Veridas, the Spanish technology company specialising in digital identity and biometrics, has received accreditation for its Age Estimation Technology from the UK’s Age Check Certification Scheme (ACCS) for Evaluation Assurance Level 2.

Age Check Certification Scheme

The Age Check Certification Scheme (ACCS) is a UKAS-accredited conformity assessment body, comprised of auditors, certification specialists, and data protection experts.

ACCS independently tests and certifies online and offline systems that check both age and identity, such as passport scanners, biometric technology, and age verification software. ACCS is aimed at protecting children from the harm associated with access to age-restricted products, content, and services.

Age verification solution

This in-house developed solution reduces the risk of fines and damage to reputation while providing fast access

Veridas offers a comprehensive age verification solution that leverages advanced AI technology to determine the age of an individual with just a selfie, in a matter of milliseconds.

Supported by strong anti-spoofing and deep fake detection, the Veridas approach to Age Verification also incorporates rigorous identity documents and biometric checks to be applied if the user’s age is under the required limit. This in-house developed solution reduces the risk of fines and damage to reputation while providing fast and seamless access for customers.

Secure trust and recognition

As we expand into different territories, it is of utmost importance to secure the trust and recognition of our current and potential customers in the region,” said Eduardo Azanza, CEO of Veridas.

The internationally recognised ACCS is a highly regarded safeguard in the UK and a standard that we are thrilled to have easily met.”

ACCS assessment

The ACCS assessment determined Veridas can accurately estimate the age of people under the age of 18 as being under the age of 25 with 99.9% accuracy.

This means that Veridas can address an increasingly widespread need to enforce age limitations and safeguards for underage and vulnerable users. Whether through gambling, online gaming, or online dating industries, most countries aim to enforce age limits to meet growing regulations.

Electronic age estimation

ACCS has established a standardised approach to assess the suitability of age estimation

In this era of technological advancement, electronic age estimation is rapidly gaining prominence. The Age Check Certification Scheme (ACCS) has established a standardised approach to assess the suitability of age estimation technology for specific age categories.

For instance, in the context of a Challenge 25 category, individuals under 25 are required to produce identification to verify that they are indeed over 18 years old.

Privacy-centric age verification

Veridas privacy-centric age verification works through a simple selfie, validating both whether the individual is currently present and estimating whether or not the individual is under a certain age.

This 5-second process enables peace of mind for customers as it empowers users to securely validate their age without compromising personal information.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...