Our technologies

Technology platform overview

Ease of use

Installation of the JuicyScore script call on the web site or in the mobile application.

Setting data collection and transmission parameters sent to our service.

Getting response from the service, including the score, probabilistic device ID, probabilistic user ID, and a broad profile of predictors used for the decision-making strategy, antifraud policy, and increasing the approval rate for loan or insurance applications.

Scheme
Details
User

The virtual user filling in the application for financial product on the lender’s or insurer’s web resource.

User’s device

Device used by a virtual user to fill out the application on the financial institution’s web resource.

Client’s resource

Web resource (web site and/or mobile application) of the financial institution where the JavaScript and/or SDK are placed.

Client’s CRM

All back end systems in the secure perimeter of the financial institution, from which a request to external services is sent, including the JuicyScore API.

Virtual user enters the web site of the financial institution with his device
The JuicyScore JavaScript / SDK installed on the web resource copies the generated session to the user’s device
If the user sends an application for a financial product, a request to the API JuicyScore is generated in the institution’s back end system
The request is processed by JuicyScore, the data collected on the web resource is matched with the data collected by JuicyScore before; device and user IDs are identified, a data vector is built, and the score is calculated.
JuicyScore returns the response as a data vector to the financial institution

OUR OBJECTIVES

Showing that it is possible to operate without direct user identifiers
Enhancing users' safety due to restricted collection of personal and biometric data
Demonstrating the benefits and easy use of non-personal data alternatively to personal information

We are highly careful with any extern information

We do not use any personal data such as direct identifiers of private individuals (full name, passport details, addresses, contact or paying information, or any other direct identifiers)
We only use our own sessions (JuicySession) placed on our partners' platforms (financial institutions), provided there is a contract signed
While analysing information about input rhythms, we do not collect codes of the symbol buttons pressed to exclude any possibility of accidentally receiving any information about the real user
The service data containing information on applicants and devices collected on the financial institutions' platforms which was not requested are stored not longer than 90 days; after it is deleted and impossible to recover
Our clients can determine the set of non-personal data collected on their platforms by themselves. All the data collected can be deleted from the database at any time upon request of the platform’s owner
Our service has the opt-out function for non-personal data; we can delete data from the database (e.g., JuicySessions) upon direct request of our client via the feedback form
Scoring
Device ID, User ID, score.

Broad data vector

Behaviour data

Over 70 attributes regarding users behaviour data, including the number of logins, paired applications with signs of fraud, number of corrections on the page during data input, etc.

The Internet connection data

About 30 attributes featuring the Internet connection: existence of proxies/TOR and other anomalies, type of connection, date of IP address, etc.

Device information

Over 40 attributes regarding the device information, such as type of device, OS features, and markers of device manipulations.

Software data

Over 60 attributes regarding the software installed on the device, including information about browser, software applied, etc.

Data collection and processing — our know-how

JuicyScore is based on the proprietary device and virtual user authentication technologies, as well as on data analysis and engineering.

Our online scoring technologies are based on non-personal data, dynamic authentication, evaluation of disposable income and some other parameters and are protected by the patent legislation of the Russian Federation (upon some of them, the requests have been registered and confirmed, stamp certificates are issued for the others), CIS, Singapore, and the EU.

Contact us

We will make your business more safe, let’s discuss how!