Identity Proofing: The key to a strong digital identity
Any business today has a compelling reason to know its customers well: to protect against fraud and comply with regulations. However, in digital environments, merely asking for a name and some basic information is no longer sufficient to confirm the identity of the person on the other side of the screen.
How can you be sure that the person on the other end is truly who they claim to be? This is where identity proofing comes in, acting like a detective who checks multiple sources to ensure that the claimed identity is genuine.
Online identity proofing can encompass tasks such as checking various sources of information, utilizing biometric technology for identity confirmation, or verifying identity documents. It’s akin to thoroughly examining all the pieces of a jigsaw puzzle to ensure they fit perfectly.?
What is Identity Proofing and why is it important?
Identity proofing is a process that verifies and authenticates the identity of a person attempting to access a service or system. It is also known as identity verification and involves confirming that an identity exists in the real world and truly belongs to the person presenting it.
Typically, this process is carried out when you register with a website or service in a process commonly known as digital onboarding. Its purpose is to ensure that you are using a legitimate and accurate identity.
Imagine you’re making an online purchase or signing up for a web platform. At that point, the company needs to be certain that you are who you claim to be. This is what we call “identity proofing,” and it should involve a thorough check.
Sometimes, they will request personal information like your name or address or even ask you questions that only you should know. However, this isn’t always sufficient because there’s a risk that this information may have been compromised or accessed by others.
For this reason, more advanced solutions are used to verify your identity. The next step might involve companies asking you to take a selfie or record a video of yourself to demonstrate that you are a real, live person (a process known as liveness detection). They may also examine your documents to ensure everything matches. You’ll be asked to show them to the camera, and they will be automatically scanned and validated.?
How Is Identity Proofing Done?
There are different methods and levels of rigor, but in general, they are based on the following elements:
What Is the Difference Between Identity Proofing and Biometric Authentication?
The difference between identity proofing and biometric authentication lies in the process in which they are performed.
Identity proofing refers to the initial process of verifying a person’s identity when registering or initiating a relationship with a company, public body, or online service, typically in a digital onboarding process. It ensures that the person claiming an identity is indeed who they say they are. Furthermore, it often involves verification from multiple sources, including biometrics, and is typically performed only once.
Biometric authentication, on the other hand, pertains to the process of verifying a person’s identity when attempting to access a system or service, typically after completing the identity proofing process. It relies on unique and measurable physical characteristics of a person, such as fingerprints, facial features, iris patterns, or voice. Biometric authentication can be used to verify identity multiple times throughout the customer’s use of the service.
Benefits of Identity Proofing
Identity proofing has several benefits for both users and service or system providers:
领英推荐
eIDAS and Identity Proofing
The European standards published by ETSI on trust services address how we confirm people’s identity. However, there’s an issue: these standards mention phrases like “physical presence” or “means equivalent to physical presence,” as per article 24.1 of eIDAS. The problem is that they don’t provide a clear explanation of what “physical presence” means, leaving room for subjective interpretation.
eIDAS doesn’t lay out precise requirements for physical identity documents or the individuals responsible for conducting these checks. In other words, determining what qualifies as an “equivalent guarantee” to physical presence depends on one’s interpretation, creating confusion.
This issue has become even more critical with the revision of the eIDAS Regulation, also known as eIDAS2. Consequently, it was necessary to address this matter in a more straightforward and effective manner.
Identity accreditation isn’t a trust service on its own within the eIDAS regulation but rather an integral component of trust services. Various trust services may incorporate an identity proofing service component, which is why trust service providers (TSPs) often outsource identity verification to specialized providers in this field.
Security Requirements/Risks
To ensure overall security, security requirements are established that address four primary categories of risks:
New European Standards on Identity Proofing
In 2021, new technical standards were published to define what the equivalence of physical or face-to-face identity proofing would entail:
These technical specifications form the basis of an important guide known as CCN STIC-140 Annex F.11. This guide outlines the regulations that video identification tools must adhere to when remotely verifying someone’s identity using video. These regulations are in accordance with the guidelines established in Ministerial Order ETD/465/2021, which covers the use of video for issuing qualified electronic certificates.
CCN-STIC Guide 140 is issued by the Spanish National Cryptologic Centre (CCN), which establishes security requirements for classified information systems. Annex F.11 of this guide focuses on video-identification tools used for remote identity verification and establishes the technical requirements that these tools must meet, defining two types of identification processes
Unassisted or asynchronous process
In this case, the operator does not speak or interact directly with the user. Instead, they review information stored in databases and information systems. They have a control panel that displays all the evidence, such as images and videos, and decide whether the identification is valid or not. There is no real-time communication with the user; everything is based on data from a previous video-identification process.
Assisted or synchronous processing
Here, the operator communicates with the user via a real-time video call. During the video call, the operator makes a decision based on the tool’s score, a review of the evidence, and their evaluation of the conversation. All data, including the identification result, is recorded in the system and stored in a database.