Skip to main content

What are Risk Signals ?

Risk Signals are supplementary services designed to enhance the functionality of standard workflows by providing additional layers of verification and security. These signals help verify user information, assess potential risks, and ensure compliance with regulatory requirements. Examples include address validation, device risk assessment, global identity checks, and various forms of data verification, such as email, phone, or government database checks.

However, the Risk Signals are treated like capabilities and are triggered automatically when the necessary information is available. While Risk Signals do not have strict dependencies, they rely on specific input Credentials depending on the context:

  • DATA Credentials typically provide sufficient input for most risk signals.
  • SELFIE Credentials are required when the signal involves biometric verification.
  • In some workflows, input is derived from extraction capabilities, which are triggered by ID or DOCUMENT Credentials.

The way these signals are applied ultimately depends on the workflow configuration, which defines how Credentials are used and how signals interact with other capabilities.

The Risk Signal services include:

Address Services
Department of Motor Vehicles Check
Device Check
Global Identity Check
Email Check
Government Database Checks
Phone Number Check
SSN Check
Geo IP Check
eKYC Check
tip

For an overview of how Jumio handles PASSED, WARNING, and REJECTED across all capabilities, see How Jumio Handles Results.