SlideShare a Scribd company logo
1 of 21
Download to read offline
Add identity proofing to your accounts, after they’ve been established
Simplify  Protect  Secure
WHY “ADD” IDENTITY PROOFING?
Proofing value (IAL) must be added to Multi-Factor Authentication to achieve higher LOA
Higher LOA is required to provide Services to Users that involve higher RISK to the SP.
Higher Value Services require you to better proof your customer accounts! Stronger than KYC
NIST 800-63 Defines “Levels” for Identity over Time
• Enrollment Time
• Identity Assurance Level
• Credential Issuance Event
Proofing
• Over Time
• Credential Integrity
• Revocation & Validity
• Usage Tracking/ Evaluation
• Reputation Scoring
• Location Detection
Assurance • Transaction Time
• Authentication Assurance
Level
• User Verification
Authentication
800-63A 800-63B
IAL1 + AAL1 LOA2 Low
IAL2 + AAL2 LOA3 Substantial
IAL3 + AAL3 LOA4 High
Balancing Authentication & Proofing gets you LOA
4
©2016MorphoTrustUSA,LLC.Allrightsreserved.Noreproductionor
republishingwithoutwrittenpermission
IDENTITY PROOFING
What happens in-person… Identity Proofing Event
How can it translate to an online or mobile action?
Proofing
800-63A
Qualified Record
Valid Authentic
Documented
Real
Unique
Evidence
• Single Identity
• Valid Attributes
• Scanned Images
• Authenticatable
Resolved
Identity Proofing Event
⓴⓱@davidkelts
Identity
(Digital Subject)
Authenticate
Resolution
• Determine Evidence is for a
Single Legal Identity
Evidence Qualification
• Data Validation
• Document Authentication
Verification
• Multi-Factor
Authentication to Evidence
Proofing
800-63A
Resolved
Identity
Full Legal
Name
Date of
Birth
Place of
Birth
Sex
Minimum Attributes for
Legal Identity Resolution
⓴⓮@davidkelts
Legal
Identity
Citizenship
Address
Over18
Over21
US Legal
Presence
Mobile
Number
Additional Attributes
that activate Use Cases
for a Legal Identity ⓴⓯@davidkelts
Identity Resolution
What attributes resolve to a Single Legal Identity?
Attribute Valid
Provenance
Freshness
Accuracy
⓴⓱@davidkelts
https://pages.nist.gov/NISTIR-8112/
Data Validation
What measurements determine attribute validity?
Post Issuance Authentication
Authenticity of credentials at points of service
Secure Credential Design
Creates a feeling of authority that we all detect
UV & IR Exposed Features
Hardware and physical doc present
Visual Inspection
Document Authentication
Determine that the Identity Evidence is Official and Untampered
White Light Scan
• Document Authentication
• Data Extraction
Advanced Pattern Recognition
• Biometric Techniques Applied to Documents
• Machine Learning of Unique Patterns
• Detectable Security Features
New white-light
techniques enable
Doc Auth APIs
COMPARING IDENTITY PROOFING EVENTS
What are the requirements for the common identity proofs that Citizens go through?
What IAL would these proofs achieve?
Proofing
800-63A
Know Your Customer
• Not-Specified • Visual Data Validation to
Presented Document
• Unexpired Passport
• PAN Card
• Voter Identity Card
• Unexpired Driving License
• Others for Proof of Address
• Authentication Not-Specified
• Operator Visual
 Proof of Legal Name
 Commonly used Names
 Proof of Perm Address
o Collect Date of Birth
o Collect a Unique
Identifier from a Doc
Requirements Resolution Qualification Verification
⓴⓱@davidkelts
DMV Standard
•Processing to Ensure 1
Person = 1 Record
•Operator Option to Pause,
Stop, or Flag the Record
•Validate Data
•SSOLV (Name)
•PDPS & CDLIS
•EVVE (Birth)
•Scan Multiple Documents
•Anti-Forgery Efforts
•Fraud Doc Training
•Authentication Equipment
•Operator Visual
•Visual to Docs of Guardian
if < Age of Consent
•1 : Record Biometric
•1 : Many Biometric
•Background Checks
