IDgo logo

Leveraging the ease of use and security of smart phones and encryption for authentication.

IDgo leverages mobile device and encryption technologies to deliver a member authentication solution for all engagement channels that reduces the risk of impersonation fraud, improves operational efficiency and simplifies authentication experiences.

How IDgo Works

IDgo Enrollment – Member Experience

Credit union representatives complete a one-time member verification process that is recorded for future authentications as an encrypted credential associated with the member’s mobile phone security settings. This allows the phone to be used simply and securely for all future authentications.

member verification diagram

IDgo Authentication – Member Experience

A notification is sent by a credit union representative to a member’s device, requiring the member to access their device to use the encrypted credential associated with their device security settings to authenticate.

member verification diagram

Benefits

Use Case Benefits
Contact Center, Chat Faster and more pleasant member and staff experience, more secure verification process, representatives not burdened being "fraud detectors".
IVR Callers authenticated before representative answers, saving average handle time and opening opportunity for authenticated members to self-serve.
AI Agent Enables opportunity for members authenticated within AI Agent to self-serve transactions requiring authentication.
ITM Enables opportunity for simpler, faster and more secure authentication thru ITMs.
In Person Enables opportunity for simpler, faster and more secure authentication in person.

Leveraging the ease of use and security of smart phones and encryption for authentication.

IDgo leverages mobile device and encryption technologies to deliver a member authentication solution for all engagement channels that reduces the risk of impersonation fraud, improves operational efficiency and simplifies authentication experiences.

How IDgo compares to common member authentication methods

Member authentication typically relies on one or more than one of these three factors:

  • Something You Know, e.g., password, PIN, one-time passcode or secret personal information
  • Something You Are, e.g., your face, fingerprint, iris scan or voice print
  • Something You Have, e.g., an identity document, a hardware token, your mobile phone

IDgo has been designed around “Something You Have” – a mobile phone and an encrypted credential. This is a device members carry every day, everywhere with powerful resident technology that can deliver a high level of security with a simple process. The table below illustrates advantages of IDgo over other authentication methods:

Table showing stats

FAQs

Faster, Frictionless Member Onboarding

  • • Verify identities in seconds with secure biometric or document-based authentication
  • • Reduce manual processing and eliminate bottlenecks
  • • Get members up and running in minutes—not days

Combat Fraud with AI-Driven Identity Protection

  • • Real-time fraud detection and document forgery analysis
  • • Face-matching and liveness detection prevent impersonation and synthetic identity fraud
  • • Stay ahead of fraud trends with continuous updates and threat intelligence

Increase Conversion Rates & Drive Growth

  • • Make onboarding easy and mobile-friendly to attract younger, tech-savvy members
  • • Reduce abandonment during the application process
  • • Improve completion rates with a streamlined user experience

Seamless Integration with Core Banking Systems

  • • API-first design makes it easy to plug into your existing digital banking platform
  • • Customizable workflows to match your credit union’s compliance and member experience needs

Regulatory & Compliance Confidence

  • • Built-in Know Your Customer (KYC), Anti-Money Laundering (AML), and Customer Identification Program (CIP) checks
  • • Meets NCUA, FFIEC, and other regulatory guidelines
  • • Audit-ready identity records and real-time reporting dashboard

Simple & Secure Access

  • • Members can verify their identity quickly from any device
  • • Enjoy peace of mind with military-grade data encryption and secure storage
  • • Reduce the need for in-branch visits or cumbersome paperwork

Mobile-First Convenience

  • • Apply for membership, loans, or new products from the comfort of home
  • • Fast, intuitive identity checks mean no more lost time or login issues
  • • Great for members on the go – especially younger demographics and digital natives

Trust in Every Step

  • • Transparent, privacy-first identity processes
  • • Personalized, consistent experiences that reinforce loyalty and satisfaction

Account Login Multi-Factor Authentication - After entering username, password for online account, consumer uses IDgo to complete multi-factor authentication using an encrypted device credential.

Forgot Password - Before setting up a new password, consumer uses IDgo to authenticate using an encrypted device credential.

Step Up Authentication - Before executing risky transactions like a funds transfer, consumer uses IDgo to complete multi-factor authentication using an encrypted device credential.

Passwordless Account Login - Consumer uses IDgo to complete online account login using an encrypted device credential.

Call Centers, IVRs, In Person, Interactive Teller Machines, Anonymous Chat Sessions

  • • Consumer receives SMS to their mobile phone
  • • Consumer authenticates using device biometrics, passcode or screen lock pattern

Every authentication method relies on one of these three basic factors:

  • • Something You Know, e.g., password, PIN, one-time passcode or secret personal information
  • • Something You Have, e.g., your mobile phone or a hardware key
  • • Something You Are, e.g., your face or fingerprint

An essential part of the IDgo service is the consumer enrollment process, managed by participating enterprises:

  • • Enterprises must authenticate the consumer before enrolling them in the IDgo service.
  • • The mobile phone number used must already be on file with the enterprise and associated with the enrolling consumer.
  • • Only authorized enterprises can send enrollment requests to consumers.
  • • To accommodate consumer preferences, consumers can choose to set up one of two second factor authentication methods: either create a Passkey or Register their Device. Both approaches use an encrypted credential. Choosing to create a Passkey enables use of Face ID, fingerprint, device passcodes and screen patterns while registering a device remembers the device for future use.
  • • Only authorized enterprises can send authentication requests to consumers who use proof of possession of their unique mobile device to authenticate themselves.

Phishing, Smishing, Social Engineering, Credential Stuffing, Malware, Forgot Credentials, Brute Force Attack, Man in the Middle, Call Spoofing, SIM Swap

Contact Us

Request Resources

Resources include:

To fulfill your request, please provide the following:

* = Required field.

Close