Core Product Deep Dive
Powering Your Onboarding and Compliance Workflows
The FrankieOne platform is composed of a suite of modular, interconnected products. Each is designed to address a specific piece of the identity lifecycle puzzle. This allows you to build a flexible, risk-based workflow that is perfectly tailored to your business needs, from initial onboarding to ongoing monitoring.
Available Features
These features are available today in the FrankieOne platform.
KYC Checks
What it is: This is our core identity verification engine. It orchestrates the process of checking customer-provided data (e.g., name, DOB, address) against an extensive network of authoritative data sources, such as government databases, credit bureaus, and utility records. The engine intelligently queries sources until a sufficient level of identity assurance is achieved according to your configured rules.
Key Benefits:
- Fulfils Core Compliance: Satisfies the fundamental Customer Identification Program (CIP) requirements under global AML/CTF regulations.
- High Confidence Verification: Leverages data triangulation from multiple sources to provide a high degree of confidence that a customer is who they claim to be.
- Global Reach: Verify customers from around the world by connecting to our vast network of international and local data sources.
Common Use Case: The foundational identity check for opening any new financial account, gaming account, or other regulated service.
AML Screening & Monitoring
What it is: This feature screens your customers against thousands of global watchlists, including Politically Exposed Persons (PEPs), Sanctions lists, and official wanted lists. It also scans for Adverse Media—negative news from reputable global sources—to build a complete picture of a customer’s risk profile. Screening can be performed at onboarding and configured for ongoing monitoring to catch any changes in status.
Key Benefits:
- Enables Enhanced Due Diligence: Go beyond identity verification to understand a customer’s potential risk based on their associations and public profile.
- Automated Ongoing Compliance: Continuous re-screening ensures you are immediately alerted if a customer’s risk status changes, allowing for proactive intervention.
- Protect Your Reputation: Avoid doing business with sanctioned individuals or entities and make informed, risk-based decisions.
Common Use Case: Screening all customers at onboarding, and performing ongoing monitoring for high-risk customers to meet EDD requirements.
ID Verification & OCR
What it is: ID Verification (IDV) automates the validation of government-issued identity documents. Using Optical Character Recognition (OCR), it instantly extracts key information (name, DOB, document number) from a photo of a document like a passport or driver’s license, pre-filling it for the customer. It then runs checks to help assess the document’s authenticity.
Key Benefits:
- Accelerate Onboarding & Boost Conversion: Drastically reduces manual data entry, creating a faster, smoother experience for your users and reducing drop-off rates.
- Improve Data Accuracy: Minimizes human error by capturing data directly from the document, ensuring your records are accurate from the start.
- Global Document Coverage: Supports thousands of identity document types from over 200 countries and territories.
Common Use Case: A fast and user-friendly way for customers to provide their details during a digital onboarding process.
Liveness & Facial Comparison
What it is: This is a powerful biometric security feature that provides high identity assurance. Liveness Detection requires a user to perform a real-time action (like a selfie or a short video), proving they are physically present and preventing fraudsters from using static photos or deepfakes. Facial Comparison then biometrically matches the live image of the person to the photograph on their government-issued ID document.
Key Benefits:
- Highest Level of Identity Assurance: Provides strong cryptographic proof that the person creating the account is the legitimate owner of the ID document they presented.
- Prevent Sophisticated Fraud: Acts as a critical defense against identity theft, account takeover, and advanced spoofing attacks.
- Build User Confidence: Signals to genuine customers that you take their security seriously.
Common Use Case: Required for high-risk transactions, opening financial accounts, or as a step-up verification method when suspicious activity is detected.
Individual Risk Assessment
What it is: The Risk Assessment engine is a dynamic calculator that assigns a customizable risk score to each customer. It analyzes multiple data points in real-time—such as the customer’s geographical location, the results of AML checks, document verification outcomes, and even device intelligence—to produce a holistic risk profile based on rules you define.
Key Benefits:
- Dynamic, Risk-Based Approach: Move beyond static checks and automate your due diligence levels based on a customer’s calculated risk.
- Drive Operational Efficiency: Automatically fast-track low-risk users for a frictionless experience while flagging high-risk customers for Enhanced Due Diligence (EDD) by your compliance team.
- Auditable Compliance: Provides a clear, data-driven, and auditable trail explaining why a customer was assigned a specific risk level.
Common Use Case: Used as the central “brain” of a compliance workflow to direct customers down different paths (e.g., low, medium, high risk) based on their profile.
Blocklist Management
What it is: This feature allows you to create, manage, and enforce your own internal lists of individuals, entities, or attributes (like email domains or IP addresses) that you have deemed unacceptable based on your own risk appetite and internal findings. The system will automatically check new and existing customers against these lists.
Key Benefits:
- Customised Control: Gives you direct and immediate control over who you do business with, complementing global watchlist screening with your own internal intelligence.
- Proactive Fraud Prevention: Stop known bad actors at the front door before they can transact on your platform.
- Centralised Risk Intelligence: Provides a single, easy-to-manage source of truth for all blocked entities across your organization.
Common Use Case: Blocking users who have previously committed fraud, abused promotions, or been identified as high-risk by your internal investigations team.
Duplicate Detection
What it is: This is a powerful data integrity tool that intelligently scans your customer base to identify and flag potential duplicate or linked accounts. It uses sophisticated “fuzzy matching” logic to find profiles that likely belong to the same individual, even with slight variations in names, addresses, or other personal information.
