We are hiring! Check out our careers page. By using our website, you agree to the use of our cookies.
   We are hiring! Check out our careers page. By using our website, you agree to the use of our cookies.

Accessing Mesh ID

Yes. We are able to offer connectivity to your internal systems using APIs. We offer Mesh ID as a software-as-a-service, meaning an integration is not required to benefit from the power of remote verification and sharing features.

Please contact us at support@meshid.com with a request to reset your Multi-Factor method.

Our service runs on best-in-class server infrastructure with guaranteed 99.95% availability and global coverage using the world’s fastest content delivery network Cloudflare. Please see https://status.meshid.com for real time statistical data on uptime and downtime.


We offer the entire verification experience for your clients fully branded with your logo and colours. Your clients will experience Mesh ID as your service.

We can get your staff remotely verifying your client’s identities within 24 hours of signing. We offer a fast-track service at no extra cost, ensuring all your staff members are set up and trained within a matter of hours. For our ‘Onboard’ offering, it may take up to 6 weeks to get fully operational. If you are in urgent need to remotely verify identities of a new client, please reach out to us and we will give you immediate access.

We respect our clients’ need for privacy and do not disclose the names publicly. Mesh ID services global market leaders in fund management, fund administration and family offices. We have also added logos on our website of organisations who use the same underlying verification technology available through Mesh ID. 


Absolutely. Mesh ID is built upon the latest in blockchain technology, including the ability to have full auditability of all transactions that occurred, ensuring full data integrity. We do not store any personal information on the blockchain database but instead hold metadata about the transactions. Using a structured and secure way of capturing and verifying your client information is key in showing regulators you have control of your processes.

Every jurisdiction and regulator will have their own view on the use of electronic means to identify clients. In general however, regulators are very open to the use of digital technologies, and focus more on the process a regulated firm puts in place to ensure it is used in the best way possible. Mesh ID offers capabilities to automate most parts of the onboarding journey and compliance checks. However, how your organisation chooses to use these capabilities will be the biggest determinant factor for regulators. Our clients are global in nature and use Mesh ID across all their offices. We can provide best practices knowledge to help you evaluate your specific situation. Our Compliance Advisory team are ready to help you understand what is permitted and how best to apply the building blocks offered by Mesh ID in a fully compliant manner. We do not charge extra for providing advisory services. Please reach out to our team to learn more.

Mesh ID is a private limited company registered in The Netherlands. We are backed by several executives from the funds, trust and corporate services industry who believe in our long-term vision. Mesh ID does not need to be regulated, as we provide software and data solutions, and do not perform any compliance or risk assessment activities on behalf of our (regulated) clients.

The technology underlying Mesh ID provides sufficient capabilities for regulated providers in Luxembourg to comply with CSSF regulations. The compliance processes and policies you employ will determine in which scenarios the use of Mesh ID will help you meet or exceed the local Luxembourg regulatory requirements. Our compliance advisory team can advise your internal compliance team on the best way to use Mesh ID, and help you evaluate your current processes in relation to the CSSF’s view on the use of digital KYC/CDD and verification technologies such as Mesh ID.

Yes. Mesh ID is a company registered in The Netherlands, and therefore are bound by all European data privacy and security regulations (including GDPR). We provide all the tools you need to remain GDPR-compliant towards your clients. Mesh ID views itself as a (sub-)processor of personal information, and requires you to have the proper data processing agreements in place with your clients.

Mesh ID supports the onboarding journey by providing compliance building blocks to automate the capturing, verification, enrichment and sharing of KYC/CDD information. Using Mesh ID provides significant operational efficiencies, allowing compliance staff members to focus on assessing risk rather than menial collection, and also provides end-clients a smooth and seamless onboarding experience. Not using Mesh ID means a slower and more labour-intensive process, but does not impede a regulated firm from fulfilling its AML duties, as it is always possible to collect information using traditional (pen, paper, post) means such as email. Therefore, in most cases it is not considered material outsourcing but may be considered general outsourcing. Every regulated firm will need to complete their own business risk assessment (BRA), and ensure backup processes are in place. We can provide you the underlying information you need to perform your BRA. Please contact us to learn more.


Absolutely not. We ensure all data is encrypted for, and only visible to, specific audiences that are defined by you. You control who you allow to view your sensitive information.

Mesh ID uses the same data security methods and practices as large institutional banks. Founded by a group of professionals from the global Corporate and Fund Services industry, we know better than anyone how important data security and privacy is for regulated industries. We have more detailed information about how we secure your data available for download here

We leverage best-in-class in cloud server and storage technology (Amazon Web Services), ensuring all data remains within the European Union (Dublin, Ireland). All data is stored and transferred in a fully end-to-end encrypted state. Check out our security and privacy factsheet for more information

Using Verifications

Yes. We support all different forms of identity in 200+ countries across the globe, including China. Click here if you would like to see a complete list of countries and ID types.