 Proof of Legal Name
 Commonly used Names
 Proof of Perm Address
 Proof of Date of Birth
 Proof of Signature
o Nationality & Legal
Presence in US/State
o Collect Front-Facing
Photo
Requirements Resolution Qualification Verification
In-Person
⓴⓱@davidkelts
Real ID
• Processing to Ensure
1 Person = 1 Record
• Participate Cross State
1 Person = 1 Record
• Operator Option to Pause,
Stop, or Flag the Record
• Validate Data
• SSOLV (Name & SSN)
• PDPS & CDLIS
• EVVE (Birth)
• SAVE (Legal Presence)
• Retain Scan Docs 5 – 7 Years
• Anti-Forgery Efforts
• Fraud Doc Training
• Authentication Equipment
• Operator Visual
• Visual of Guardian if < Age of
Consent
• 1 : Record Biometric
• 1 : Many Biometric
• Background Checks
 Proof of Legal Name
 Commonly used Names
 Proof of Perm Address
 Proof of Date of Birth
 Proof of Signature
 Proof of Nationality &
Legal Presence in US
 Proof of Social Security #
o Collect Front-Facing
Photo at Start of Proofing
o Collect Scan of Docs
o Unique Identifying Num
Requirements Resolution Qualification Verification
In-Person
⓴⓱@davidkelts
Comparing Proofing Processes
What you need to know
• KYC is a little more than an
Identity Verification
• Every DMV Proofing meets IAL3
• Real ID exceeds that
– States have all implemented
– Road blocked 4 States? Legislative
• These open opportunities for
you to attach to strong identity
IDENTITY ASSURANCE
ACCURACY OF THE IDENTITY ATTRIBUTES
Underlying concepts needed to understand how to validate identity data
Assurance
Measure of Freshness, Based on Decay Rate
Proofing Event
Decay Rate
Authentications
Refresh Cycle
Stale
Decay Rates vary by attribute
• Date Of Birth
• Place of Birth
• Sex
• Citizenship
• Full Name
• Legal Presence
• Over 21, Over 18
• Mobile Number
• Address
• Driver StatusTime
Accuracy
DecayRateTolerance
NeverAnnually
Measure of Provenance
Distance from original legal identity record (birth + authorized changes)
Primary Records
Birth Registry
Social Security
Marriage Registry
Nationality DBs
Death Master File
Proofing Authority
Document Issuer
DL Valid/Exists
Passport Valid/Exists
Aggregated Proofs
Published Records
Public Records
Algorithmic Correlations
Correlated
• Public Records
• Public Posts
• Public Data
More Authoritative
⓴⓯ @davidkelts
More Subject to Error incl. from Decay Rate
Can you validate against
Authenticated Token?
Validate
ADDING IDENTITY PROOFING
Qualified Evidence can be added if the user is Authenticated to the Identity Record at high AAL.
Reputation scoring, while valuable, is not identity proofing
Usage tracking and patterns, while valuable, are not identity proofing
Assurance
Your Accounts – the goal is to…
Strengthen Proofing Concepts Validate Assurance Concepts
Resolution
•Determine single legal identity
Evidence Qualification
•Data Validation
•Document Authentication
Verification
•Multi-Factor Authentication to
the Identity Evidence
Attribute
Valid
Provenance
Freshness
Accuracy
Identity Assurance Level (IAL) 2 IAL 3
Add Identity Assurance to Your Accounts
Scan
Authentic
Identity
Documents
Validate
Identity Data
you Hold
Verify
Identity of
Account
Holder
Bind to
another
High IAL
Account
Proof the
Individual
Even after registration, Qualified Evidence can bring your accounts upward to NIST 800-63A Identity Assurance Levels
APIs for User and ID Verification
API Connections to Authoritative
Sources for Data Validation
Key Additional Steps
• Authenticate your User at your Highest Possible AAL before
– Scan, upload, or snap a document
– Webcam or selfie their face
– Capture a biometric (see hole in TouchID)
– Scan data from one of their documents
• Presentation Attack Detection
• Risk: Evaluation of Signals
• Privacy: Beware of Outsourcing (GDPR)

