One Face.
Every Database.
deepidv biometric matching uses advanced facial recognition for 1:1 identity verification against ID photos and 1:N search across databases of millions of enrolled faces — with liveness detection, fraud ring detection, anti-spoofing, and configurable confidence thresholds.
99.7%
Accuracy
<1s
Response
1:N
Search
Why deepidv Biometric Matching Wins
1:N Face Search at Scale
- Search databases of millions of enrolled faces in under 1 second
- Detect duplicate accounts, fraud rings, and repeat offenders
- Sub-second search performance with ranked confidence scores
1:1 Identity Verification
- 99.7% true acceptance rate for selfie-to-ID matching
- Handles aging, glasses, facial hair, and diverse demographics
- Configurable confidence thresholds per use case
Liveness & Anti-Spoofing
- Active and passive liveness detection built in
- Catches photos, video replays, masks, and deepfakes
- ISO 30107-3 presentation attack detection
Fraud Ring Detection
- Identifies the same face across multiple accounts or applications
- Surfaces connected fraud attempts across your platform
- Cross-references against internal and external watchlists
Configurable Thresholds
- Tune matching sensitivity for your risk tolerance
- High-security, balanced, and convenience presets
- Per-use-case threshold configuration via API
Two Powerful Matching Modes
Choose Your Matching Approach
Different verification needs require different matching strategies
1:1 Verification
- Identity verification during onboarding
- Transaction authentication
- Account recovery
- Access control
1:N Search
- Duplicate account detection
- Watchlist screening
- Law enforcement identification
- Fraud ring detection
How 1:1 Verification Works
Step-by-step face comparison process
Capture Live Selfie
User takes a selfie with liveness detection to confirm a real person
Extract Face Template
AI extracts facial landmarks and generates a biometric template
Compare Against Reference
Template is compared to the reference photo from ID or database
Return Match Score
Confidence score returned with pass/fail based on your threshold
1:1 Verification Use Cases
Confirm someone is who they claim to be
Customer Onboarding
Verify new customers by matching their selfie against their government ID photo during account creation.
Transaction Authentication
Require face verification for high-value transactions, wire transfers, or sensitive account changes.
Account Recovery
Securely verify identity during password resets or account recovery without relying on knowledge-based questions.
Employee Verification
Confirm employee identity for secure facility access, time tracking, or remote work verification.
Age Verification
Match face against ID to confirm age for age-restricted purchases, services, or content access.
Return to Service
Re-verify returning users after extended absence or when risk signals indicate potential account takeover.
1:N Search Use Cases
Find matches across databases
Duplicate Detection
Prevent users from creating multiple accounts with different identities. Catch synthetic identity fraud.
Watchlist Screening
Screen faces against internal or external watchlists for known fraudsters, banned users, or persons of interest.
Fraud Ring Detection
Identify connected fraud attempts by finding the same face across multiple accounts or applications.
Access Control
Identify individuals entering secured areas without requiring them to present credentials.
Event Security
Screen attendees against watchlists or VIP databases for security and hospitality purposes.
Lost Person Search
Search databases to help locate missing persons or identify unresponsive individuals.
Accuracy & Anti-Spoofing
Built for Real-World Accuracy
Enterprise-grade biometric matching with advanced liveness detection
Matching Accuracy
- 99.7% true acceptance rate
- Less than 0.01% false acceptance
- Works across lighting conditions
- Handles aging and appearance changes
- Glasses, masks, facial hair support
- Multi-angle face comparison
Liveness & Anti-Spoofing
- Active and passive liveness detection
- Photo attack prevention
- Video replay detection
- Deepfake and mask detection
- 3D depth analysis
- Screen presentation detection
1:1 vs 1:N Comparison
1:1 Verification vs 1:N Search
Choose the right approach for your use case
1:1 Verification
- Compares two specific faces
- Confirms claimed identity
- Faster processing (single comparison)
- Lower computational cost
- Used for authentication
- Binary yes/no result
1:N Search
- Searches entire database
- Identifies unknown individuals
- Processing time scales with database
- Higher computational requirements
- Used for identification
- Returns ranked match list
Configurable Thresholds
Tune Matching to Your Risk Tolerance
Adjust confidence thresholds to balance security and user experience
High Security
Strictest thresholds. Minimizes false accepts at the cost of more false rejects. Best for financial services, government, and high-value transactions.
Use for high-stakes applications
Balanced
Optimized balance between security and user experience. Suitable for most identity verification use cases.
Recommended for general use
Convenience
Prioritizes user experience with lower thresholds. Best for low-risk scenarios like loyalty programs or event check-in.
Use for low-risk applications
Additional Biometric Capabilities
Face Quality Assessment
Automatically evaluate image quality before matching to ensure accurate results.
- Blur and focus detection
- Lighting quality assessment
- Face angle and pose evaluation
- Occlusion detection (masks, sunglasses)
- Resolution sufficiency check
- Real-time quality feedback to users
Database Management
Securely manage enrolled face databases for 1:N search operations.
- Encrypted biometric template storage
- Batch enrollment and deletion
- Database partitioning by group
- Automatic deduplication
- Retention policy enforcement
- Audit trail for all operations
Trusted & Certified

SOC 2 Type II
Audited security controls for data protection

GDPR Compliant
Full compliance with EU data privacy regulations

ISO 27001
International standard for information security

DIACC Member
Digital ID & Authentication Council of Canada
Ship Verification in Hours, Not Weeks
Our SDK gives you pre-built UI components, server-side libraries, and a sandbox environment so you can go from zero to live verification in a single sprint.
import { DeepIDV } from '@deepidv/sdk';
const client = new DeepIDV({
apiKey: process.env.DEEPIDV_API_KEY,
});
const verification = await client.verify({
type: 'identity',
checks: ['id-document', 'liveness', 'face-match'],
webhookUrl: 'https://yourapp.com/webhooks',
});
// verification.url → send to your user
// verification.id → track the sessionClient SDKs
Native SDKs for iOS, Android, and Web with drop-in UI components for ID capture, liveness, and document upload.
Server SDKs
Node.js, Python, and Go libraries to manage verifications, retrieve results, and configure workflows programmatically.
Sandbox Environment
Full-featured test environment with simulated ID documents, mock biometrics, and instant webhook delivery for rapid development.
Modular Architecture
Pick only the modules you need — ID verification, liveness, e-signatures, document management — and compose custom flows.
Experience the Difference
See how deepidv biometric matching can secure your verification process — it takes 60 seconds.
1 / 3
press Enter ↵
I'm interested in
Select all that apply
Explore More Products
Ready to verify with confidence?
See how deepidv can transform your verification process.
Frequently asked questions
Still have questions?
Our team is ready to help you get started.
