Core ID
Document processing based on artificial intelligence that allows the automation of tasks related to document management. A to analyze and extract information from documents, as well as automatically classify and label them. Tasks that Anteia can automate include data extraction, content verification, and document generation.
​
Anteia's technology is based on a set of machine learning algorithms, which are capable of learning autonomously from previously tagged document examples. This allows GeniusDocs to be able to analyze and understand different types of documents, including invoices, receipts, emails, contracts, and other types of structured and unstructured documents.
​
In addition to its ability to automate document management related tasks, GeniusDocs also offers a number of other benefits. It can help improve the accuracy and speed of document processing, which can significantly reduce operating costs. It can also help improve security and regulatory compliance by enabling automatic detection of sensitive or potentially inappropriate information.

G.lossario
Document Processing. Automatic document processing to extract relevant information and data.
​
Natural Language Processing (NLP). Technology that allows computers to understand and analyze human language.
​
OCR (Optical Character Recognition).Technology that converts images of text into a digital format.
​
Data extraction.Process of gathering and organizing information from documents.
​
Data integration.Process of combining different data sources to create a more complete and accurate view.
​
Process automation.Use of technology to automate manual tasks and improve efficiency.
​
Machine Learning.Artificial intelligence technique that allows machines to learn and improve from experience.
​
Robotic Process Automation (RPA).Technology that automates repetitive and high-volume tasks through the use of software robots.
​
chatbots.Artificial intelligence applications designed to interact with users through a conversation.
​
Document processing in real time.Automatic document processing that allows obtaining results in real time.
​
Accessibility.Ability of a document to be accessed and used by people with disabilities.
​
Intuitive user interface.Interface that is easy to use and understand for the user.
​
Application integration.Process of connecting different applications so that they work together and share information.
​
predictive analyticsArtificial intelligence technique that uses algorithms and models to predict future outcomes.
​
SmartDocument.Electronic document with intelligent features that allow advanced user interaction and automation.
​
Document Automation.Process of creating, editing and sending electronic documents using automated technologies and tools.
​
Document management.Systematic and organized process of creating, storing, retrieving and distributing electronic documents.
​
Interaction with Documents.Process of interacting with electronic documents using specific technologies and tools.
​
OCR (Optical Character Recognition).Technology used to convert scanned images or documents into editable text.
​
Document Storage.Process of saving and storing electronic documents in a secure and accessible manner.
​
Document Editing.Process of modifying and updating electronic documents.
Electronic signature.Process of signing electronic documents using specific technologies and tools.
​
Natural Language Processing.Technology used to process and understand natural human language.
​
Machine Learning.Technology used for computers to learn from data and perform tasks without being explicitly programmed.
​
Process Robotics.Technology used to automate repetitive tasks and improve business efficiency.
​
Intelligent Personal Assistant. Technology used to provide personal assistance and solve tasks through conversations with a user.
​
Document Analysis.Process of analyzing electronic documents to extract relevant information.
​
Smart Contracts.Autonomous electronic contracts that are automatically executed and verified without the need for intermediaries.
​
Document Integration.Process of integrating electronic documents into business systems and processes to improve efficiency and productivity.
anonymization.Process by which data is processed in such a way that it is not possible to relate it to the identity of a person or their personal data. Despite these processes, it is possible to perform technical and scientific analyzes on that data set. For compliance with anonymization standards, the data must be stripped of sufficient elements so that the owner of the data can no longer be identified, and therefore this data must be processed so that it is not possible to identify a person by using all reasonable means to be used by any other person.
Authentication.Although traditionally, authentication processes were related to the originality of documents, in computing they began to be used to verify the identity of people. In other words, to confirm that an individual is who they say they are. To do this, digital authentication relates each user to one or more variables.
​
Usually these variables or factors are classified into three types: by data that people know, such as a password or a PIN. By objects, such as a token, ID card, or SIM card. Or by biometric characteristics of the subjects such as fingerprints. But there are also authentication systems that go a step further and ask for specific actions.
