Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
Security Assurance

Proof of Identity Verification

BID (Beneficiary Identity Dispatch) performs exhaustive identity verification before funds move. Five check categories, seven vendor integrations, fail-safe architecture. Every check produces an auditable receipt with a risk score.

← All Proof
📱

Phone

TWILIO LOOKUP

Carrier ID, line type, subscriber name match, reachability assessment

📧

Email

DNS MX + SMTP

MX records, deliverability, disposable domain detection, role account flags

📍

Address

SMARTY (USPS)

USPS/intl standardization, deliverability, residential/commercial, geocoding

👤

Person

COMPLIANCE API

Sanctions (OFAC SDN), PEP status, adverse media, name match scoring

🏢

Company

MIDDESK + OPENCORPORATES

Registration verification, officer ID, UBO discovery, 140+ jurisdictions

7 Vendor Integrations

BID aggregates results from specialized providers for comprehensive identity verification. Person and company checks route through JIL's compliance infrastructure for sanctions and blockchain analytics screening.

  • Twilio - carrier lookup, subscriber name, reachability
  • Smarty (SmartyStreets) - USPS/international address validation
  • Middesk - US business registration, officers, UBO
  • OpenCorporates - global corporate registry (140+ jurisdictions)
  • Chainalysis KYT - transaction monitoring, wallet risk (40% weight)
  • TRM Labs - chain intelligence, entity attribution (35% weight)
  • Elliptic - wallet screening, source-of-funds analysis (25% weight)

Fail-Safe Architecture

When upstream providers are unavailable, BID continues using JIL's internal heuristic engine with reduced confidence. Response fields return null for data pending upstream enrichment. Trust scores are capped at 60 in degraded mode.

  • Graceful degradation per provider - no single point of failure
  • Internal heuristic engine validates format, patterns, checksums
  • Composite risk scoring (0-100) from available providers
  • Audit trail flags degraded checks for manual review
  • Every check produces a SHA-256 receipt hash
  • Kafka events emitted for all operations (11 event types)
View compliance architecture →

Ready to verify?

Start with a structured POC. Evaluate JIL settlement infrastructure on a single corridor.

Request a POC All Proof