- Detection of multi-accounting and synthetic identities
- Early identification of account takeover risks
- Identification of fraud clusters tied to specific devices
- Behavioural profiling of legitimate users over time
- Stronger signals in web and mobile channels where IPs fluctuate
A strong device identifier dramatically increases ProfiledRisk’s precision when linking events to a profile.
Web Implementation — DeviceGuard SDK
You can collect a browser fingerprint and pass a consistentdevice_id into all event ingestion requests.
Integration Example
DeviceGuard SDK
device.device_id field for:
- Onboarding events
- Login events
- Payment / Banking / Lending events
- Any future behavioural event you define
Mobile SDK Guidance
Mobile applications inherently provide more stable identifiers than the browser. For both iOS and Android:
We strongly advise using the Advertising ID as the device_id.
Benefits:
- Globally unique per device
- Resettable by the user → compliant with privacy expectations
- Available before authentication to detect risk during onboarding
- Ties user behaviour across apps on the same device (optional advantage)
Best Practices
| Best Practice | Why It Matters |
|---|---|
| Capture device_id before signup/login | Detect returning fraudsters who use new accounts |
| Use same fingerprint logic across channels | Prevent siloed identity profiles |
| Store device_id locally & reuse | Avoid fragmentation of the user’s risk profile |
| Pair with IP + geolocation + device metadata | Improves anomaly and behaviour-based detection |
Summary
A Profile is only as strong as the signals tied to it. Device fingerprinting ensures ProfiledRisk can:- Track behavioural risk evolution
- Catch repeated fraud behaviours hidden across new accounts
- Support higher-confidence automated decisions

