How TruePayables Works
A simple, repeatable process that builds vendor trust over time. No complex integrations—start with email forwarding and grow from there.
Ingest: Forward or Upload Invoices
Start sending invoices to TruePayables the moment you sign up. No complex integrations, no IT involvement required.
Email Forwarding
Set up automatic forwarding from your AP inbox, or manually forward individual invoices. Each organization gets a dedicated inbox address.
Web Upload
Drag and drop invoices directly through the web portal. Supports PDF, images, and common document formats.
API Integration
For automated workflows, use our API to send invoices programmatically from your ERP or document management system.
Extract: Parse Invoice Details
Every invoice is processed to extract the data points that matter for vendor verification.
Vendor Identification
Company name, tax ID, addresses, and contact information are extracted and normalized.
Remittance Details
Bank account numbers, routing numbers, payment addresses, and wire instructions are captured.
Sender Metadata
Email domains, sender addresses, and document fingerprints are recorded for pattern analysis.
Verify: Compare Against History
Each extracted detail is compared against the vendor's verified history in TruePayables.
Baseline Matching
Bank accounts, addresses, and sender patterns are checked against established baselines.
Change Detection
Any deviation from the verified baseline triggers an alert. New bank accounts, different remit-to addresses, and unfamiliar sender domains are all flagged.
Risk Scoring
Changes are categorized by risk level. First-time vendor? Low history confidence. Bank change from trusted sender? Medium risk. Multiple changes at once? High risk.
Decide: Process or Investigate
With verification status clear, your team can make informed payment decisions.
Green Path
Invoices matching verified history proceed through normal processing. No additional steps required.
Yellow Path
Flagged changes require verification before payment. Use the built-in callback workflow or your existing verification process.
Red Path
High-risk invoices can be automatically held or escalated based on your configured policies.
Building trust over time
The verification baseline strengthens with every invoice. Here's how confidence builds over time.
Initial vendor profile created. Bank account and sender details recorded.
Consistent patterns established. Sender domains and payment details verified.
Strong verification baseline. Any deviation is clearly anomalous.
Legitimate changes are verified and added to the timeline. Confidence remains high.
What TruePayables detects
The most common indicators of vendor fraud and business email compromise.
Bank Account Changes
New account numbers, routing numbers, or payment instructions that differ from verified history.
Sender Domain Changes
Invoices from new email domains, lookalike domains, or free email providers.
Address Changes
New remit-to addresses, PO boxes, or physical addresses that differ from established patterns.
Contact Changes
New contacts, phone numbers, or reply-to addresses appearing on invoices.
Document Anomalies
Changes in invoice templates, formatting, or document properties that suggest manipulation.
Timing Patterns
Unusual invoice timing, rush payment requests, or invoices outside normal billing cycles.
See it in action
Book a demo to see how TruePayables builds vendor timelines and detects changes for your organization.