Why KYC is the conversion bottleneck
Onboarding flows lose 20-30% of users at the document-upload step when verification is slow, rejects valid documents, or breaks on unusual lighting. Manual review queues add hours of latency that crypto, neobank, and fintech onboarding can't afford. Regulators meanwhile expect a defensible audit trail proving every check was performed and every decision recorded — something OCR-based parsers don't provide out of the box.
How fluex does it
fluex extracts the document data (name, DOB, document number, issuing authority, expiry), validates structural integrity (MRZ checksum on passports, hologram patterns on IDs, layout integrity on US driver's licenses by state), and optionally runs a face-match against an uploaded selfie. Each step is logged with timestamps and confidence scores. The result is a single decision (pass / refer / fail) backed by a complete evidence record.
Sample extraction output
What you get out of the box
All US ID document types
US passports, driver's licenses (all 50 states), state IDs, utility bills, bank letters, selfies for face-match.
Structural integrity checks
MRZ checksum on passports, layout fingerprint match for state IDs, hologram pattern detection on enhanced IDs.
Face-match & liveness
Optional face-match against uploaded selfie + passive liveness detection. Bound by the same audit trail as extraction.
Regulator-ready audit
Every step (extraction, integrity, face-match, decision) logged with confidence scores and timestamps. Exportable for regulator review.
Integration patterns
fluex's verification API exposes one endpoint that handles upload, extraction, integrity checks, optional face-match, and decisioning. Webhook callbacks fire when verification completes. SDKs are available for Python, Node.js, Ruby, Go and .NET. Pre-built KYC flow components exist for React Native and Flutter for direct in-app verification without third-party redirects.
Compliance & trust
KYC documents include passport numbers, DOB, and biometric data (faces). fluex retains them encrypted at rest with per-tenant keys and offers configurable retention (default 30 days for KYC documents, can be 0). Face vectors are not retained beyond the verification request. AML / KYC retention requirements (5+ years) are met via the audit metadata, which retains decisions and timestamps without raw document content. See our trust page for the full posture: encryption, tenant isolation, sub-processors, GDPR DPA, CCPA, SOC 2 Type II in progress, and HIPAA BAA on Enterprise.
Get started
Pay-per-page pricing means you can start an evaluation today without an annual commit. Most teams ship their first KYC extraction into production within a week.