DEV Community

Cover image for I cut manual KYC reviews by 87% with device intelligence (and you can too)
Stuart Watkins
Stuart Watkins

Posted on • Originally published at zenoo.com

I cut manual KYC reviews by 87% with device intelligence (and you can too)

TL;DR: Traditional document-based KYC is failing against remote-access fraud and synthetic identities. By integrating device intelligence into verification workflows, one major fintech boosted auto-approvals from 75.7% to 92.5% and slashed manual reviews by 87%. Here's the technical breakdown and implementation guide.

The £285M wake-up call

Last quarter, Drift Exchange lost $285 million to North Korean hackers. The attack vector? Compromised employee credentials and remote access tools that bypassed traditional KYC controls. Meanwhile, compliance teams are drowning in manual reviews: the average fintech processes 19.2% of onboarding applications manually, burning analyst time on passport photos and video calls that sophisticated attackers easily circumvent.

I've spent the last six months analysing identity verification workflows across 40+ financial services companies. The pattern is consistent: teams relying solely on document verification are missing the forest for the trees. The real signal isn't in the passport photo quality. It's in the device behaviour, network patterns, and persistent risk indicators that traditional KYC ignores.

Why document-first verification fails

Most KYC workflows follow this sequence:

  1. Document upload (passport, driving licence)
  2. Liveness check or video call
  3. Manual review if anything flags
  4. Approval or rejection

This approach has three critical flaws:

Remote access invisibility: Document verification can't detect when legitimate credentials are being used from compromised devices or remote-access tools. In one recent case study, over 7,650 risky devices were flagged in a single fintech deployment. These weren't stolen documents; they were legitimate users whose devices had been compromised.

Synthetic identity blind spots: Fraudsters combine real and fake information to create synthetic identities that pass document checks but fail behavioural analysis. A genuine passport photo with fabricated personal details will clear most document-based systems.

Scale limitations: Manual review queues become bottlenecks. At 19.2% manual review rates, a team processing 1,000 applications daily needs to manually verify 192 cases. That's unsustainable for any growing organisation.

The device intelligence approach

Device intelligence shifts verification focus from "what documents do you have?" to "how are you behaving?" Here's the technical architecture that reduced manual reviews by 87%:

Core data points

interface DeviceSignature {
  deviceId: string;
  fingerprint: {
    screenResolution: string;
    timezone: string;
    language: string;
    userAgent: string;
    plugins: string[];
  };
  networkInfo: {
    ipAddress: string;
    isp: string;
    vpnDetection: boolean;
    locationConsistency: number;
  };
  behaviourMetrics: {
    typingPattern: TypingPattern;
    mouseMovement: MousePattern;
    touchBehaviour?: TouchPattern;
  };
  riskIndicators: {
    remoteAccessDetected: boolean;
    deviceReputationScore: number;
    locationAnomalies: LocationAnomaly[];
  };
}

interface TypingPattern {
  averageSpeed: number;
  keyDwellTime: number[];
  rhythmConsistency: number;
}

interface LocationAnomaly {
  timestamp: string;
  expectedLocation: GeoCoordinates;
  actualLocation: GeoCoordinates;
  discrepancyKm: number;
}
Enter fullscreen mode Exit fullscreen mode

Implementation workflow

The enhanced verification process runs parallel checks:

interface VerificationResult {
  documentScore: number;
  deviceTrustScore: number;
  behaviouralRiskScore: number;
  overallDecision: 'APPROVE' | 'REJECT' | 'MANUAL_REVIEW';
  confidenceLevel: number;
}

async function runParallelVerification(
  application: Application
): Promise<VerificationResult> {
  const [documentResult, deviceAnalysis, behaviourProfile] = await Promise.all([
    verifyDocuments(application.documents),
    analyseDevice(application.deviceSignature),
    buildBehaviourProfile(application.sessionData)
  ]);

  const riskScore = calculateCompositeRisk({
    document: documentResult.score,
    device: deviceAnalysis.trustScore,
    behaviour: behaviourProfile.riskLevel
  });

  return {
    documentScore: documentResult.score,
    deviceTrustScore: deviceAnalysis.trustScore,
    behaviouralRiskScore: behaviourProfile.riskLevel,
    overallDecision: determineDecision(riskScore),
    confidenceLevel: riskScore.confidence
  };
}
Enter fullscreen mode Exit fullscreen mode

Real-world results

When Webull Brazil implemented device intelligence alongside traditional document verification, the results were dramatic:

  • Auto-approval rate: 75.7% → 92.5% (+22%)
  • Manual review rate: 19.2% → 2.5% (-87%)
  • Remote-access threats detected: 7,650+ flagged devices
  • Processing time: Average 3.2 hours → 47 seconds

The key insight: device intelligence doesn't replace document verification; it provides the missing context layer that allows systems to auto-approve genuine users whilst flagging sophisticated threats.

Implementation considerations

Privacy compliance: Device fingerprinting must comply with GDPR and local privacy laws. Implement explicit consent flows and data retention policies.

False positive management: Set conservative thresholds initially. A 2.5% manual review rate is optimal; lower rates risk missing genuine threats.

Integration architecture: Device intelligence works best as a microservice that enriches your existing KYC pipeline rather than replacing it entirely.

interface KYCPipeline {
  documentVerification: DocumentService;
  deviceIntelligence: DeviceIntelligenceService;
  riskScoring: RiskScoringEngine;
  decisionEngine: DecisionEngine;
}
Enter fullscreen mode Exit fullscreen mode

Beyond the initial onboarding

The real value emerges in ongoing monitoring. Device signatures create persistent identity anchors that detect account takeovers, session hijacking, and credential stuffing attacks post-onboarding.

Traditional KYC ends at account approval. Device intelligence provides continuous verification throughout the customer lifecycle.

The compliance reality

With regulatory scrutiny intensifying and fraud losses mounting (£285M in a single exchange hack), compliance teams need verification systems that scale without sacrificing security. Document-only approaches are breaking under the weight of sophisticated attacks and manual review bottlenecks.

Device intelligence offers a path forward: higher auto-approval rates, dramatically reduced manual work, and better fraud detection. The technology exists today, and the business case is proven.

If you're building compliance flows and want to see how device intelligence integrates with identity verification workflows, check out zenoo.com.

Top comments (0)