Key Benefits:
- Maintain a Single Customer View: A clean and accurate customer database is crucial for effective compliance, risk management, and marketing.
- Prevent Policy Abuse: Stop individuals from creating multiple accounts to circumvent trading limits, abuse sign-up bonuses, or engage in collusive fraud.
- Strengthen Compliance: Ensures accurate risk assessment and regulatory reporting by linking all of a customer’s activity to a single, unified profile.
Common Use Case: Running periodic checks on the customer database to identify and merge duplicate accounts, or checking for duplicates in real-time at onboarding.
Onboarding Fraud
What it is: Onboarding Fraud is a feature that enables customers to incorporate fraud signal checks—such as device fingerprinting, IP address analysis, phone number intelligence, and email address reputation — directly into their KYC (Know Your Customer) onboarding workflows. By adding this as a configurable step, it is possible to make smarter, risk-based decisions during user onboarding to better detect and prevent fraud in real-time.
Key Benefits:
- Early fraud detection: Identify high-risk users before account creation using critical signals like device, IP, phone, and email data.
- Risk-based friction: Dynamically adjust onboarding friction-introducing additional verification for suspicious users, while streamlining the experience for legitimate customers.
- Customizable integration: Easily drag and drop the fraud signal step into existing onboarding flows, enabling rapid deployment without major development work.
- Improved conversion rates: Reduce false positives and onboarding abandonment by allowing low-risk users to pass through with minimal intervention.
Common Use Case: Enable smarter onboarding decisions by plugging fraud signal checks into KYC flows and enable risk based onboarding.
Coming Soon: The Future of Compliance
We are continuously innovating to address the next generation of compliance and fraud challenges. The following capabilities are in active development and will be available in upcoming releases.
Self-Service Onboarding Journeys
What it is: A low-code solution that allows you to design, customize, and deploy beautiful, fully-hosted onboarding flows in minutes. Build journeys that are perfectly aligned with your brand and risk policies without writing a single line of code, all managed from the FrankieOne portal.
Key Benefits:
- Rapid Speed-to-Market: Launch or update your entire onboarding experience in a fraction of the time.
- Reduce Engineering Dependency: Empower your product and compliance teams to make changes on the fly without needing developer resources.
- Optimized for Conversion: Leverage pre-built, best-practice UI/UX to ensure a seamless and intuitive customer experience.
Common Use Case: For businesses that want to quickly deploy a best-in-class, branded onboarding flow with integrated KYC, AML, and fraud checks.
Transaction Monitoring
What it is: A real-time engine that monitors customer transactions against a library of pre-defined rules and ML-driven typologies to detect suspicious activity. It provides a full case management interface for investigation and streamlines the process of regulatory reporting (e.g., SARs/SMRs).
Key Benefits:
- Real-Time Threat Detection: Identify and act on suspicious financial behaviour like structuring, layering, and potential sanctions breaches as they happen.
- Holistic Customer View: Link transaction data to a customer’s KYC profile to gain a complete understanding of their risk.
- Automated Compliance: Fulfill your regulatory obligations for ongoing monitoring and reporting with maximum efficiency.
Common Use Case: Monitoring customer deposits, withdrawals, and transfers to identify behaviour inconsistent with their profile and detect potential money laundering schemes.
AI-Powered AML Investigation
What it is: A generative AI co-pilot for compliance teams. When an AML alert is triggered, our AI agent automatically investigates by analyzing the customer’s profile, transaction history, and screening results. It then provides a plain-language summary and a preliminary recommendation, dramatically accelerating the investigation process.
Key Benefits:
- Supercharge Analyst Efficiency: Reduce the time spent on manual investigation for each alert by up to 90%.
- Focus on Critical Risks: Allow your expert compliance officers to focus their time on the most complex and high-risk cases.
- Ensure Consistency and Auditability: Generate consistent, high-quality investigation narratives for every alert, creating a robust audit trail.
Common Use Case: Automatically investigating a PEP or Adverse Media alert by summarizing the findings and presenting them to a compliance analyst for a final decision.
Digital Identity Verification
What it is: This feature allows you to verify customers using trusted, government-backed digital identity schemes. Instead of scanning a physical document, users can consent to share their verified identity attributes directly from a secure, government-managed digital wallet or app, providing the highest possible level of identity assurance.
Key Benefits:
- Highest Level of Assurance: Leverage the security and trust of government-run identity programs.
- Frictionless Customer Experience: Offer a fast, password-less, and incredibly simple verification method for users who have a digital ID.
- Future-Proof Your Platform: Stay ahead of the curve as digital identity adoption grows globally.
Common Use Case: Offering an express onboarding path for customers in countries with established digital ID frameworks (e.g., Australia’s myGovID, Singapore’s Singpass).
Ready to Build with Confidence?
You’ve seen the powerful, modular components that make up the FrankieOne platform. These tools are designed to be combined and configured to create the perfect solution for your unique business needs—whether you require a simple, fast identity check or a multi-layered, real-time risk management workflow.
Take the next step to see how FrankieOne can secure and accelerate your business.
Have questions about your specific use case or regulatory requirements? Schedule a free consultation with our identity specialists to design your ideal workflow.
Ready to start building? Dive into our comprehensive API documentation, explore our SDKs, and follow our quickstart guides to get integrated in minutes.