More Related Content

Similar to Proofing ex post facto from Cloud Identity Summit 2017

Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University Wisconsin
Nicholas Davis
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
Liam Cleary [MVP]
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
Nicholas Davis
 
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 

Similar to Proofing ex post facto from Cloud Identity Summit 2017 (20)

Trust elevation-abbie-v1
Trust elevation-abbie-v1Trust elevation-abbie-v1
Trust elevation-abbie-v1
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
The Importance of SSL Encryption
The Importance of SSL EncryptionThe Importance of SSL Encryption
The Importance of SSL Encryption
 
Identity Verification
Identity VerificationIdentity Verification
Identity Verification
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
apidays LIVE India - Digital Trust Infrastructure - Key to digital transforma...
apidays LIVE India - Digital Trust Infrastructure - Key to digital transforma...apidays LIVE India - Digital Trust Infrastructure - Key to digital transforma...
apidays LIVE India - Digital Trust Infrastructure - Key to digital transforma...
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University Wisconsin
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
 
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Single SignOn with Federation using Claims
Single SignOn with Federation using ClaimsSingle SignOn with Federation using Claims
Single SignOn with Federation using Claims
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffapi-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
 
Reduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device AuthenticationReduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device Authentication
 
Public Key Infrastructures
Public Key InfrastructuresPublic Key Infrastructures
Public Key Infrastructures
 

Recently uploaded

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Recently uploaded (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

