How Verity Works
A modern verification system — precise, compliant, and identity-bound.
Verity turns background checks into portable, cryptographically assured credentials that stay linked to the person they describe. This is verification rebuilt as architecture — secure, structured, and engineered for reuse.
1. Enrollment
Establishing identity with presence and integrity.
Every candidate begins with a secure enrollment flow:
- Invite received from a recruiter, employer, MSP, or staffing provider.
- Device-bound key generation creates a secure, on-device identity that never leaves the device.
- Biometric binding ensures only the rightful person can access or use the credential.
- Local authentication only: biometrics are not transmitted, stored centrally, or used as a template.
This step establishes the cryptographic and biometric foundation that will anchor every subsequent proof.
2. Identity Verification (eKYC + Liveness)
Proving who they are — accurately, consistently, and in compliance.
Verity performs a regulated identity verification ceremony:
- Document capture (government-issued ID)
- Face match
- Liveness detection
- Watchlist checks (where permitted)
- Fraud and spoof detection
The output of this stage is authoritative identity truth — validated under strict regulatory constraints.
3. Regulatory Disclosures & Consent
The compliance ceremony — standardized at the source.
Before any background check activity begins, Verity collects:
- FCRA disclosure
- State-specific addenda
- DPPA acknowledgements
- Purpose-specific permissions
- Evergreen or time-bound consent
- Audit-grade records of acceptance
Every requirement is captured with precision and stored with cryptographic integrity. This eliminates the inconsistency, omission, and drift seen in legacy workflows.
4. Background Check Intake
Clean, structured data collection — built for accuracy.
Candidates complete a dynamic intake process:
- Address history
- Employment and education details
- License or certification data
- Position or industry-specific information
- Optional document uploads (W-2, paystubs, etc.)
Forms adapt to jurisdiction, role type, and employer configuration — reducing errors and friction. Once completed, the request is routed to the appropriate verification pipeline.
5. Background Verification
Authoritative checks performed under compliant, repeatable processes.
Verity partners with PBSA-aligned screening providers to run:
- Criminal checks
- Address and identity verification
- Employment and education history
- Sanctions lists
- Industry-specific checks (DOT, healthcare, finance, etc.)
All results undergo quality checks, permissible-purpose validation, and compliance gatekeeping before they are eligible to be credentialed.
6. Credential Issuance
Turning background verification into a cryptographically sealed credential.
Once verified, results are:
- Normalized into a structured data model
- Bound to the candidate’s device key
- Anchored to a transparency log (tamper evidence)
- Encrypted end-to-end
- Packaged as a Verifiable Background Credential
- VBT-Base = full verified truth (private)
- VBT-Δ = delta update, restricted fields, or compliance freshness proofs
This produces a living credential that can travel across systems while retaining integrity.
7. Sharing
Portable proof, controlled by the individual — not forwarded, copied, or faked.
Candidates can share their verified credential through:
- Employer-specific share link (web)
- QR/NFC tap (in-person, biometric-gated)
- Directory routing (to staffing platforms or enterprise systems)
- One-time, audience-bound permissions
Every share action requires local biometric presence — ensuring the right person is always the one presenting the credential. Forwarding a credential is impossible by design.
8. Verification
Instant, compliant validation — online or offline.
When an employer or verifier receives a credential, Verity performs:
- Audience binding
Ensures the credential is valid only for the intended verifier. - Selective disclosure
Reveals only the fields the employer is legally allowed (and permitted by the candidate) to view. - Timestamp & freshness checks
Ensures data is not stale. - Transparency log comparison
Confirms the credential has not been modified.
Verification can run:
- Online (real-time validation)
- Offline (cryptographically signed challenge-response)
9. Delta Refresh
Freshness without repetition.
Instead of re-running full background checks, Verity supports delta checks:
- Updated criminal checks
- License revalidation
- Watchlist changes
- Role-specific updates
- Employer-required periodic refresh
Each delta produces a VBT-Δ credential — small, privacy-preserving, and easy to verify. This enables continuous compliance without operational burden.
10. Enterprise Integration
Designed for complex hiring ecosystems.
Verity integrates into:
- ATS / HRIS
- Staffing and MSP platforms
- Consulting workflow tools
- Enterprise identity systems
- Government and regulated environments
Integration options include REST API, audience-bound credential endpoints, and SDK-based device enrollment.
Verification, rebuilt for accuracy and scale.
Verity is not a background-check service. It is the infrastructure that makes background checks reusable, portable, compliant, and identity-bound.
Proof becomes persistent.
Compliance becomes structural.
Trust becomes efficient.