How it works
High-level overview
- The third‑party application sends transaction data to our backend.
- The backend resolves the referenced actors (e.g., people already verified through the platform) using the provided identifiers.
- The backend retrieves only the minimum required attributes from the user vault in the decentralized storage.
- The decentralized storage returns the requested attributes to the backend.
- The backend enriches the transaction with the retrieved attributes and prior checks.
- The backend submits the enriched request to the KYT engine.
- The KYT engine computes a risk score based on the enrichment and application‑defined rules.
- The KYT engine returns the risk score and explanatory reasons to the backend.
- The backend evaluates any triggers configured by the third‑party application.
- The backend returns the risk score and reasons to the third‑party application.
What is a trigger?
Triggers are application‑defined conditions evaluated against the risk score, reasons, and contextual attributes. Based on those evaluations, they can automatically:
- Approve the transaction
- Route it to manual review
- Reject the transaction
Triggers are configurable per use case and are evaluated immediately after the KYT response is received.