Proofing ex post facto from Cloud Identity Summit 2017

  • 1. Add identity proofing to your accounts, after they’ve been established Simplify  Protect  Secure
  • 2. WHY “ADD” IDENTITY PROOFING? Proofing value (IAL) must be added to Multi-Factor Authentication to achieve higher LOA Higher LOA is required to provide Services to Users that involve higher RISK to the SP. Higher Value Services require you to better proof your customer accounts! Stronger than KYC
  • 3. NIST 800-63 Defines “Levels” for Identity over Time • Enrollment Time • Identity Assurance Level • Credential Issuance Event Proofing • Over Time • Credential Integrity • Revocation & Validity • Usage Tracking/ Evaluation • Reputation Scoring • Location Detection Assurance • Transaction Time • Authentication Assurance Level • User Verification Authentication 800-63A 800-63B IAL1 + AAL1 LOA2 Low IAL2 + AAL2 LOA3 Substantial IAL3 + AAL3 LOA4 High
  • 4. Balancing Authentication & Proofing gets you LOA 4 ©2016MorphoTrustUSA,LLC.Allrightsreserved.Noreproductionor republishingwithoutwrittenpermission
  • 5. IDENTITY PROOFING What happens in-person… Identity Proofing Event How can it translate to an online or mobile action? Proofing 800-63A
  • 6. Qualified Record Valid Authentic Documented Real Unique Evidence • Single Identity • Valid Attributes • Scanned Images • Authenticatable Resolved Identity Proofing Event ⓴⓱@davidkelts Identity (Digital Subject) Authenticate Resolution • Determine Evidence is for a Single Legal Identity Evidence Qualification • Data Validation • Document Authentication Verification • Multi-Factor Authentication to Evidence Proofing 800-63A
  • 7. Resolved Identity Full Legal Name Date of Birth Place of Birth Sex Minimum Attributes for Legal Identity Resolution ⓴⓮@davidkelts Legal Identity Citizenship Address Over18 Over21 US Legal Presence Mobile Number Additional Attributes that activate Use Cases for a Legal Identity ⓴⓯@davidkelts Identity Resolution What attributes resolve to a Single Legal Identity?
  • 9. Post Issuance Authentication Authenticity of credentials at points of service Secure Credential Design Creates a feeling of authority that we all detect UV & IR Exposed Features Hardware and physical doc present Visual Inspection Document Authentication Determine that the Identity Evidence is Official and Untampered White Light Scan • Document Authentication • Data Extraction Advanced Pattern Recognition • Biometric Techniques Applied to Documents • Machine Learning of Unique Patterns • Detectable Security Features New white-light techniques enable Doc Auth APIs
  • 10. COMPARING IDENTITY PROOFING EVENTS What are the requirements for the common identity proofs that Citizens go through? What IAL would these proofs achieve? Proofing 800-63A
  • 11. Know Your Customer • Not-Specified • Visual Data Validation to Presented Document • Unexpired Passport • PAN Card • Voter Identity Card • Unexpired Driving License • Others for Proof of Address • Authentication Not-Specified • Operator Visual  Proof of Legal Name  Commonly used Names  Proof of Perm Address o Collect Date of Birth o Collect a Unique Identifier from a Doc Requirements Resolution Qualification Verification ⓴⓱@davidkelts
  • 12. DMV Standard •Processing to Ensure 1 Person = 1 Record •Operator Option to Pause, Stop, or Flag the Record •Validate Data •SSOLV (Name) •PDPS & CDLIS •EVVE (Birth) •Scan Multiple Documents •Anti-Forgery Efforts •Fraud Doc Training •Authentication Equipment •Operator Visual •Visual to Docs of Guardian if < Age of Consent •1 : Record Biometric •1 : Many Biometric •Background Checks  Proof of Legal Name  Commonly used Names  Proof of Perm Address  Proof of Date of Birth  Proof of Signature o Nationality & Legal Presence in US/State o Collect Front-Facing Photo Requirements Resolution Qualification Verification In-Person ⓴⓱@davidkelts
  • 13. Real ID • Processing to Ensure 1 Person = 1 Record • Participate Cross State 1 Person = 1 Record • Operator Option to Pause, Stop, or Flag the Record • Validate Data • SSOLV (Name & SSN) • PDPS & CDLIS • EVVE (Birth) • SAVE (Legal Presence) • Retain Scan Docs 5 – 7 Years • Anti-Forgery Efforts • Fraud Doc Training • Authentication Equipment • Operator Visual • Visual of Guardian if < Age of Consent • 1 : Record Biometric • 1 : Many Biometric • Background Checks  Proof of Legal Name  Commonly used Names  Proof of Perm Address  Proof of Date of Birth  Proof of Signature  Proof of Nationality & Legal Presence in US  Proof of Social Security # o Collect Front-Facing Photo at Start of Proofing o Collect Scan of Docs o Unique Identifying Num Requirements Resolution Qualification Verification In-Person ⓴⓱@davidkelts
  • 14. Comparing Proofing Processes What you need to know • KYC is a little more than an Identity Verification • Every DMV Proofing meets IAL3 • Real ID exceeds that – States have all implemented – Road blocked 4 States? Legislative • These open opportunities for you to attach to strong identity
  • 15. IDENTITY ASSURANCE ACCURACY OF THE IDENTITY ATTRIBUTES Underlying concepts needed to understand how to validate identity data Assurance
  • 16. Measure of Freshness, Based on Decay Rate Proofing Event Decay Rate Authentications Refresh Cycle Stale Decay Rates vary by attribute • Date Of Birth • Place of Birth • Sex • Citizenship • Full Name • Legal Presence • Over 21, Over 18 • Mobile Number • Address • Driver StatusTime Accuracy DecayRateTolerance NeverAnnually
  • 17. Measure of Provenance Distance from original legal identity record (birth + authorized changes) Primary Records Birth Registry Social Security Marriage Registry Nationality DBs Death Master File Proofing Authority Document Issuer DL Valid/Exists Passport Valid/Exists Aggregated Proofs Published Records Public Records Algorithmic Correlations Correlated • Public Records • Public Posts • Public Data More Authoritative ⓴⓯ @davidkelts More Subject to Error incl. from Decay Rate Can you validate against Authenticated Token? Validate
  • 18. ADDING IDENTITY PROOFING Qualified Evidence can be added if the user is Authenticated to the Identity Record at high AAL. Reputation scoring, while valuable, is not identity proofing Usage tracking and patterns, while valuable, are not identity proofing Assurance
  • 19. Your Accounts – the goal is to… Strengthen Proofing Concepts Validate Assurance Concepts Resolution •Determine single legal identity Evidence Qualification •Data Validation •Document Authentication Verification •Multi-Factor Authentication to the Identity Evidence Attribute Valid Provenance Freshness Accuracy
  • 20. Identity Assurance Level (IAL) 2 IAL 3 Add Identity Assurance to Your Accounts Scan Authentic Identity Documents Validate Identity Data you Hold Verify Identity of Account Holder Bind to another High IAL Account Proof the Individual Even after registration, Qualified Evidence can bring your accounts upward to NIST 800-63A Identity Assurance Levels APIs for User and ID Verification API Connections to Authoritative Sources for Data Validation
  • 21. Key Additional Steps • Authenticate your User at your Highest Possible AAL before – Scan, upload, or snap a document – Webcam or selfie their face – Capture a biometric (see hole in TouchID) – Scan data from one of their documents • Presentation Attack Detection • Risk: Evaluation of Signals • Privacy: Beware of Outsourcing (GDPR)