Coreal.
Book a working session →
← PLATFORM·P6 · Compliance · KYC · KYT

KYC / KYT Platform

Compliance plumbing that doesn't block growth. Graph-based transaction monitoring scores wallets in real time; OCR + FaceID compress KYC from 48h to 4h; ML + rule engine cuts review noise.

Speed
91% faster
Cycle
48h → 4h
Output
SAR-ready
OCRFACEIDPEPSAR
01Capabilities

What ships in the box.

C-01

Graph TM

Wallet-to-wallet graph with on-chain provenance

C-02

Tiered verification

Risk-based KYC depth scaling with exposure

C-03

OCR + FaceID

Automated document + biometric capture

C-04

ML + rule engine

Hybrid scoring with explainable rules

C-05

PEP / sanctions

Real-time screening + ongoing monitoring

C-06

SAR filing

Case management + regulator-ready submission

02Technical deep dive

How it works under the hood.

Five sections covering the structural decisions, the data model under them, and the operational characteristics you can show to an architecture review or a regulator.

§ 01

Graph transaction monitoring vs. flat rules

Traditional AML rule engines look at one transaction at a time: "is this transfer over the threshold? does the sender match a watchlist?" This catches the obvious cases and misses the structured ones — layering, smurfing, nested-account funnelling — where each individual transaction looks innocuous but the aggregate pattern doesn't. Graph TM treats every transaction as an edge in a wallet-to-wallet graph; risk scoring runs over the graph topology in addition to per-transaction features. Patterns like "this account funds five accounts that all withdraw within 24 hours to a single beneficiary" are detected as graph subgraphs, not as a thousand independent flagged transactions.

§ 02

On-chain provenance for crypto inflows

When crypto enters the platform, the KYT layer screens the address and the immediate predecessor history. But the more useful screening is the multi-hop provenance: where did this address get funds from, and where did those upstream addresses get funds, going back N hops? Coreal integrates with Chainalysis and TRM for the heuristic graph and overlays an internal scoring model that weights provenance by recency and depth. A "clean" address that was funded from a known mixer 3 hops back surfaces as elevated-risk; the rule for what to do (block, queue for review, allow with limit) is set by the tenant's policy.

§ 03

Tiered KYC and risk-proportionate friction

Treating every customer to maximum-friction onboarding (full ID, liveness, address proof, source-of-funds) loses customers who would have been low risk. Treating every customer to minimum friction creates exposure on the riskier ones. Tiered KYC scales depth to risk: tier 1 (telco-verified, low limit) requires identity attestation only; tier 2 (full IBAN, mid limit) adds OCR document + liveness; tier 3 (high limit, crypto) adds source-of-funds, enhanced PEP/sanctions, ongoing monitoring. The policy engine moves a customer up tiers when behaviour or transaction volume requires it, and blocks behaviour that exceeds current tier without step-up.

§ 04

ML + rule engine: explainability matters

A pure-ML AML system produces decisions a regulator cannot audit. A pure rule-engine system produces decisions that miss the patterns the rule-writers didn't anticipate. Coreal's scoring is hybrid: a ruleset of explicit checks (sanctions, PEP, threshold-based) runs first, deterministically; an ML scorer runs in parallel for context (peer comparison, behavioural pattern). The rule engine's output is a set of triggered rules with IDs; the ML scorer's output is a score with the top contributing features. A reviewer (and a regulator) can read both in plain English. Decisions never come from the ML score alone.

§ 05

SAR pipeline as a structured workflow

Suspicious Activity Reports are a regulatory obligation that, in practice, many fintechs treat as an after-the-fact reporting exercise. Coreal's SAR pipeline is a workflow in the BPM engine: cases are opened from TM alerts, an analyst gathers evidence, a reviewer signs off, and the report is generated in regulator-aligned format (goAML XML for FIUs that accept it, structured CSV otherwise). The pipeline tracks SLA from alert to filing; the case archive is searchable by entity, date, typology, jurisdiction. When the regulator audits, the answer to "show me your SAR register for 2026 H1" is one query, not a forensic exercise.

03Data model

Core entities & key fields.

The handful of entities you would design first if you were building this from scratch. Naming and field shape match what an audit firm or counterparty would expect.

ENTITYPURPOSEKEY FIELDS
identityCustomer identity record with tier and verification stateid · tier · verified_at · documents · biometric · risk_score
transactionMoney-movement event subject to monitoringid · from · to · amount · currency · ts · channel · features
wallet_nodeNode in the wallet-to-wallet graphid · address_or_account · type · risk_score · known_typology
rule_triggerTriggered rule on a transaction or accountid · rule_id · subject_id · ts · severity · evidence
caseCompliance case under investigationid · subject · opened_at · sla_due · state · analyst · evidence_pack
sarFiled Suspicious Activity Reportid · case_id · jurisdiction · format · filed_at · ack
04Request lifecycle

From input to settled state.

The path a single operation takes through the system. Every step is journaled and replayable.

1. Transaction ingestStream from wallet/broker/trading systems → enrichment pipeline
2. Graph + featuresGraph topology features computed; behavioural features extracted
3. Rule engineDeterministic rules evaluated; triggers stored with rule IDs
4. ML scoringParallel ML scorer outputs risk score + top features
5. Review queueHigh-risk subjects routed to analyst inbox with SLA timer
6. SAR pipelineConfirmed cases progress through evidence → review → file → ack
05Operational characteristics

What this looks like in production.

SLO-01
Onboarding compression
48h → 4h

91% faster than legacy manual baseline

SLO-02
Auto-clear rate
88%

Tier 1 KYC passes without manual review

SLO-03
Sanctions sources
14

Real-time screening + ongoing monitoring

SLO-04
Case median resolution
12 minutes

Analyst workspace efficiency

SLO-05
SAR filing latency
< 30 days

From case open to regulator submission, well within statutory windows

SLO-06
Audit log retention
7 years

Per AML5 / AML6 requirements

06Architecture

Behind the surface.

Stream of transactions → enrichment (graph + heuristics) → ML scorer + rule engine → human-review queue with SLA tracking → SAR pipeline. 91% faster than manual baseline.

07Integrations

Vendors & rails.

SumsubOnfidoChainalysisTRMRefinitiv WorldCheck
08Regulatory posture

AML5 / AML6 ready · FATF travel rule · GDPR data minimization · regulator-aligned SAR formats.

09Adjacent products

The rest of the platform.