Driver Verification
Know exactly who is picking up your freight. SMS-based verification with photo checkpoints, identity photo matching, and 6-layer anti-spoofing protection.
How Verification Works
A four-step process from link delivery to verified status
Secure Link Sent via SMS
An expiring verification link with a one-time password is sent to the driver’s phone. VoIP numbers are flagged automatically.
Identity Photos Captured
Driver submits a live selfie, CDL photo, and truck/plate images. All photos pass through 6 anti-spoofing checks.
Location Confirmed at Checkpoint
GPS coordinates are captured at pickup and delivery points. Location proximity is verified against the load’s expected geography.
Status Returned: PASS / FLAG / FAIL
Results are delivered instantly with a full evidence timeline. Flagged items require manual review; failures trigger alerts.
Key Capabilities
SMS OTP Links
Expiring verification links with one-time passwords. No app download required — works on any smartphone browser.
Identity Photo Matching
Client-side face matching compares the driver’s selfie against their CDL photo to confirm identity at each checkpoint.
VoIP Phone Detection
Automatically detects virtual and VoIP phone numbers, which are commonly used in freight fraud schemes.
Checkpoint Location Proximity
GPS-based location verification at pickup, in-transit, and delivery checkpoints. One-time consent model for location access.
Consent-Based Process
Drivers consent to verification before proceeding. Location access is requested only during active checkpoint submissions.
20+ Photo Categories
Configurable photo requirements per checkpoint. Each category captures timestamped, geotagged evidence.
6-Layer Anti-Spoofing Protection
Every photo submission passes through six independent checks to detect fraudulent or manipulated images.
EXIF Metadata Analysis
Checks photo metadata for device info, timestamps, and GPS coordinates. Detects screenshots, downloaded images, and edited photos.
GPS Coordinate Validation
Compares photo GPS data against the expected checkpoint location. Flags submissions from unexpected locations.
Timestamp Consistency
Validates that photo timestamps align with the verification session window. Detects pre-taken or recycled photos.
Image Quality Checks
Analyzes image resolution, blur, and lighting to ensure photos are genuine captures, not photos of photos.
Device Fingerprinting
Tracks device characteristics across submissions to detect shared devices or suspicious patterns.
Behavioral Analysis
Monitors submission timing, sequence patterns, and interaction behavior to flag automated or scripted attempts.