Skip to main content
The Document Authentication V1 module validates the authenticity of a submitted identity document by running a series of forensic checks against the document image. It determines whether the document is genuine or shows signs of forgery or reproduction, and returns the result as a risk level (low, medium, or high) that reflects how strictly the document was evaluated.

Capabilities

The module returns four capabilities: three integer-based check failure counts and one overall authentication result.

Check failure counts

The module categorises the individual forensic checks it runs into three severity tiers. For each tier, it counts how many checks failed. These counts explain the severity distribution of failures behind the overall authentication result, which helps you decide whether to reject, escalate to manual review, or accept with conditions.

Number of significant checks failed

The number of high-severity authentication checks that failed. Significant checks test the most critical security features of a document, such as template structure, key security elements, and data consistency between the visual zone and machine-readable zone (MRZ). A failure in a significant check is a strong indicator of a forged, counterfeit, or fundamentally altered document.
DetailDescription
TypeInteger
Range0–100
Default0
A value greater than 0 indicates serious authenticity concerns. Even a single significant failure typically warrants rejection or manual forensic review.

Number of moderate checks failed

The number of medium-severity authentication checks that failed. Moderate checks test secondary security features and data consistency elements that contribute to overall document confidence but are less definitive than significant checks. Failures may indicate lower-quality forgeries, minor inconsistencies, or legitimate but unusual document variations.
DetailDescription
TypeInteger
Range0–100
Default0
A small number of moderate failures may occur on legitimate documents, particularly older documents, documents from countries with fewer security features, or documents captured under poor imaging conditions. The count should be interpreted alongside the overall authentication result.

Number of insignificant checks failed

The number of low-severity authentication checks that failed. Insignificant checks test minor features that have limited impact on the overall authenticity determination. Failures in these checks are common on legitimate documents and are unlikely to indicate fraud on their own.
DetailDescription
TypeInteger
Range0–100
Default0
These failures are typically informational. They may be useful for audit purposes or for organisations with very strict acceptance criteria, but they rarely warrant rejection on their own.

Document authentication result

This capability returns the overall outcome of the document’s authenticity checks. It uses the same risk-level model as V2, where the result code reflects the residual risk level after the document has been evaluated. The key concept: a document that passes under strict (high-sensitivity) checks carries low residual risk, while a document that passes under relaxed (low-sensitivity) checks carries higher residual risk. The result code names reflect this residual risk, not the sensitivity setting.
CodeLabelMeaning
lowRiskPassPassed with low riskThe document passed authentication under the strictest checks. Residual fraud risk is low. This is the strongest positive result.
mediumRiskPassPassed with medium riskThe document passed authentication under a moderate set of checks. Residual fraud risk is moderate.
highRiskPassPassed with high riskThe document passed authentication under the most relaxed checks. Residual fraud risk is higher. Consider combining this result with additional verification steps.
failedFailed authenticationThe document failed authentication checks entirely. It could not be validated as genuine. Possible causes include: the document does not match any known template, security features are missing or incorrect, data fields are inconsistent, or the document appears to be a reproduction.

Default outcomes

The outcome logic maps directly from the authentication result. Each result code produces a corresponding outcome. Unlike V2, which combines authentication and tamper detection results to determine the outcome, V1 uses only the single authentication result capability.
OutcomeConditionDescription
Low RiskAuthentication result includes lowRiskPassThe document passed under the strictest forensic checks. This is the highest-confidence positive outcome.
Medium RiskAuthentication result includes mediumRiskPassThe document passed under a moderate set of checks. Further review may be warranted depending on the organisation’s risk tolerance.
High RiskAuthentication result includes highRiskPassThe document passed under the most relaxed criteria. Residual risk is elevated. Organisations with strict fraud prevention requirements may want to route this outcome to manual review.
FailedAuthentication result includes failedThe document could not be verified as genuine. This outcome typically routes to rejection or escalation for manual forensic review.
ERRORDefault (no conditions matched)An unexpected error occurred during processing.
This module does not require its own input payload. It runs off of the document images already captured by the Document Classification module earlier in the journey.