Enter date here Authenticate Pro Helen Clift 15 th November 2005.
-
Upload
ashley-mores -
Category
Documents
-
view
218 -
download
3
Transcript of Enter date here Authenticate Pro Helen Clift 15 th November 2005.
Enter date here
Authenticate Pro
Helen Clift
15th November 2005
Agenda
What is identity authentication
Electronic ID authentication
Customer scenarios
QAS Authenticate Pro
What is identity authentication
Proves a persons identity by comparing biographical information given at point of application against data held within authoritative databases i.e: ER,
PAF, NCOA,CAIS (Credit Account Info) and CIFAS (Fraud Prevention)
What is identity authentication?
Proving an identity exists
Proving that the applicant is the correct owner of that identity
….does Helen Clift exist?
….am I Helen Clift?
Cabinet Office ID fraud study
“Most current processes for issuing government
documentation used for identity verification ….. do
not meet the highest private sector standards of
security”
Cabinet Office ID fraud study
“ For most people, checks against databases run by
credit reference agencies will give much more
satisfactory validation and verification of identity “
JMLSG guidance notes 2003
JMLSG guidance notes 4.90 to 4.97 state : -
electronic data can be used as an alternative to
documentary evidence (not to complement)
electronic data can be distilled into an index
BBA authored 2005 guidance notes will
make this reference more prominent
JMLSG guidance notes 2005
Para 5.4.10 - 5.4.14Re-affirms the use of electronic data as an alternative to documents
Para 5.20Need to apply more stringent check for remote interactions
FSA view
“…..electronic verification offers a number of advantages
It is quick
It resulted in less documents being sent through the post, with the attendant risks of loss
It makes the customer experience easier.”
Head of Policy, Financial Crime, FSA,
9th September 2004
The electronic approach?
Access to wide range of data stores
Assimilation of all appropriate data
Does not stop at 1+1
Appraisal of the breadth, depth & quality
Identifies any negative conditions
Scenarios - Finance
Compliance with AML regulationsPaper process =
inconvenience for customersIncreased risk of ID Fraud
13% of customers ‘drop off’ through the application process *
* QAS-Direct Dialog consumer survey August 2005.
Scenarios – Retail/Telecoms
High value products
Increased risk of fraud
Unlimited credit -> substantial bills
Spontaneous purchases
Scenarios – Retail/Telecoms
27% of customers do not carry ID with them at all times*
70% of customers would be more likely to complete an application if the application took just seconds*
* QAS-Direct Dialog consumer survey August 2005.
The QAS proposition
Off the shelf identity management solution
Natural extension to QAS’s data capture possibilities
Trusted data sources from Experian
Technical overview
PAF
Expe
rian A
uthen
ticate P
lus
QuickAddress Pro
ER
Technical overview
PAF
Expe
rian A
uthen
ticate P
lus
QuickAddress ProName & Address
ER
AuthenticateCapture Screen
Dedicated or Internet
Connection
Name & Address from ProFormer Addresses?Time at these addresses?Date of Birth?Male or Female?Telephone Numbers?No of Dependents?Bank Details?Owner Occupier?
Technical overview
PAF
Expe
rian A
uthen
ticate P
lus
QuickAddress ProName & Address
ER
AuthenticateCapture Screen
AuthenticateResults Page
Dedicated or Internet
Connection
Yes/No
70
Name & Address from ProFormer Addresses?Time at these addresses?Date of Birth?Male or Female?Telephone Numbers?No of Dependents?Bank Details?Owner Occupier?
Over 450 million records on 44 million people
PUBLICINFORMATION
FILE
AssociationsAlias&
T H E
F I L E
Detect
Experian’s data sources
Authentication
Measures identity in three dimensions:
Breadth
BreadthD
epth
Depth
Qua
lity
Quality
The results
Authenticate Index
Authentication DecisionYes/No
What is a template?
Pre-configured model that definesWhich data sources are checked
How many matches are required
The threshold for identity authentication
Designed for different level of risksFace-to-face or remote
Identity checking or Anti-Money Laundering
Product Type – High, Medium, or Low risk
Summary
Electronic authentication replacing paper based processes
QuickerLower fraud riskMore customer friendly
Partnership with Experian – best of breed customer solution
Thank you for listening