You can customize the screening by defining a ‘screening scope’ (in a percentage), which controls how wide or narrow a search you would like to do in relation to the name of the person of entity. For example a wide search of “Chloe Smith” would also include Chloe Smithson, or Chloe Sophia Smith, whereas a narrow search would only pick up Chloe S. Smith or Khloe Smith. You can perform multiple searches if you want to check results at a narrow or wide setting. In addition, you can add a further refinement in the searching criteria in the form of a date of birth for individuals. At every screening you are also able to adjust the name to find different results. By adjusting the screening scope, you define how far to deviate from the first and last name you are providing.

The more deviation from the exact term, the more results you will get, however the higher chances of false positives. We advise 30% as a standard setting, however this will depend on the type and length of name you are searching for. Our tests have shown that 30% will provide the optimum level of results for more situations. The screening scope will deviate from the term in these ways: – different spelling of names e.g. ‘Nik’ instead of ‘Nick’, ‘Elisabeth’ instead of ‘Elizabeth’ – shortened names e.g. ‘Elizabeth’ matches with ‘Elisa’, ‘Elsa’, ‘Beth’, ‘Betty’, etc. – insertion/removal of punctuation and spaces – name variations – name reversal – inadvertent misspellings – deliberate misspellings – phonetic spellings – abbreviations e.g. ‘Ltd’ instead of ‘Limited’.


To further refine the scope to produce more targeted results, we offer two options: adding a date of birth, and choosing to search on the exact term provided (a scope of 0%, meaning no deviation from the name). These are both ways of narrowing the search, and producing only very relevant results. However, similar to Google searches, you rely on the articles including the exact terms and dates. This would be a good way to search for a John Smith, since even using a narrow scope of 30% will produce many false positives. Adding his date of birth will help you refine the search to only a specific person.

Note: It is worth adding that if you check the option to for an ‘exact match’, it will ignore the screening scope/fuzziness settings.

We take an evidence-based approach to verifying addresses by giving you a range of data points collected about the subject and their location, helping you make an informed decision based on the accuracy of the client’s claimed residential address.

We collect datapoints surrounding:

– GPS location of the device going through the process,

– Device fingerprinting (checking operating system and manufacturer and device IDs),

– A security scan of the internet connection (checking to see if the client is trying to spoof their location by using a virtual private network, a proxy server connection or even pushing the connection through dark web networks),

– Capturing of the IP address then checking this against known telecom provider databases to determine internet service provider, last known allocation, and geolocating the source of the connection to the nearest internet hub.

– An option to collect documentary evidence such as a utility bill or other (for now the client is able to upload the document and provide some date fields describing the document), and

– The possibility to send a physical piece of mail to the address with a code which needs to be typed in during the process.

Once the person completes the process, it takes on average one minute for the verification to be fully processed. It could take up to 5 minutes for the verification to complete and the final result to be available and visible to you. To see the latest status of a verification, please refresh your browser window and check again.

Mesh ID uses the same verification and fraud detection technology as large institutional banks use for their corporate clients. The liveness detection (checking if the person was physically present for the transaction) is rated at iBeta Level II (your iPhone face detection is rated at iBeta Level 0). Not even ‘mission impossible’-style rubber masks can fool it. Reach out to us to do a test verification at no cost.

Here are some common issues faced:

– Clients might be using an unsupported type or format of document (for example, a photocopy of the document, picture of a screen, etc.)

– Clients might be going through the process on an unsupported device and/or browser

– Part of the document may be missing or covered by a digit

– The room is not well-lit and parts of the documents are shadowed, or there is a glare or reflection blocking some key pieces of information

– Clients do not follow the instructions, and provide different content or images than expected (e.g. an image of the document instead of a selfie

You can also check our troubleshooting guides and you can always contact support@meshid.com in case you need further assistance.

During an identity verification, three checks are performed: Likeness check, Liveness check, and Validity check.

The likeness check ensures the person holding the identity document bares a likeness to the person pictured in the document. The liveness check uses the selfie captured to verify that the person was physically present during the transaction, and lastly the document validation check ensures the identity document is authentic and valid by checking if all the security features like microprints and holograms are present.

The following general advice should be sufficient to resolve most common problems with identity verifications:

1. First check the status of the verification in detail. There is a detailed description of why the verification failed inside the ‘Checks performed’ or ‘Digital verifications’ section. If available, you can preview the images of the document the person captured to see if there are any obvious signs of obstruction of key parts of the documents.

2. You can ask the person to ensure they are following the on-screen instructions correctly. If the person is being asked to capture an image of the document, they will receive tips and tricks on how best to position the document. During the selfie step, they are guided through aligning their face to an oval shape.

3. The person will need to allow permission for the website to access their camera on their device, or if uploading will be asked to grant permissions to their local storage. When they deny this permission once, depending on the mobile device the request for permission may not return. They will need to enable the permission manually in their device settings.

4. Ask the person to check if anything is covering the document and that the entire document can be clearly seen with all the details of the document sharp and visible.

5. It may help for the person to move to a well-lit room, and make sure that they are facing a window. Light coming from their back may cause their face or document to be too dark and shadowed.

6. If you cannot identify the exact issue, you may want to ask the person to follow the process in another browser / on another device. Devices can sometimes be locked or limited by organisations, so using a person device may solve the issue. You can also check the troubleshooting guide here and you can always contact support@meshid.com in case you need further assistance.