​
Multifactor Authentication. Generally, single-factor authentication systems are more vulnerable, even more so when they depend on passwords chosen by the users themselves. But at the same time, they are the easiest systems to manage given how easy it is to generate and change passwords within an organization. On the other hand, there are biometric systems that are not without risk and that are impossible to change since they are linked to the corporeality of each subject. Fortunately, there is a trend that takes the best of both using two-factor authentication (2FA) and multi-factor authentication (MFA) mechanisms.
Authorization. It consists of the security process to determine what actions or services can be performed according to the identity of the users.
Biometrics.Application of statistical methods and calculation in the study of biological phenomena. In security it is used as a means to identify, authenticate and control access through measurable human biological data. There are various levels of biometric security with biological measurements (DNA and blood); morphological ones that involve the structure of the body (shape of the face, eyes, etc.) and behavioral ones, those based on actions or patterns such as the tone of the voice or the way of moving. Biometric data is unique to each individual and is one of the best identity confirmation tools. By the way, the term biometrics comes from two Greek words: BIOS(life) and METRON(measurement).
​
Behavioral Biometrics.It is about biometrics based on own actions or behaviors associated with a person. This includes typing pattern (formerly known as keystroke dynamics), tone of voice, use of social media, intensity of heartbeat, and even gait.
​
cybercrime.It is all crime that involves computing devices and networks for carrying out illegal activities. More in detail, is usually used to talk about those activities directed against the confidentiality, integrity and availability of computer systems and networks, as well as the data stored in them.
Confidentiality.Initially defined as "what is done or said in the confidence that what is done or said will be kept confidential", today it simply means keeping a secret. This quality in computer terms refers to the fact that the data that is stored on any device and transmitted in any medium should not be exposed to anyone. This reserve of information is enhanced through the use of cryptography.
​
deduplication. Mechanisms used to detect duplicate identities and ensure the uniqueness of people within a system or organization. The tools used in these processes generally include biometric recognition, biographical data, and the use of credentials.
​
Availability.It is the guarantee that a company's IT infrastructure has adequate recovery and protection capacity against system failures, natural disasters or malicious attacks. It is the ability to access and use resources, be it a computer network, a system, an application or data, allowing its use to authorized persons.
​
Face Match. Facial recognition or face matching system through which a user uses his biometric characteristics (his face) to authenticate his identity. This is one of the most used systems thanks to the popularization of smartphones and is frequently associated with the use of mobile applications (apps) and web platforms as a mechanism to keep accounts or transactions safe and secure.
​
Authorized source.Repository, system, or database that contains information about an individual's attributes and is considered to be the primary or most reliable source for this information. When two or more identification systems present a conflict in their data, the authorized source is used as the most secure source of information in this regard.
​
Identity.It is the set of characteristics of an individual, or of a community, that characterize them from others. In security it is used to talk about individuals and the attributes that make them unique. These variables include physical characteristics, personal history, beliefs, cultural, national, and gender factors, among other variables.
Digital identity.Just as there is a physical identity, there is also a digital version made up of the unique attributes of each individual that are captured, validated or _cc781905-5cde-3194-bb3b -136bad5cf58d_stored by digital means.
​
ID.It is the action or process of identifying or identifying oneself. Traditionally, this process is linked in the physical world and government agencies with the use of identity documents. On the digital plane, it is usually used to verify that on the other side of the computer, or smartphone, the person who comes into contact is who they say they are. For this purpose, attribute registration processes are used and later, based on the information captured, credentials are issued to optimize the authentication processes.
​
Biometric Identification.It is the process of determining the identity of a person through the use of biometric data such as the shape of the face, the fingerprint or the pattern of walking, among other possibilities. This information is then compared with a database to verify the identity of said user.
Despite the use of digital tools for the capture, recording and comparison of data, it must be taken into account that a biometric match is never exact and therefore a 100% match between the biometric template and the user's data will never be presented. As a consequence, margins must be established for the acceptance of matching patterns that obey a category called biometric threshold.
