Skip to main content
You can check and manage the individual status of all submissions received within a project. View all information collected from submission start to completion, and modify information directly as needed.
The scope of displayed information and modifiable items may vary according to User Policy Settings for each project.

Submission List

You can check the status of all submissions recorded within the project. Query in detail by search criteria, date range, nationality, and submission status.

Available Information

The following information can be viewed in the submission list:
ItemDescription
Submission TimeTime when submission occurred
Submission Unique IDUnique identifier for each submission
Email AddressSubmitter email
NameSubmitter name
Date of BirthSubmitter date of birth
NationalityBased on issuing country
AML InformationAML search results per submission
Submission List Screen

Search and Filter Features

Use the following features for efficient submission management:
  • Date Range Setting: Query submissions for specific periods
  • Status Filter: Filter by Approved/Rejected/Pending/Incomplete status
  • Nationality Query: Filter submissions by specific country
  • Keyword Search: Search by name, email, etc.
  • AML Result Classification: Classification by AML search results
Submission Management Tips
  • Regularly review Pending status submissions
  • Analyze causes of Incomplete status submissions
  • Monitor patterns by country and time period
  • Prioritize review of high AML risk submissions

Submission Detail View

Click the Detail View button on the right side of each submission to view and modify all recorded information.
Collected information fields may vary according to authentication options set for each project.

Submission Management Features

Detail Information Buttons

Delete Submission

Delete a specific submission for that user. Detailed data is removed upon deletion and cannot be restored.

Generate PDF

Download submission information as a PDF document.

Send Webhook

Send submission data to external systems via webhook functionality.
Deletion records themselves can be viewed on the Event Log Page.

Top Information in Submission Detail View

Detail Information Buttons
The image above shows from eKYC Result to Other Information Fields.

eKYC Result

When normal authentication documents and selfie have all been verified

AML Result

ResultDescription
N/ANo AML results available for reference (mainly seen when dropped during liveform)
No MatchNo person of interest information based on submitted materials
Red FlagRisk/concern person information exists based on name/nationality/date of birth

Other Information Fields

Categorized as Adult/Teen/Early Teens/Minor. Not displayed in Incomplete status.
Score calculated by AI based on submitted information, photos, and AML results.
Displays other submissions within the same project matching this submitter’s information.
Displays other submissions within the same project matching this submitter’s facial information.
Displayed when IP addresses identified as forgery or commercial purpose are filtered through Proxy & VPN option activation.

User Information

View information from when submitter executed this submission:
Detail Information Buttons
FieldDescription
Submission Time (UTC+9)Submission occurrence time based on Korea server time
Submission IDUnique ID for each submission
Service TypeSubmission format
EmailEmail address mapped to this submission
IP AddressIP connected at submission time
DI (Duplicate Information)Unique encrypted value generated upon identity verification approval
DI Value Generation ConditionsDI value is generated when name, date of birth, gender, nationality, etc. are all provided. If the same identity is verified through ARGOS Identity service, the existing DI value is maintained even when authenticating in different projects.

Metadata

Detail Information Buttons
FieldDescription
User IDUnique user ID
Custom Field #1 ~ #3Values entered when additional input is requested
Metadata can be modified, and Updated webhook automatically synchronizes data to external systems upon modification.

Memo Feature

Detail Information Buttons
Memos can be written for each submission for administrator communication and record management.

ID Document Information

ID Information Screen
FieldDescription
Issuing CountryIssuing country of submitted ID (may differ from nationality)
ID TypeType of ID selected by submitter
Document TypeIssuing country & ID type
Recognition ScoreRecognition score collected from ID capture
Image Editing Features:
  • 🔍 Magnifying Glass: Zoom in/out
  • 🔄 Edit: Rotate, flip horizontal, reset to original
  • ✂️ Image Crop: Auto-zoom to ID center
  • 🖌️ Masking: Apply masking directly if needed

Submission Information

ID Information Screen
Data TypeDescription
OCR DataID information results initially detected by AI camera
Input DataValues when user modified OCR data
Final DataFinal data modified based on OCR data

Selfie Information

ID Information ScreenID Information Screen
Compares the portrait on the ID with the actual submitter’s photo.
Score TypeDescription
Face SimilarityPasses when above set threshold out of 100 points
LivenessPasses when above set threshold out of 100 points

Address Information

Displays Geo-Location information based on IP address at submission time.
Address information is only displayed when the related feature is activated.

