashboards by category; roll up metrics and SLAs per package to track coverage and performance.

Each check will come back in the following form, example:

{
  "id": "IDENTITY_OFAC_LIST",
  "state": "IDENTITY_NAME_LOC",
  "name": "Identity name and location matches OFAC list",
  "description": "The identity name and location matches the OFAC list, indicating a potential risk.",
  "risk": "HIGH",
  "checkPackage": "Identity"
}