Integrity.It refers to the state and accuracy of the data involved in a process. In other words, integrity requires that the data received must be exactly the same as the data sent.
performance metrics.They are measurement systems used to determine the precision of the authentication processes. In biometrics the following stand out:
-
False Acceptance Rate (FAR).The False Acceptance Rate or FAR is sometimes known as the False Negative Rate or FN. As its name indicates, it is related to unregistered users who, despite them, are erroneously admitted to the systems.
-
False rejection rate (FRR).It is sometimes known as the false positive rate or FP. It is the opposite case of the FAR and occurs when the system denies access to an authorized user.
​
Biometric recognition.Procedure, through the use of technological devices, to confirm the identity of people by comparing biological and behavioral attributes.
Face recognition.Facial recognition is the use of technology to verify the identity of a user by comparing their facial attributes with a digitally stored database. Despite not being the most accurate identification method, of all the biometrics, it has become popular due to its ease of use. Its operation is based on the registration of the facial structure, using the distances between the center of the pupils in the eyes, the nose, the mouth and the edges of the jaw. These variables are stored using algorithms that protect the information and optimize it for later comparison.
​
cyber security.Cybersecurity is the combination of people, policies, processes and technologies used by a company to protect its digital assets. There are various classifications ranging from security of the Internet of Things (IoT), to information security, among other classifications. Some of the most common threats are ransomware, malware, denial of service attacks, and phishing. Its use has changed its motives, and sides, from its beginnings, from being a tool for extortion and industrial espionage, to the sabotage of entire nations in conflict and a tool for cyber-activists.
Identification system.It is about the set of practices, equipment, technological infrastructure, software, credentials and laws involved in the capture, management and use of personal identification data.
Digital identification system.It is a technological platform used during the life cycle of an organization's identity. It covers from the capture, validation, storage and transfer of data, to the management of credentials, for their subsequent verification and authorization de identities.
Error rate. No matter how sophisticated the technological equipment used in biometrics may be, there will always be a margin of error. For this reason, in biometrics we speak of a biometric threshold that must be established using false acceptance rate (FAR) and false rejection rate (FRR) variables. In this way, if the biometric threshold is at a low value, few rejections will be generated, which is equivalent to a low FRR and a greater risk of imitators. To avoid this, the FRR is increased, which will also decrease the FAR.
​
check. For the context of information technology and security, it is defined as the process of confirming the identity of a user or process by comparing their attributes or credentials to facilitate their authorization and access to services.
​
Biometric verification.It is the verification process using biometric attributes for this purpose. With this objective, a capture of these variables is carried out, whose information is compared with a digitally stored biometric template.
​
multiple factors
A solid confidence
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Benefits
Digitize forms in seconds.
​
They allow organizations to efficiently collect user data by integrating with existing databases and workflows.
​
Provides companies with authentic user information, minimizing the risk of fraud.
​
The information compiled in these documents is periodically updated and verified.
​
Eliminate human typing errors.
Automate reports that improve customer knowledge.
Increase end customer satisfaction by freeing them from the stressful processes of managing multiple forms with the same information over and over again.
​
Promptly alert fraud risks or eventualities in compliance compliance.
​
Eliminate transaction limits, annoying authentication steps, and false declines.
​
It doesn't let document failures and device changes stop customers.
​
They minimize fraud.
​
Maximize conversion.
​
It improves the user experience by being self-managing, avoiding filling out large amounts of information.
Properties
Face
Propiedad
Servicios
Tecnología
1
Digitalización de formulario lleno.
​
-
Recibir documento en formato PDF.
​
​
-
Automatización de lectura de datos.
​
-
Almacenamiento de datos.
​
-
Consulta de datos.
​
​
​
-
Ajustes manuales.
​
​
-
Notificar estado del proceso.
​
-
Se recibe el archivo PDF del cliente por medio del API.
​
-
Se extrae el texto.
​
-
Se almacenan los datos del PDF.
​
-
El cliente puede acceder a través de un API a los datos recolectados del documento.
​
-
Anteia desea hacer correcciones con respecto a la base de datos.
​
-
Notificar por medio de webhook el estado de un archivo.
​
2
Digitalización de un formulario vacío.
-
Recibir documento en formato PDF o Excel (No jpg o png).