User Data Download

Download Button
Download Limitations
  • Dashboard downloads are limited to maximum 5,000 most recent submissions
  • Email and name are masked as *** according to ARGOS default policy
  • Masking is applied regardless of settings options
For more data and complete information, we recommend querying via API.

API Call Limits

Limit TypeQuotaDescription
Max Requests per Second (QPS)5,000 requestsMaximum API requests processable in 1 second
Max Requests per Day (QPD)100,000 requestsTotal API requests allowed in 24 hours

Pre-verification List

When Proxy & VPN Detection option is activated, related details can be checked for each submission. Pre-blocks submissions through specific IP ranges or Private networks where forgery/alteration frequently occurs.
Feature Activation MethodActivate the ‘Proxy & VPN Detection’ option in Settings > Fraud Prevention menu.
Pre-verification List Screen

Available Information

ItemDescription
Submission TimeSubmission attempt time
Email AddressSubmitter email
Request IDUnique request identifier
Detection TypeProxy, VPN, TOR, etc.
Request IPSubmission attempt IP
Risk ScoreIP-based risk score
Service AttemptWhether service access was attempted
CountryIP-based country information
Connection TypeConnection method
Final StatusBlock/Allow result
The pre-verification list page is view-only and cannot be modified, unlike submission list detail pages.

Benefits of Proxy & VPN Detection

Enhanced Security

Pre-block risky IP ranges

Integrity Protection

Protect service by pre-detecting forgery/alteration attempts

Abuse Prevention

Prevent commercial purpose abuse

Access Restriction

Enable regional access restriction policies

Response by Detection Type

Detection TypeRisk LevelRecommended Response
ProxyMediumApply additional verification procedures
VPNMediumApply additional verification procedures
Commercial VPNHighImmediate block or enhanced verification
Hosting ProviderHighAutomatic rejection processing

Pre-verification Detail View

Click the Status button for each pre-verification case to view detailed Proxy & VPN detection information.
This feature can significantly improve service security and reliability by pre-blocking malicious IPs.
Pre-verification List Screen

Pre-verification Information

FieldDescription
Request IDUnique request value generated during identity verification attempt
StatusPass/fail based on IP and related information
Risk ScoreScore quantified from IP and related information
Connection TypeResidential/Mobile/Data Center
Request DateDate of submission attempt
CountryIP-based country information
Subnet AttemptSubnet submission attempt frequency (First occurrence/Rare/Very frequent)
Device and OSSubmission upload environment information

IP Anonymization Status

Pre-verification List Screen
ItemDescription
ProxyWhether IP is suspected to be a proxy
TORWhether IP is using TOR network
VPNWhether IP is suspected to be a VPN
Risk Order: TOR > VPN > Proxy in order of highest risk. Establish appropriate response policies for each.

IP Abuse Records

Pre-verification List Screen
ItemDescription
Recent AbuseWhether recent abuse records exist for this IP
Abuse VelocityAbuse frequency related to this IP
Bot ActivityWhether recent bot activity exists for this IP
Frequent AbuseWhether frequent abuse history exists for this IP

Additional Information

Pre-verification List Screen
ItemDescription
HostHost information
Internet Service ProviderISP information
Autonomous System Number (ASN)Unique autonomous system number
RegionIP-based region information
City/DistrictIP-based detailed region information
TimezoneIP-based timezone information

Risk Score Interpretation Guide

Score RangeRisk LevelRecommended Action
0-30LowNormal processing
31-60MediumAdditional monitoring
61-80HighEnhanced verification procedures
81-100Very HighImmediate block recommended
Monitoring Tips
  • Regularly analyze IP abuse patterns for early detection of new threats
  • Establish whitelist policies to minimize inconvenience for legitimate users
  • Monitor access patterns by country
  • Review false positive cases
  • Establish exception policies for legitimate VPN users