Device Intelligence is powered by InAuth and prevents fraud by analyzing devices and associated identities transacting across digital channels via mobile applications (InMobile) and mobile and desktop browsers (InBrowser). InAuth’s platform helps clients verify identity, assess and mitigate risk in real-time, and optimize the customer experience.


InMobile provides a Device Intelligence Software Development Kit (SDK) that can be incorporated into mobile applications to access detailed mobile device information. More than a hundred device and operating system attributes can be collected and analyzed to produce a persistent device identifier that prevents fraud. It is therefore resilient to tampering, application uninstall/reinstall, and OS upgrade.

InMobile Benefits

Malware and Crimeware Detection

InMobile analyzes connected devices to detect known malicious applications as well as criminal tools such as location spoofing and IP address proxy apps. Malware files are dynamically updated without client interaction.

Rooted/ Jailbroken Detection

InMobile protects against complex rooting methods used by fraudsters, such as cloaked Root, through Advanced Root and Jailbreak Detection.

Trusted Path

Trusted Path is InMobile’s security architecture that prevents interceptions by providing a secure path to transport sensitive information and messages. It is encrypted end-to-end, signed, and digitally protected against replay attacks.

Secure Messaging

Secure means of delivering contextual two-factor authentication (2FA) messages to a registered device through the InMobile SDK and Trusted Path that cannot be read by any other device, intercepted, or replayed. (Available as a standalone offering).

previous arrowprevious arrow
next arrownext arrow


InBrowser provides JavaScript collectors that can be incorporated into any relevant web page to access detailed browser session information. Hundreds of attributes can be collected and analyzed to produce a persistent device identifier and identify potentially fraudulent behavior. Collector code can be invoked upon page visit or tied to specific actions, such as a form submission, based on technical and business requirements. Examples of pages where data collection is typically enabled include account open page, login page, account change/update page, and checkout/payment page.

InBrowser Benefits

Device Identification

Browser fingerprint “recipe” determines how well devices are differentiated from each other and allows any client to authenticate trusted users with minimal validation by minimizing collision rates and maximizing fingerprint longevity.

Proxy and VPN Detection

There are numerous ways users come to sites. Many users come via their corporate VPN, for example. While this is valid, it can make it difficult for clients to understand the user’s true location. Fraudsters recognize this as well and use this to mask their true location in an attempt to escape typical device recognition capabilities. Accertify Device Intelligence can detect proxy and VPN connections and more to understand the true location of users.

User Behavior Analytics

A good way to prevent fraud is to track your users’ behaviors using Accertify User Behavior Analytics. With superior device intelligence, it helps you distinguish good customers from fraudsters and detects suspicious activity from humans and bots by analyzing behavioral signals as they interact with client’s websites. The tool can provide risk ratings and includes visual representations of a user’s journey through a website, including measurements of page duration, mouse movement, keystroke dynamics, pasting or auto-filling data into forms.

previous arrowprevious arrow
next arrownext arrow

Request a Consultation

Request a Consultation with a member of our technical team to learn how Device Intelligence powered by InAuth can help you prevent fraud.

Explore More Products