{"id":98,"date":"2019-02-15T16:01:43","date_gmt":"2019-02-15T16:01:43","guid":{"rendered":"http:\/\/idcrowd.co.uk\/home\/?p=98"},"modified":"2019-02-15T16:17:32","modified_gmt":"2019-02-15T16:17:32","slug":"exploration-of-remote-identity-proofing-alternatives-to-knowledge-based-verification","status":"publish","type":"post","link":"https:\/\/idcrowd.co.uk\/home\/exploration-of-remote-identity-proofing-alternatives-to-knowledge-based-verification\/","title":{"rendered":"Exploration of Remote Identity Proofing Alternatives to Knowledge Based Verification"},"content":{"rendered":"<p>A recently published white paper developed by DIACC members\u00a0ID Crowd\u00a0 and\u00a0Digidentity\u00a0explores remote identity proofing alternatives to knowledge-based verification. The paper proposes that digital identity has the potential to mitigate risks associated with fraud. Greater customer reach, better compliance, and secure and streamlined onboarding processes are among the benefits digital identity can provide.<\/p>\n<p><strong>Read the full white paper, \u201c<a href=\"https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/Exploration-of-Remote-Identity-Proofing-Alternatives-to-Knowledge-Based-Verification.pdf\" target=\"_blank\" rel=\"noopener\">Exploration of Remote Identity Proofing Alternatives to Knowledge Based Verification<\/a>.\u201d\u00a0<\/strong><\/p>\n<p>\u201cThe US and Canadian identity ecosystems will benefit from this research as it demonstrates that robust alternative methods of remote verification are theoretically possible, both technical as well as commercial,\u201d<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img class=\"wp-image-3113\" src=\"https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/bench-accounting-49025-unsplash-300x200.jpg\" sizes=\"(max-width: 300px) 100vw, 300px\" srcset=\"https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/bench-accounting-49025-unsplash-300x200.jpg 300w, https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/bench-accounting-49025-unsplash-768x513.jpg 768w, https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/bench-accounting-49025-unsplash-1024x684.jpg 1024w\" alt=\"\" \/><\/figure>\n<\/div>\n<p>Knowledge-based verification refers to a security method in which a user is asked to answer at least one \u201csecret\u201d question. The challenge with this approach, the authors purport, is that it is largely based upon the foundation of \u201cwhat the user knows,\u201d and relies on the integrity and secrecy of the underlying information that is being verified.<\/p>\n<p>Given that 2017 and 2018 were years in which online data breaches became part of the public consciousness, concerns surrounding data privacy and protection are mounting.<\/p>\n<p>\u201cData breaches are becoming more frequent; these breaches undermine the integrity of confirming the identity of an individual using knowledge based verification\u201d<\/p>\n<p>\u201cThe inability to trust these traditional data set to identify, verify and authenticate individuals and assets, undermines the development undermines the development of identity ecosystems in North America.\u201d<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img class=\"wp-image-3095\" src=\"https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/authentication-300x240.jpg\" sizes=\"(max-width: 300px) 100vw, 300px\" srcset=\"https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/authentication-300x240.jpg 300w, https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/authentication-768x614.jpg 768w, https:\/\/diacc.ca\/wp-content\/uploads\/2019\/02\/authentication-1024x819.jpg 1024w\" alt=\"\" \/><\/figure>\n<\/div>\n<p>Posing the question \u2013 \u201cis the entity asserting the evidence the true owner of the asserted identity?\u201d- the research studied five alternatives to traditional knowledge-based verification.<\/p>\n<ul>\n<li>The comparison between a machine readable travel document and a \u201cselfie\u201d of the user asserting their identity<\/li>\n<li>A government issued driver\u2019s license as identity evidence<\/li>\n<li>Comparing a user\u2019s asserted identity with that of their mobile phone contract<\/li>\n<li>Verifying the ownership of a financial account under the control of the user<\/li>\n<li>Verification using credit card transaction data<\/li>\n<\/ul>\n<p>\u201cThe NIST 800-63A identity standards enabled us to grade each method and the evidence in terms of their issuance, validation and security features\u201d<\/p>\n<p>All methods, the study determined, are credible identity verification alternatives to the traditional knowledge-based verification approach.<\/p>\n<p>\u201cThe five methods selected are not as vulnerable to breaches as traditional methods such as the credit file as they rely on a spread of features including strong issuance processes, biometric comparisons and cryptographic protective measures,\u201d<\/p>\n<h5>About the Paper<\/h5>\n<p>The Information in this report is based on research funded by the U.S. Department of Homeland Security Science &amp; Technology Directorate (DHS S&amp;T). Any opinions contained herein are those of the performer and do not necessarily reflect those of DHS S&amp;T.<\/p>\n<p>This content of this white paper is developed under the governance of the DIACC International Applied Research program. The International Applied Research program connects innovators that align with the\u00a0DIACC Digital Identity Ecosystem Principles\u00a0with international applied research funding opportunities. The content of the paper was submitted by Digidentity and ID Crowd and does not necessarily reflect those of the DIACC membership.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recently published white paper developed by DIACC members\u00a0ID Crowd\u00a0 and\u00a0Digidentity\u00a0explores remote identity proofing alternatives to knowledge-based verification. The paper proposes that digital identity has the potential to mitigate risks associated with fraud. Greater customer reach, better compliance, and secure and streamlined onboarding processes are among the benefits digital identity can provide. Read the full <a href=\"https:\/\/idcrowd.co.uk\/home\/exploration-of-remote-identity-proofing-alternatives-to-knowledge-based-verification\/\" rel=\"nofollow\"><span class=\"sr-only\">Read more about Exploration of Remote Identity Proofing Alternatives to Knowledge Based Verification<\/span>[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":24,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/posts\/98"}],"collection":[{"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/comments?post=98"}],"version-history":[{"count":2,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/posts\/98\/revisions"}],"predecessor-version":[{"id":100,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/posts\/98\/revisions\/100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/media\/24"}],"wp:attachment":[{"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/media?parent=98"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/categories?post=98"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idcrowd.co.uk\/home\/wp-json\/wp\/v2\/tags?post=98"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}