The Document Authentication module validates the authenticity of a submitted identity document by running a series of forensic checks against the document image. It determines whether the document is genuine or shows signs of forgery, tampering, or reproduction. The module returns results at configurable sensitivity levels, allowing you to balance fraud detection strictness against user friction. This page contains documentation for the Document Authentication module, including its variants, capabilities, and the specific result codes it returns.Documentation Index
Fetch the complete documentation index at: https://docs.go.gbgplc.com/llms.txt
Use this file to discover all available pages before exploring further.
Document Authentication V2
The Document Authentication V2 variant analyses an identity document image to assess:- Whether the document itself is authentic for example, a genuine, unaltered government-issued document
- Whether the document shows signs of tampering for example, post-issuance modification of text, photographs, or security features.
Capabilities
The module returns two capability categories, both of which use the same set of sensitivity-based result values. Each capability can return one or more result codes.Understanding sensitivity levels
The module uses a sensitivity model that controls how strictly it evaluates documents. This is an important concept for interpreting results correctly, because the code names and their meanings are related:- High sensitivity: This applies the strictest checks. Fewer documents pass, but those that do carry the lowest risk. A document that passes at high sensitivity has cleared the most demanding forensic criteria.
- Medium sensitivity This applies a moderate level of checks. It balances fraud detection coverage with acceptance rates.
- Low sensitivity This applies the most relaxed checks. More documents pass, but those that do carry higher residual risk because fewer forensic criteria were evaluated.
LOW_RISK_PASS because passing strict checks means low residual risk. Also, a document that passes at low sensitivity is labelled HIGH_RISK_PASS because passing relaxed checks leaves higher residual risk.
| Code | Label | Sensitivity applied | Meaning |
|---|---|---|---|
LOW_RISK_PASS | Passed at high sensitivity | High (strictest) | The document passed the most rigorous checks. Residual fraud risk is low. |
MEDIUM_RISK_PASS | Passed at medium sensitivity | Medium | The document passed a moderate set of checks. Residual fraud risk is moderate. |
HIGH_RISK_PASS | Passed at low sensitivity | Low (most relaxed) | The document passed the least rigorous checks. Residual fraud risk is higher. |
FAILED | Caution | N/A | The document failed authentication checks entirely. It may be forged, counterfeit, digitally manipulated, or otherwise not authentic. This result warrants further investigation or rejection. |
Document authentication result
This capability returns the overall outcome of the document’s authenticity checks. It evaluates whether the document matches a known genuine template and whether its structural features such as layout, fonts, security elements, data consistency are consistent with an authentic document of that type.| Code | Description |
|---|---|
LOW_RISK_PASS | The document passed authentication at high sensitivity. The document’s layout, security features, and data fields are consistent with a genuine document of this type. This is the strongest positive result. |
MEDIUM_RISK_PASS | The document passed authentication at medium sensitivity. The document is likely genuine, but some forensic checks were either inconclusive or not applied at the highest strictness. |
HIGH_RISK_PASS | The document passed authentication at low sensitivity. The document met the minimum criteria for acceptance, but residual risk remains because fewer checks were applied. Consider combining this result with additional verification steps. |
FAILED | The document failed authentication. The document could not be validated as genuine. Possible causes include: - The document does not match any known template in the reference library - Security features are missing or incorrect - Data fields are inconsistent between zones - The document appears to be a reproduction such as a screen capture or photocopy. |
Document tampering result
This capability specifically evaluates whether the document has been altered after issuance. Tampering checks look for signs of post-production modification, such as digitally edited text or photographs, spliced images, pixel-level inconsistencies around data fields, or evidence of photo manipulation software. Tampering detection is different from the authentication check. A document can authenticate as a genuine type (matching a known template) but still fail the tamper check if its content has been modified, for example, a real passport with an altered name or swapped photograph.| Code | Description |
|---|---|
LOW_RISK_PASS | The document passed tamper detection at high sensitivity. No evidence of post-issuance modification was found under the strictest forensic analysis. This is the strongest indicator that the document has not been altered. |
MEDIUM_RISK_PASS | The document passed tamper detection at medium sensitivity. No clear evidence of tampering was detected, but some checks were either inconclusive or not applied at the highest strictness. |
HIGH_RISK_PASS | The document passed tamper detection at low sensitivity. The document met minimum tamper-free criteria, but fewer forensic checks were applied. Residual risk of undetected tampering remains. |
FAILED | The document failed tamper detection. Evidence of post-issuance modification was found. This may include altered text fields, a swapped or digitally edited photograph, inconsistencies in font rendering, pixel-level artefacts around data regions, or signs of image splicing. This result is a strong fraud indicator. |
Default outcomes
The module combines the authentication result and the tampering result to produce an overall outcome. These default outcomes can be used directly in evaluation and routing logic within the journey designer.| Outcome | Condition | Description |
|---|---|---|
Low Risk | Authentication and tamper detection both passed at high sensitivity (LOW_RISK_PASS) | The document is assessed as genuine and untampered under the strictest forensic checks. This is the highest-confidence positive outcome. The journey can proceed with confidence. |
Medium Risk | Authentication or tamper detection passed at medium sensitivity (MEDIUM_RISK_PASS) | At least one of the two checks returned a medium-sensitivity pass. The document is likely genuine and untampered, but further review may be warranted depending on your risk tolerance. |
High Risk | Authentication and tamper detection both passed at low sensitivity (HIGH_RISK_PASS) | Both checks passed, but only under the most relaxed criteria. The document met minimum acceptance thresholds, but residual risk is elevated. If you have strict fraud prevention requirements, you may want to route this outcome to manual review or request additional evidence. |
Caution | Authentication and tamper detection both failed (FAILED) | Both checks failed. The document could not be verified as genuine and shows signs of tampering. This outcome typically routes to rejection or escalation for manual forensic review. |
ERROR | Default (no conditions matched) | An unexpected error occurred during processing. This fallback outcome typically indicates a system-level issue rather than a problem with the document itself. |
This module does not require its own input payload. It runs off of the document images already captured by the Document Classification module earlier in the journey.