Device Intelligence

Detect fraud risk using device fingerprinting, tamper signals, and network indicators (VPN, emulator, root/jailbreak).

About service

The Device Intelligence check uses device fingerprinting and device risk signals to detect fraud. It inspects the device and network connection to identify tampering, automation, and suspicious behaviour.

This service supports a range of device types, including:

  • Mobile phones

  • Tablets

  • Laptops and desktop PCs

  • Kiosks and POS terminals

This service helps ensure that only trusted and genuine devices are used during customer onboarding.

Common use cases

Use Device Intelligence to reduce fraud across key customer journeys:

  • KYC onboarding and account opening: Spot high-risk devices early in your Workflows.

  • Account takeover (ATO): Detect unusual device fingerprints and network changes.

  • Bot protection: Identify automated sessions and scripted sign-ups.

  • Promo and referral abuse: Flag device reuse across multiple accounts.

Analysis performed

The check performs device, network, and bot risk assessments. It also tracks signals over time to identify repeat fraud patterns.

Detailed verification checks

Analysis
Verifications Performed

Device Analysis

  • Previously enrolled device: Flags devices reused across multiple customer accounts.

  • Emulator detection: Flags attempts to use virtualized or emulated devices.

  • Rooted/Jailbroken device: Detects compromised operating systems with escalated privileges.

  • Cloned app: Identifies duplicate or cloned versions of applications.

  • Browser tampering: Detects altered or suspicious browser setups.

  • Virtual machine: Flags devices running inside virtual environments.

  • Location spoofing: Detects falsified or masked geolocation signals.

  • Frida detection: Detects mobile debugging and manipulation frameworks.

Network Analysis

  • VPN detection: Identifies usage of Virtual Private Networks.

  • Relay detection: Detects relay service providers.

Bot Analysis

  • Bot detection: Detects whether sessions are automated or bot-driven.

Timeline Analysis

  • Device timeline analysis: Monitors device behavior patterns across sessions.

  • Network timeline analysis: Tracks network usage over time to spot anomalies.

Check duration

A Device Intelligence Check takes an average of 2 seconds to complete.

Combine Device Intelligence with other fraud intelligence signals:

  • Email Intelligence for email reputation and threat signals, including disposable email detection and breach exposure.

  • Mobile Intelligence for phone number risk scoring and reputation signals.

Use these to run Device Intelligence Check inside a broader KYC orchestration and decisioning:

  • Workflows to orchestrate verification checks into a unified customer journey.

  • Policies to enforce consistent decision logic across different journeys.

  • Advanced Case Management to handle exceptions, assign tasks, and manage reviewer decisions.

Last updated

Was this helpful?