Know your customer
At SolidProof, we engage in a streamlined process that combines automated verification tools with manual authentication across multiple steps, ensuring a secure, accurate, and straightforward KYC (Know Your Customer) process. The KYC data storage is held offline on an AES-256 encrypted disk, ensuring the highest data security and confidentiality level.
*Our KYC process is supported with AI technologies from our third-party partner Veriff.com
Benefits of KYC
KYC helps mitigate the risks of identity theft, fraud, and money laundering. By verifying the identities of participants, blockchain platforms can prevent unauthorized access, minimize the potential for illicit activities, and ensure compliance with regulatory requirements.
By integrating the Solidproof KYC processes into blockchain systems, organizations ensure regulatory compliance, mitigating legal penalties and reputational harm, as jurisdictions mandate financial institutions to adhere to stringent KYC regulations.
Trust and Transparency
KYC implementation fosters trust and transparency in blockchain networks. By verifying the identities of participants, users can have increased confidence in the integrity of the network, knowing that all participants have undergone a vetting process.
KYC mitigates risks tied to unknown or unverified entities, aiding in assessing participant credibility. By linking real-world identities to blockchain addresses, it facilitates traceability, attributing actions to individuals/entities, enhancing accountability, deterring misconduct, and fostering greater responsibility in network participants.
KYC implementation allows for increased accountability within blockchain networks. By tying real-world identities to blockchain addresses, it becomes easier to trace and attribute actions and transactions to specific individuals or entities. This accountability can deter malicious activities and provide a higher level of responsibility among network participants.
Anti-Money Laundering (AML) regulations are designed to prevent the use of financial systems for money laundering and terrorist financing. KYC processes play a crucial role in enabling compliance with AML regulations by ensuring that participants are identified and verified, making it easier to track suspicious activities and report them if necessary.
Connect with Confidence
Trust through KYC
How to KYC
Booking a live call
After checking the details, you need to participate in a live call with one of our KYC specialists. In addition to reviewing the documents, we have a questionnaire about personal and project details.
After all previous steps have been completed, we perform a background check, which can take up to 48 hours depending on the project.
If the KYC is successful, all data is stored offline on an AES-256 encrypted disk.
At SolidProof, we prioritize the safety and security of our clients sensitive identity data. As a registered company in Germany with a legal notice, we comply with all necessary licenses and regulations for each service and product we offer. We store our clients data on secure AES-256 encrypted hard drives. Furthermore, our e-mail communications operate on an end-to-end encrypted Swiss server, ensuring the upmost data protection possible.
It is important to be cautious of other KYC providers in the market who may not be compliant or registered, lacking proper processes for identity verification and data protection. These providers often offer limited or no support to investors in case of fraudulent activities. With SolidProof, you can trust that your KYC needs will be met with professionalism, reliability, and the highest standards of security.
- Company Name, Address and Registration No.
- Passports of all founders (Front/Back), including a self-portrait
- Personal addresses of all founders
- Certificate of company registration
- One invoice (electricity, government, tax etc.) for address verification of the founder/s
In addition to these documents, clients that undergo a KYC will be required to participate in a live Zoom call to verify documents (including a live SMS for phone number verification), verify their identity through random requirements, and potentially provide business licenses if based in high-risk profile countries.