1 / 27

Authenticate Pro

Authenticate Pro . Helen Clift. 15 th November 2005. Agenda. What is identity authentication Electronic ID authentication Customer scenarios QAS Authenticate Pro. What is identity authentication.

akamu
Download Presentation

Authenticate Pro

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authenticate Pro Helen Clift 15th November 2005

  2. Agenda • What is identity authentication • Electronic ID authentication • Customer scenarios • QAS Authenticate Pro

  3. What is identity authentication Proves a persons identity by comparing biographical information given at point of application against data held within authoritative databases i.e: ER, PAF, NCOA,CAIS (Credit Account Info) and CIFAS (Fraud Prevention)

  4. ….does Helen Clift exist? ….am I Helen Clift? What is identity authentication? • Proving an identity exists • Proving that the applicant is the correct owner of that identity

  5. Cabinet Office ID fraud study “Most current processes for issuing government documentation used for identity verification ….. do not meet the highest private sector standards of security”

  6. Cabinet Office ID fraud study “ For most people, checks against databases run by credit reference agencies will give much more satisfactory validation and verification of identity “

  7. JMLSG guidance notes 2003 • JMLSG guidance notes 4.90 to 4.97 state : - • electronic data can be used as an alternative to documentary evidence (not to complement) • electronic data can be distilled into an index • BBA authored 2005 guidance notes will make this reference more prominent

  8. JMLSG guidance notes 2005 • Para 5.4.10 - 5.4.14 • Re-affirms the use of electronic data as an alternative to documents • Para 5.20 • Need to apply more stringent check for remote interactions

  9. FSA view “…..electronic verification offers a number of advantages • It is quick • It resulted in less documents being sent through the post, with the attendant risks of loss • It makes the customer experience easier.” Head of Policy, Financial Crime, FSA, 9th September 2004

  10. The electronic approach? • Access to wide range of data stores • Assimilation of all appropriate data • Does not stop at 1+1 • Appraisal of the breadth, depth & quality • Identifies any negative conditions

  11. Scenarios - Finance • Compliance with AML regulations • Paper process = • inconvenience for customers • Increased risk of ID Fraud • 13% of customers ‘drop off’ through the application process * * QAS-Direct Dialog consumer survey August 2005.

  12. Scenarios – Retail/Telecoms • High value products • Increased risk of fraud • Unlimited credit -> substantial bills • Spontaneous purchases

  13. Scenarios – Retail/Telecoms • 27% of customers do not carry ID with them at all times* • 70% of customers would be more likely to complete an application if the application took just seconds* * QAS-Direct Dialog consumer survey August 2005.

  14. The QAS proposition • Off the shelf identity management solution • Natural extension to QAS’s data capture possibilities • Trusted data sources from Experian

  15. Technical overview QuickAddress Pro PAF ER Experian Authenticate Plus

  16. Technical overview QuickAddress Pro Name & Address Authenticate Capture Screen Name & Address from Pro Former Addresses? Time at these addresses? Date of Birth? Male or Female? Telephone Numbers? No of Dependents? Bank Details? Owner Occupier? PAF ER Experian Authenticate Plus Dedicated or Internet Connection

  17. Technical overview QuickAddress Pro Name & Address Authenticate Capture Screen Name & Address from Pro Former Addresses? Time at these addresses? Date of Birth? Male or Female? Telephone Numbers? No of Dependents? Bank Details? Owner Occupier? PAF ER Experian Authenticate Plus Authenticate Results Page Yes/No Dedicated or Internet Connection 70

  18. PUBLIC INFORMATION FILE T H E & Alias F I L E Associations Detect Experian’s data sources Over 450 million records on 44 million people

  19. Breadth Quality • Depth Depth • Quality Breadth Authentication • Measures identity in three dimensions:

  20. Authenticate Index Yes/No • Authentication Decision The results

  21. What is a template? • Pre-configured model that defines • Which data sources are checked • How many matches are required • The threshold for identity authentication • Designed for different level of risks • Face-to-face or remote • Identity checking or Anti-Money Laundering • Product Type – High, Medium, or Low risk

  22. Summary • Electronic authentication replacing paper based processes • Quicker • Lower fraud risk • More customer friendly • Partnership with Experian – best of breed customer solution

  23. Thank you for listening

More Related