Use case #0003

Device fingerprinting: how Fraud AI links multiple applications to one fraudster

A fraudster who submits ten applications using ten different identities believes they are invisible — because each identity, in isolation, may look legitimate. What they have not changed is the device. Device fingerprinting does not identify a person. It identifies a machine — and a machine that has submitted ten applications with ten different names, PANs, and Aadhaar numbers is not ten borrowers. It is one fraud operation.

A fraudster who submits ten applications using ten different identities believes they are invisible — because each identity, in isolation, may look legitimate. What they have not changed is the device. Device fingerprinting does not identify a person. It identifies a machine — and a machine that has submitted ten applications with ten different names, PANs, and Aadhaar numbers is not ten borrowers. It is one fraud operation.

What device fingerprinting is — and what it is not

Device fingerprinting is the practice of deriving a stable, unique identifier for a device from the combination of its observable technical characteristics — without requiring any cookie, login, or user-provided identifier. When a borrower opens a loan application on their phone, the application environment collects dozens of device signals: the screen resolution, the OS version, the list of installed fonts, the GPU renderer string, the audio context fingerprint, the accelerometer baseline, the battery charge state, and dozens more. The combination of these signals produces a fingerprint that is statistically unique at the device level and stable across sessions, app reinstalls, and identity changes.

What device fingerprinting is not: it is not location tracking, it does not require camera or microphone access, it does not identify individuals, and it does not persist across factory resets. Its function is narrow and specific — to answer the question: is this the same physical device that submitted a prior application?

The answer to that question, when it is yes across multiple applications with different identities, is one of the most reliable fraud indicators in digital lending.

"The identity changes with every fraudulent application. The device almost never does — because a new device costs money, and fraud operations run on margin."

The device fingerprint: what gets captured

Device Fingerprint Record — Application FD-2025-4441
Generated at session initiation · Nov 14, 2025 · 11:34:08 IST
// DEVICE FINGERPRINT · FD-2025-4441 · Fraud Detection Agent AI
// 47 signals collected · Combined into stable device hash · Cross-referenced against consortium DB

device_hash: "df7a4e2b1c9f3a8e6d4b2c7f1a5e3b9d"
session_timestamp: "2025-11-14T11:34:08.221+05:30"

// HARDWARE SIGNALS
screen_resolution: "1080x2400"
pixel_ratio: 2.625
gpu_renderer: "Adreno (TM) 660"
cpu_cores: 8
total_memory_gb: 8
battery_level: 0.74
accelerometer_baseline: [0.021, 9.782, 0.018]

// SOFTWARE SIGNALS
os_version: "Android 13 (build TP1A.220624.014)"
app_version: "4.2.1" // Loan application version
installed_font_count: 312
audio_context_hash: "a3f7b2c1"
webgl_extensions: ["EXT_texture_filter_anisotropic", "OES_texture_float", ...]

// NETWORK SIGNALS
ip_address: "[hashed]"
ip_type: "mobile-carrier"
isp: "Jio"
vpn_detected: false
proxy_detected: false
tor_exit_node: false

// BEHAVIOURAL SIGNALS (session)
form_fill_time_seconds: 284 // Unusually fast — avg 680s
copy_paste_ratio: 0.94 // 94% of fields filled via paste — not typed
field_sequence_entropy: 0.18 // Very low — form filled in exact same order as prior apps
mouse_movement_naturalness: 0.22 // Low — scripted or automated input suspected

// FRAUD MATCH RESULT
prior_applications_same_device: 9 // 9 prior applications from identical device hash
identities_used: 9 // All 9 used distinct PAN numbers
consortium_fraud_flag: true // Device flagged across 3 lending institutions
risk_score: 98
action: "REJECT + FRAUD_RING_ALERT"
Device match: 9 prior applications from this device hash
Application 1 — Aug 4, 2025PAN: AAAPK1234M · Name: Arun Kumar · Disbursed ₹3.8L — now NPA
Application 2 — Sep 1, 2025PAN: BBBPK5678N · Name: Ravi Sharma · Disbursed ₹4.2L — now NPA
Application 3 — Sep 28, 2025PAN: CCCPK9012O · Name: Suresh Patel · Declined by Peer Institution A
Applications 4–9 — Oct–Nov 20255 additional identities · 3 at peer institutions · 2 here · All pending or declined
● Device hash stable across 9 sessions · 3 months · 3 institutions ● VPN/proxy not used — fraudster unaware of fingerprinting ● All linked applications cross-flagged for recovery action