​
-
Automatización esquematización.
​
​
-
Almacenamiento de esquema.
​
-
Ajustes manuales.
​
​
-
Verificación del formulario.​
​
​
​
​
-
Se extrae el texto.
-
Interpretar requerimiento.
​
-
Se almacena el esquema del formulario.
​
-
Anteia desea hacer correcciones con respecto a la base de datos.
​
-
Corroborar estado.
-
Corregir datos.
-
Back office
​
3
Interfaz de usuario.
-
FrontEnd
-
Que se pueda interpretar el esquema para dibujar las preguntas.
-
Guardar la información del formulario llenado.
​
Properties
Servicio
Configuración
Campos del formulario
-
Nro. De páginas.
-
Tipos de campos.
-
Qué campos van en cada página.
-
Etiquetas de los campos.
-
Condicionales.
-
Contenido de los campos.
-
Autocarga de los campos.
-
Validaciones de la información ingresada.
-
Campos autocalculados.
​
Alertas por el valor de los campos
​
Por cada campo se pueden definir una lista de valores, para los cuales dicho campo puede generar una alerta.​
​
Campos mapeados
El valor de un campo puede ser cargado a partir del valor de otro campo.
​
Ejemplo.
Si se tiene una actividad económica, en otro campo se puede autocompletar el CIIU.
​
Use cases
Promissory notes issued by financing institutions to guarantee the payment of loans.
​
Issued by banks or financial institutions.
​
Used to finance short-term business transactions.
​
For personal loans online.
​
By leasing companies to finance the acquisition of property.
​
Guarantee payment of invoices.
​
Promissory notes issued by educational institutions to finance the education of students.
​
Used in the stock market to back corporate bonds.
​
Issued by companies to finance capital projects.
​
Issued by insurance companies to support insurance policies.
​
Promissory notes issued by factoring companies to finance the obtaining of invoices.
​
By brokerage institutions to guarantee the payment of commercial transactions.
Frequent questions
Does it have the same validity as a traditional promissory note?
​
If, due to the principle of functional equivalence and being a document that is born digitally, it meets all the conditions of a traditional promissory note
What are the issuance requirements?
​
The same as any legal document, to be signed a method must be generated that associates the debtor with this document, through verifiable systems of non-repudiation, authenticity and integrity of the document. The regulations regarding the promissory note fall especially on the transfer and custody of the documents.
How is it transferred?
​
There is a process called endorsement, which allows the promissory note to be transferred as a security, so that the endorser transfers ownership of the document and his obligation to the endorsee. In our system, this process happens in a completely virtual way, since we verify the identity of the endorsee to make a successful transfer, the result of which is the transfer of ownership of the document in our system.
​
How can you negotiate?
The negotiation of the promissory note is outside the system, because like other securities, it can be traded, we allow this trade by providing the client with the functionality of endorsing a promissory note.
Who can issue a dematerialized promissory note?
Due to the principle of functional equivalence, anyone can issue a promissory note, however, it is important that this promissory note is signed and that it is kept in such a way that the integrity of the document and the identity of the debtor can be verified, which is why systems like ours are They are in charge of guarding the promissory note during its life cycle, from creation and signing, to processing or endorsement and gives clients the power to manage it, making the process easier and safer, both for clients and for debtors.
What are the differences between a dematerialized promissory note and a traditional promissory note?
​
The dematerialized promissory note is a representation of the traditional promissory note, which allows the same actions to be performed on the document, only that it is born and is maintained in the digital world, which brings advantages of storage, administration, signature and even agility in the life cycle of a promissory note
​
What are the risks associated with dematerialized promissory notes?
​
-
Security risk. As they are electronic documents, dematerialized promissory notes are exposed to the possibility of hacking, identity theft and other computer crimes.
​
-
Default risk. As with traditional notes, if the issuer of the note fails to meet its payment obligation, the investor may lose some or all of their investment.
​
-
Liquidity risk. As with traditional promissory notes, dematerialized promissory notes may have a lower degree of liquidity than other financial instruments or securities, which may make it difficult to negotiate or sell them in the secondary market.
