What Is a Trust Score and How Is It Calculated?
· 8 min read

- A TrustMatch Trust Score evaluates the authenticity and reliability of a digital identity associated with a name, phone, or email by combining an Identity Score and a Trust Score.
- The Identity Score verifies if an identity is real and consistent by analyzing public records, telecom data, and email metadata, much like a digital background check.
- The Trust Score assesses the behavioral trustworthiness of that identity, examining patterns, risk indicators, and consistency of usage across digital touchpoints.
- TrustMatch uses a complex algorithm to analyze hundreds of data signals, flagging discrepancies and linking disparate data points to form a comprehensive risk assessment.
- Understanding these scores empowers you to make informed decisions about who you interact with online, protecting against fraud and increasing digital safety.
Understanding the TrustMatch Trust Score: Identity and Trust
The TrustMatch Trust Score is a comprehensive metric, ranging from 0 to 100, that evaluates the overall reliability and authenticity of an online identity. This score is derived from two distinct but interconnected components: the Identity Score, which focuses on proving *who* someone is, and the Trust Score, which assesses *how* trustworthy their digital behavior appears. Together, these scores provide a granular view, allowing you to gauge both the legitimacy of an identity and its potential for fraudulent activity.The Identity Score: Verifying Who You Are
The Identity Score, a foundational component of your overall TrustMatch rating, focuses on establishing the authenticity and consistency of an identity. It verifies that the name, phone number, or email you provide genuinely corresponds to a real person and that the associated information across various databases aligns. A strong Identity Score means the digital footprints left by this identity form a coherent and verifiable picture, significantly reducing the risk of encountering synthetic identities or imposters who construct fake personas from fragmented data.Key Signals for Your Identity Score
Phone Number Analysis
TrustMatch analyzes various aspects of a phone number to determine identity validity. This includes examining carrier data to confirm the number's current service status, checking its telecom port history to see if it has frequently switched carriers or been recently activated, and verifying if it's associated with known voice-over-IP (VoIP) services rather than traditional mobile carriers. A stable, long-standing association with a legitimate carrier and a consistent port history signal a more established and verifiable identity, whereas new, rapidly changing, or VoIP-based numbers can be easier for bad actors to acquire anonymously for short-term fraudulent activities.Email Address Verification
For email addresses, TrustMatch scrutinizes several factors: the age of the email domain, whether the address appears in known data breaches, and the email provider's reputation. An older domain associated with a reputable provider, coupled with no appearance in public breach databases, indicates a more enduring and less compromised digital presence. Conversely, newly registered domains, free email services often used for disposable accounts, or an email found in multiple data breaches could suggest a compromised identity or one created specifically for short-term, potentially illicit, purposes, as such addresses are frequently used in phishing campaigns.Name and Address Consistency
TrustMatch cross-references names and physical addresses against public records, credit bureau data, and other verified databases. This process looks for consistent spelling, address history, and association with other verified identities. When a name consistently appears at a particular address over time and matches other publicly available records, it strongly confirms the identity's legitimacy. Discrepancies, recent address changes without explanation, or names that don't match any verifiable records raise red flags, as fraudsters often use fabricated names or addresses that cannot be easily traced back to a real individual.Public Record Cross-Referencing
We cross-reference the provided identity details (name, address, phone) against various public records, including property deeds, court records, and voter registration databases. The goal is to see if the identity consistently appears across multiple, independent, authoritative sources over time. Consistent matches across these diverse public records provide strong corroboration for the existence and stability of the identity, much like different official documents all bearing the same details. Inconsistent or absent public record matches could indicate a newly created synthetic identity or an attempt to obscure true personal information.The Trust Score: Assessing Your Digital Behavior
The Trust Score delves beyond mere identity verification, evaluating the trustworthiness of an identity based on its digital behavior and associations. It analyzes patterns of activity, connections to known fraudulent networks, and the consistency of interactions across various platforms. This score helps to identify not just *if* an identity is real, but *whether* it behaves in a manner consistent with legitimate users, flagging potential risks like bot activity, account takeovers, or involvement in scams, even when the underlying identity might appear valid.Key Signals for Your Trust Score
Device Fingerprinting and Consistency
TrustMatch employs advanced device fingerprinting to uniquely identify the devices an identity uses to access services. This involves analyzing browser characteristics, operating system details, IP addresses, and other technical metadata. When an identity consistently uses the same few devices from familiar locations, it suggests stable and predictable behavior. However, frequent changes in device fingerprints, access from suspicious IP addresses (e.g., Tor exit nodes, known VPNs used for anonymity), or multiple simultaneous device accesses can indicate an account takeover attempt or an identity being used by multiple individuals, which is a common tactic in fraud.Behavioral Analytics and Interaction Patterns
TrustMatch analyzes interaction patterns such as login frequency, transaction history, and engagement with online platforms associated with the identity. For instance, an account that suddenly exhibits highly unusual activity like bulk messaging, rapid changes in personal information, or attempts to access multiple services shortly after creation, signals a high risk. Legitimate users generally have stable and predictable online habits. Deviations from these established patterns, especially those mimicking automated or fraudulent behaviors, are strong indicators of compromised trust, as seen in many bot-driven scam operations.Network Analysis and Fraud Databases
TrustMatch cross-references the identity's details and associated data points against vast networks of known fraudsters, criminal databases, and financial crime watchlists. This involves checking if the phone number, email, or associated IP addresses have been linked to previous fraudulent transactions, chargebacks, or reported scams. If an identity, or any of its digital components, appears in these databases, it directly signals a high risk. This immediate flagging protects you from interacting with individuals or entities already implicated in illicit activities, as reported by bodies like the Federal Trade Commission, which noted that consumers reported losing over $10 billion to fraud in 2023.Synthetic Identity Detection