The behavioural signals: what an automated fraud submission looks like

Beyond hardware and software characteristics, the Fraud Detection Agent AI analyses the behavioural pattern of the application session itself. Legitimate borrowers fill forms differently than automated fraud tools or coached fraudsters — and the differences, while invisible to a human reviewer, are statistically robust at scale.

Behavioural signals — this application vs legitimate borrower baseline
Form fill time
284s (this app)
vs avg 680s ⚑
Copy-paste ratio
94% pasted
vs avg 18% ⚑
Field sequence entropy
0.18 (scripted)
vs avg 0.74 ⚑
Mouse movement naturalness
0.22 (robotic)
vs avg 0.81 ⚑
Session duration
Normal range
Within range ✓
Back-navigation events
0 (never corrected)
vs avg 3.8 ⚑

The network graph: how a fraud ring becomes visible

Device fingerprinting identifies the device. Network graph analysis reveals the ring. When the Fraud Detection Agent AI flags a device as appearing on multiple applications, it builds a network graph of every shared element across those applications — shared devices, shared addresses, shared phone numbers, shared bank accounts, shared IP ranges, shared application timestamps — and uses graph clustering to identify which applications are part of the same fraud operation.

Fraud Ring Network — Device Hash df7a4e2b · Nov 14, 2025
DEVICE df7a4e2b Single device · 9 applications
PAN-01 AAAPK1234M Arun Kumar · ₹3.8L NPA
PAN-02 BBBPK5678N Ravi Sharma · ₹4.2L NPA
PAN-03 CCCPK9012O Suresh Patel · Declined
ADDR-01 Shared Same address · PAN-01 + PAN-04
BANK-01 Shared Same account · PAN-02 + PAN-05
PAN-04–09 6 more Across 3 institutions · 2 disbursed
RISK Score: 98 Fraud ring · Reject + Alert
₹8LAlready disbursed
NPA recovery triggered
7Applications
blocked in-flight
3Peer institutions
cross-alerted via consortium

The velocity check: how the Fraud AI detects application bursts

Fraud rings do not space their applications evenly across time — they burst. A single device submitting one application per month is ambiguous. The same device submitting three applications in four days across two institutions, each with a different identity, is not. The Fraud Detection Agent AI applies velocity thresholds not just at the individual identity level but at the device level and the shared-element level — catching the burst pattern that individual-identity velocity checks miss entirely.

Velocity DimensionThresholdThis DeviceStatusAction
Applications per device (30 days)1 per device9 in 90 daysCriticalFraud ring escalation
Applications per device (7 days)1 per device3 in 7 daysBurst detectedImmediate block
Distinct PAN numbers per device1 per device9 distinct PANsFraud ringAll identities flagged
Applications per PAN (90 days)3 per PAN1 per PANEach PAN: normalWould not catch alone
Shared address across applications2 applications2 applications, 1 addressFlaggedAddress blacklisted
Shared bank account across PANs1 account → 1 PAN1 account → 2 PANsMoney mule signalAccount flagged + AML
47Device signals collected per session — hardware, software, network, and behavioural
₹8LAlready disbursed to fraud ring — NPA recovery triggered on detection
7Applications blocked in-flight when device hash matched fraud ring signature
3Peer institutions cross-alerted via consortium database — preventing disbursements elsewhere

The fraudster changes everything except the one thing that matters

A sophisticated fraud ring will use different names, different PAN numbers, different Aadhaar cards, different phone numbers, and different email addresses for every application. What it will not change is the device — because acquiring a new device for every fraudulent application is expensive, and fraud operations are businesses that optimise for cost. Device fingerprinting exploits this asymmetry: the one thing the fraudster does not bother to change is the most reliable identifier the Fraud Detection Agent AI has. Every application from the same device is a thread in a network that, when pulled, reveals the entire ring.

← Back to Fraud Detection Agent AI