logo
Bynn alternative

Looking for a Bynn alternative? — Structural PDF forensics with transparent markers

Risk-ops and fraud teams evaluating Bynn for document verification have a focused need: catch forged or edited PDFs before they enter the workflow. htpbe? solves that need at the file layer with named structural markers, public pricing, and a self-serve API. If you want forensic transparency rather than a single black-box risk score, this is the difference that matters.

~3 sec
per document
35 checks
forensic layers
From $15
per month
1,500+
docs / month on Growth
Scope

htpbe? analyzes the structural layer of the PDF file — producer, xref, metadata, image streams, signature chain, balance arithmetic. We don't do identity-document biometrics or photo-ID matching. Bynn covers a broader document-and-identity verification scope; this page describes how htpbe? fits the structural document-fraud layer specifically.

How it looks

One REST call, one deterministic verdict

Upload the PDF. The API returns INTACT, MODIFIED, or INCONCLUSIVE with named markers — in about three seconds.

What this looks like

Why teams pick htpbe? for the structural-forensics layer

Three real fraud mechanics we catch at the structural PDF layer.

01

Named markers, not a black-box score

htpbe? returns INTACT, MODIFIED, or INCONCLUSIVE with explicit named markers (xref count, producer signature, signature chain, balance arithmetic, image-stream artefacts). Your fraud-ops or underwriting logic interprets the markers in context — no opaque numerical score to defend.

02

Self-serve, public pricing

Plans from $15/mo (30 requests) to $499/mo (1,500 requests) with explicit quotas on the public pricing page. Sign up, get an API key, ship the integration the same day. No sales call, no procurement.

03

Structural-only depth

We don't spread across OCR, identity biometrics, transaction analytics, AML. We focus on one thing: did this PDF get modified or fabricated after issuance? That focus shows up in detection depth — incremental update detection, font subset divergence, ghost-info scan, hybrid raster-and-programmatic detection, page-assembly forensics.

How htpbe? is positioned

$15/mo
starter plan, public pricing on /pricing
~3 sec
per PDF analyzed via API
35+ checks
across 10 forensic detection layers

When htpbe? makes sense (and when Bynn might fit you better)

Want focused structural depth? htpbe? Want broader doc + identity scope? Look at both.

Honest sizing: pick the tool whose feature scope and depth match yours.

htpbe? is built for risk-ops teams that want maximum structural-forensics depth on PDF documents — named markers, multiple detection layers, transparent pricing. If your team needs document verification bundled with identity-document biometrics, photo matching, or broader KYC scope, Bynn and similar platforms have that broader scope — that's a fair reason to evaluate them. If structural document fraud is your focused need, htpbe? is positioned for that.

Results in under 3 seconds30 to 1,500+ documents/monthFrom $15/mo
How it works

Five forensic layers, one deterministic verdict

Every PDF we receive passes through the same structural pipeline — no model training, no thresholds to tune.

01

Metadata analysis

Creation and modification timestamps, producer and creator fields, XMP metadata — the first layer exposes basic tampering.

02

File structure

Xref tables, trailer chain, incremental updates. Any edit after export leaves a structural fingerprint here.

03

Digital signatures

Signature chain integrity and post-signature modifications produce deterministic markers. Certainty-level signal.

04

Content integrity

Fonts, objects, embedded content, page assembly. Multi-session edits and inserted objects are visible at this layer.

05

Verdict with markers

Deterministic output: INTACT / MODIFIED / INCONCLUSIVE, with named markers for every finding — suitable for audit trail.

Document types

PDFs we analyze structurally

Every type listed below is analyzed at the structural file layer — not the rendered image.

Bank statement PDFPay stub / payslip PDFTax form PDF (W-2, 1099, P60, P45, T4, Form 16, ITR)Employment letter PDFAsset / gift letter PDFUtility bill PDF (proof of address)Receipt / invoice PDF
What htpbe? checks

Detection capabilities

Deterministic structural signals. No probabilistic scores, no model training.

Producer signature analysis

Authentic documents come from institutional sources. When the producer field shows a desktop tool or generator-tool fingerprint, htpbe? flags it. The verdict is interpretable, not a black-box score.

Incremental update detection

Edits to a real PDF leave incremental update markers in the xref chain. htpbe? flags these as MODIFIED at high confidence — visible structural evidence of post-issuance editing.