​
In general, the risks associated with dematerialized promissory notes originate from the use of computer technologies or derive from risks associated with any type of promissory note.
​
What security does a dematerialized promissory note offer?
​
Depending on the way it was issued, it can generate many advantages, the traceability of the document is protected and difficult to break. The verification of the identity of the debtor or debtors allows for more reliability, the custody of the document allows it not to be lost or document mismanagement. Finally, the integrity of the associated documents ensures that the changes made are verified and does not allow unauthorized modifications.
What are the costs associated with dematerialized promissory notes?
​
The costs relate to maintaining the promissory note, by which we mean custody as well as administration, and signing associated documents, which utilize identity verification.
How can you collect a dematerialized promissory note?
​
Due to the principle of functional equivalence, in the same way as a traditional promissory note, if the debtor is not willing to pay the obligation, the documentation is generated digitally and the creditor can demand payment in court, because the documentation is sufficient evidence to show that the debtor accepted the obligation.
What happens if the debtor does not pay a dematerialized promissory note?
​
The creditor can demand payment in a lawsuit, forcing him to pay the debt associated with the promissory note, the only difference with a traditional promissory note is the use of digital documents as evidence of such obligation.
Regulation
Argentina: The regulation on dematerialized promissory notes in Argentina is governed by Securities Law No. 22,415 and by the National Securities Commission. The law establishes the requirements for the issuance, negotiation and transfer of securities, including dematerialized promissory notes.
​
Brazil: The regulation on dematerialized promissory notes in Brazil is governed by the Brazilian Securities and Exchange Commission (CVM) and by the Securities Market Law No. 6,385/76. The CVM is responsible for regulating and supervising the securities market in Brazil, including dematerialized promissory notes. The law establishes the requirements for the issuance, negotiation and transfer of securities, as well as the obligations of issuers of securities.
​
Mexico: The regulation on dematerialized promissory notes in Mexico is regulated by the Mexican Social Security Institute (IMSS) and the National Banking and Securities Commission (CNBV). The CNBV is responsible for regulating and supervising the securities market in Mexico, including dematerialized promissory notes. The IMSS is responsible for regulating and supervising the issuance of securities, including dematerialized promissory notes.
​
Colombia: The regulation on dematerialized promissory notes in Colombia is regulated by the Financial Superintendence of Colombia. The Superintendency is responsible for regulating and supervising the financial market in Colombia, including the stock market and the issuance of dematerialized promissory notes.
​
Costa Rica: The regulation on dematerialized promissory notes is regulated by the Central Bank of Costa Rica and the General Superintendence of Securities. The Central Bank is responsible for regulating and supervising the monetary and financial market in Costa Rica, including the stock market. The General Securities Superintendency is responsible for regulating and supervising the issuance and trading of securities, including dematerialized promissory notes. It is important to note that regulations may vary over time and it is advisable to check current laws and regulations before issuing or negotiating dematerialized promissory notes in Costa Rica.
​
Peru: The regulation on dematerialized promissory notes in Peru is regulated by the Superintendence of Banking, Insurance and AFP. The Superintendency is responsible for regulating and supervising the financial market in Peru, including the stock market and the issuance of dematerialized promissory notes.
​
Chile: the regulation on dematerialized promissory notes is regulated by the Superintendency of Securities and Insurance. The Superintendency is responsible for regulating and supervising the stock market and ensuring the protection of investors and the integrity of the stock market in the country.
​
Ecuador: The regulation on dematerialized promissory notes is regulated by the Central Bank of Ecuador and the Superintendence of Companies. The Central Bank is responsible for regulating and supervising the monetary and financial market in Ecuador, including the stock market. The Superintendency of Companies is responsible for regulating and supervising the issuance and trading of securities, including dematerialized promissory notes.
​
Panama: The regulation on dematerialized promissory notes is regulated by the Superintendency of the Stock Market. The Superintendency is responsible for regulating and supervising the securities market in Panama, including the issuance and trading of securities, including dematerialized promissory notes.
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​
Magic Shapes
Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats.
​