TrustMatch utilizes machine learning algorithms to detect synthetic identities – fabricated personas created by combining real and fake information. These algorithms look for anomalies such as mismatched data points (e.g., a real Social Security Number with a fake name or address), newly created credit files with rapid credit-seeking behavior, or unusual data density (e.g., a real address suddenly associated with dozens of new identities). The presence of such inconsistencies suggests a synthetic identity, which are often used for long-term financial fraud and can be incredibly difficult to detect through traditional single-point verification methods. The Federal Reserve reported in 2021 that synthetic identity fraud is a growing threat, costing billions annually.Comparing Identity Verification Methods
| Feature | TrustMatch's Identity & Trust Score | Traditional KYC (Know Your Customer) | Simple Email/Phone Verification | Social Media Profile Check |
|---|---|---|---|---|
| Core Purpose | Comprehensive digital risk assessment and trust scoring based on real-time data and behavior. | Regulatory compliance, static identity verification against official documents. | Confirming ownership/active status of a contact method. | Surface-level reputation check, public persona. |
| Data Sources | Telecom data, email reputation, public records, device fingerprint, behavioral patterns, fraud databases. | Government ID, utility bills, facial recognition (static documents). | SMS code, email link, domain check. | Public posts, follower counts, shared connections. |
| Fraud Detection Depth | High: Detects synthetic identities, account takeovers, behavioral anomalies, network-based fraud. | Medium: Verifies document authenticity, but struggles with sophisticated synthetic identity fraud. | Low: Easily bypassed by disposable accounts and temporary numbers. | Very Low: Easily faked profiles, little to no verification of underlying identity. |
| Real-time Adaptation | High: Scores update based on continuous monitoring and evolving fraud patterns. | Low: Primarily one-time verification at onboarding. | Low: Only verifies current activity status. | Low: Requires manual human interpretation. |
| Privacy Impact | Balances data analysis with privacy-by-design, focusing on signals not direct PII sharing. | Collects and stores significant personal identifying information for compliance. | Minimal: Confirms active contact method. | High: Relies on publicly shared personal information. |
How TrustMatch Calculates Your Combined Trust Score, Step by Step
TrustMatch processes your input and layers multiple data signals to construct a holistic view of the identity in question. This intricate process ensures that every nuance, from the stability of a phone number to the consistency of digital behavior, contributes to a precise and actionable Trust Score. This layered approach helps detect even the most sophisticated fraud attempts.- Data Input and Signal Collection: You initiate a TrustCheck with a name, phone number, or email. TrustMatch's system immediately begins collecting hundreds of data signals related to this input, querying various secure, privacy-compliant databases, telecom networks, email reputation services, public records, and fraud watchlists.
- Identity Score Calculation: The system first focuses on the Identity Score. It cross-references basic identity attributes like name, phone number, and address against authoritative sources, looking for consistency, age of association, and presence in official records. Discrepancies, lack of verifiable data, or associations with known synthetic identity patterns reduce this score.
- Trust Score Assessment: Simultaneously, the Trust Score is evaluated by analyzing behavioral and risk indicators. This includes device consistency, past interaction patterns linked to the identity, associations with fraudulent networks, and the presence of any red flags from real-time behavioral analytics. High-risk signals, like telecom porting within the last 30 days or links to known scam operations, significantly lower this score.
- Combined Score Aggregation and Output: Both the Identity Score and Trust Score are then weighted and combined using a proprietary algorithm to produce the final 0-100 TrustMatch score. This final score is presented to you, along with key contributing factors, providing a transparent and actionable assessment of the identity's overall reliability and trustworthiness.
Frequently asked
What is a TrustMatch Trust Score?
A TrustMatch Trust Score is a comprehensive metric ranging from 0 to 100 that assesses the authenticity and reliability of an online identity. It combines an Identity Score, verifying who someone is, and a Trust Score, evaluating their digital behavior. This dual approach provides a complete picture, helping you understand both the legitimacy of an identity and its potential for fraudulent activity in online interactions.
How does the Identity Score differ from the Trust Score?
The Identity Score verifies *who* someone is by confirming the authenticity and consistency of their identity details (name, phone, email) against public records and trusted databases. The Trust Score, conversely, assesses *how* trustworthy their digital behavior appears, analyzing patterns, device consistency, and connections to fraud networks. Together, they form the complete TrustMatch score, providing both verification and behavioral insight.
What kind of information does TrustMatch use to calculate the scores?
TrustMatch uses a wide array of data signals, including telecom carrier data and port history, email domain age and reputation, public records, device fingerprints, and behavioral analytics like interaction patterns. It also cross-references against fraud databases and sanction lists. This layered approach ensures a thorough analysis, checking for consistency and suspicious activities across various digital footprints to build a comprehensive risk profile.
Can a TrustMatch score change over time?
Yes, a TrustMatch score is dynamic and can change. The system continuously monitors evolving data signals and fraud patterns. If new information emerges that impacts the authenticity or trustworthiness of an identity—such as a phone number being linked to a new fraud scheme, or a user's behavior changing dramatically—the score will be updated accordingly. This ensures the Trust Score remains relevant and accurate.
How does TrustMatch protect my privacy while verifying identities?
TrustMatch is designed with privacy in mind. We focus on analyzing patterns, consistency, and risk signals rather than directly sharing personal identifiable information (PII) of the person being checked. The system uses secure, encrypted channels for data access and adheres to strict data protection regulations. Our goal is to provide a risk assessment without exposing sensitive personal details unnecessarily, ensuring a balance between security and privacy.