Balance arithmetic verification

Running balance is verified row-by-row across bank statements. Edited transactions break the chain unless every dependent balance was also adjusted.

Digital signature chain validation

Tax forms, employer letters, government PDFs carry digital signature chains. htpbe? validates the chain and flags invalidated or removed signatures as MODIFIED at certain confidence.

Image-stream artefact detection

Lifted-and-pasted logos, signatures, and headers leave compression and object-structure artefacts that differ from authentic embedded content.

Multi-layer forensic depth

Beyond the basics: font subset divergence (multi-session generation), ghost-info scan (residual original metadata after producer forgery), hybrid raster-and-programmatic detection (Y-flip CTM), page-assembly forensics (pages imported from different sources), template-forgery patterns. The depth shows up in INCONCLUSIVE-vs-MODIFIED-vs-INTACT precision.

Integrate in minutes

A Bynn alternative your engineers can ship today

Buyers can skip this section — developers, the integration is two HTTP calls.

Step 1 — submit the PDF

curl -X POST https://api.htpbe.tech/v1/analyze \
  -H "Authorization: Bearer $HTPBE_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"url": "https://your-storage/applicant-document.pdf"}'

Step 2 — read the named markers

{
  "id": "b1y2n3n4-5a6l-7t8x-9z0r-a1b2c3d4e5f6",
  "status": "modified",
  "modification_confidence": "high",
  "modification_markers": [
    "Two cross-reference tables — incremental update",
    "Modification date 11 days after creation date",
    "PDF editor producer detected",
    "Font subset prefix shift between pages 2 and 3"
  ],
  "producer": "Adobe Acrobat Pro",
  "creator": "Chase Online Banking",
  "creation_date": 1707091200,
  "modification_date": 1708041600,
  "has_digital_signature": false,
  "xref_count": 2,
  "has_incremental_updates": true
}

Verdict: modified at high confidence with named markers. The xref count, producer mismatch (Chase original, Adobe re-save), modification timestamp gap, and font subset prefix shift across pages each tell a piece of the story. Your fraud-ops logic interprets the markers — we don't hide them behind a single number.

Customer Stories

Teams that stopped document fraud

Compliance, finance, and risk teams use htpbe? to catch manipulated PDFs before they become costly mistakes.

Caught an invoice where the total had been changed by less than a thousand dollars. Without this I would have approved it without a second look.

Sarah M.

AP Manager

United States

We had three applicants in the same week with bank statements that looked completely fine. Two of them were flagged as modified. You simply cannot see this by reading the document — it is in the file structure.

Lars V.

Risk Analyst, Online Lending

Netherlands

Salary slips were coming with altered figures. We identified two problematic files before the placement was finalised.

Priya K.

HR Operations Lead

India

Since we started checking documents this way, we stopped two applications early in the process that would have been very difficult to reverse later.

Julien R.

Fraud Analyst, Fintech

France

Some applicants were sending PDFs that looked authentic but had been edited in ways not visible to the eye. We now ask for verified originals when something is flagged. Already saved us from a few bad decisions.

Marta S.

Compliance Coordinator

Spain

One invoice was caught because there was a mismatch between the document dates and structure. That particular case would have cost us significantly.

Tariq A.

Finance Manager

United Arab Emirates

FAQ

Frequently asked questions

No. Bynn covers document and identity verification at broader scope. htpbe? is the structural document-forensics layer specifically — focused depth on the PDF integrity question. If you need broader scope, Bynn fits. If you want structural depth as a primitive your team integrates, htpbe? fits.
Plans start at $15/mo (30 requests) and go to $499/mo (1,500 requests) with public pricing on /pricing. Enterprise unlimited is a contract conversation. Bynn pricing is on their site or via their sales team — transparent self-serve pricing is one of the deliberate differences in our positioning.
A single risk score (e.g., "0.82 fraud probability") is opaque — you can't tell why the system flagged the document, and your reviewer has nothing concrete to escalate. Named markers (xref count, producer signature, balance break, image-stream artefact) tell the reviewer what to verify next. The verdict is interpretable; the action is concrete.
Yes. Sign up for the free tier — test API keys are included on every plan, including free. Run our test PDF fixtures through your integration without consuming live quota. No card on free tier.

Secure your workflow

Create your account — API key on signup, free test environment on every plan.
From $15/mo. No sales call. Cancel any time.