????????????????????????????????????????????????????Enabling swift and secure multi-channel Trusted Digital Identities
To ensure their position in a future landscape, MNOs, OEMs and service providers need to claim new territory in the digital market, cut operational costs, and attract new customers. This can be achieved by establishing seamless and entirely digital customer journeys.
A Trusted digital identity is the key to securing these journeys and to opening up a wealth of access for customers to security-sensitive services.
?What is a Trusted Digital Iden?tity?
To begin with, a digita?l ID is the technological link between a real entity such as a person and its digital equivalent entities. It includes a collection of electronically captured and stored identity attributes including biographic and biometric data.
People own many digital identities that consist of an email address and a password to access different online services. In some cases, such as engaging with media o?r entertainment, we may access social media using a pseudonym to reveal less about our identity. But when it comes to certain areas, like government services and banking, it’s critical that you are who you claim to be: IDs need to be trusted.
A Trusted Digital Identity is created when the information provided has been verified, or checked for authenticity.
A trusted digital ID consist of a set of verified attributes (like verified ID documents or biometrics), thus providing a certifiable link between an individual an?d their digital identity. These attributes may also include verification with third parties such as Government databases, social identity, credit card number or mobile records.
?For MNOs, OEMs and other enterprises, trusted digital IDs mean smoother digital workflows, faster customer acquisition processes and consistent customer data. Operating costs are reduced and the customer experience enhanced. Moreover, a Trusted Digital Identity can serve as a gateway for subscribers to access multiple security-sensitive services such as mobile money, eGov and online banking, allowing MNOs to take a lead in these fast growing sectors.
This is where Thales' Trusted Digital Identity Services Platform comes into play, a one-stop services platform to digitalize mobile subscriber enrollment.
It orchestrates everything needed by Telecom Operators to digitalize customer enrollment, including the capture, verification and authentication of customer credentials and biometrics. Drawing on Thales' in-depth experience and expertise in these fields, as well as complementary services from trusted partners worldwide, the platform enables
streamlined enrollment, both in-store and online.
As a result, Telecom Operators, OEMs and other enterprises can accelerate their digitalization strategies, launch new services, fight fraud and meet regulations.
Trusted Digital Identity services platform to digitalize mobile subscriber enrollment
??How to create a Trusted Digital Identity??
A trusted digital ID is created by conducting three general steps: capture, verify, digitalize. The details of each step may vary according to the extent of the information the MNO wishes to capture and the regulations they are subject to, for example, around personal data privacy.
- ???Digitalize ?
In-store or remotely, identity attributes are captured. Those attributes are ID documents such as passports, driving licenses, ID cards and also biometrics such as faces. The hardware needed can range from a mobile phone to specialized high end scanners.
Identity verification aims to verify the authenticity of the end user ID document and validates if the person is who they claim to be. This may require a combination of solutions, depending on the level of assurance needed.
After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user's digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. ?
1. How to capture ID documents and biometrics??
Capture ID do?cuments
The subscriber's ID information is captured from an identity document (passport, driver's license, or national ID, resident permits etc.). In this process, information such as name and birthdate can be extracted through image analytics (optical character recognition). This technology helps ensure that accurate and detailed customer information is entered in the CRM.
A biometric capture device (such as a mobile phone, web camera, tablet or kiosk or specialized fingerprint scanner) is used to capture the user's biometric information. Types of biometrics that can be collected include information from the face or fingerprint.?
??2. How to verify ID documents and biometrics? ?
After it has been captured, the system verifies the authenticity of an ID document with dedicated software. Different methods can be used to check security features of the provided identity document against an ID database. In this phase, the personal information of the card holder can also be extracted to automatically populate the fields in registration forms, the CRM, etc. This results in a faster and simpler onboarding process for customers, as well as time savings and greater data accuracy for MNOs.
There are different levels of document verification: standard, based on ID picture from visible light, advanced with security features existing in white, infra-red and ultra violet and chip-based with electronic document verification.
Biometric technology is used to verify if the person presenting the document is who they claim to be. It also presents an opportunity for later use as simple and modern way to access serv?ices that require identification — and in particular when verification needs to be conducted remotely.
??3. How is a digital ID created??
After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user’s digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. This function enables users to seamlessly access the MNO’s services or third party services.
Trusted Digital Identity in-store
Discover a seamless and secure customer experience, from digital enrollment in-store to biometric authentication for service access
Trusted Digital Identity online
Discover a seamless and secure customer experience, online, from digital enrollment to biometric authentication for service access.
The Digital Identity, solving the issue of Trust - June 2019
Download the whitepaper
Trusted Digital Identities play in successful digital onboarding. This paper considers the essential pillars on which effective Trusted Digital Identity programs are built: capture and verification, a genuine presence and orchestration.
Thales' Trusted digital ID technology for Mobile Network Operators
Read more [PDF - 5.2mb]
Thales' portfolio of technology for capturing, verifying, and
digitalizing identities. These technologies and combined
solutions can easily be deployed by MNOs to begin
offering more advanced customer identity verification.
Capture and Verify?
Fighting identity fraud while complying with national ID registration regulations is a major challenge for mobile operators. Gemalto multi-channel Identity Verification Service helps you reduce fraud linked to the use of fake IDs during a smooth customer enrollment process.
Identity Verification ?services
for Mobile Operators?
Mobile ID?: Digitalize, Authenticate a?nd Sign?
There is a critical need to bring convenience and trust to digital authentication. With Mobile ID, Gemalto offers an unprecedented, single means of authentication to securely access online services, confirm transactions and sign documents.?
Solutions for a single and secure
Why fighting identity fraud is critical for MNOs
Why is fighting ID fraud crucial for CFOs and fraud departments of Mobile Network Operators? What are the impacts in terms of revenues, reputation, regulations?
Find out how to put things right, with an ID verification service relying on our expertise in telecommunication and government sectors.
Mobile Software Security??
Gemalto in-app security solutions rely on a systematic approach for many use cases such as mobile banking, mobile payment, mobile government, mobile enterprise and much more. We help industries and government to build greater trust in the mobile ecosystem.
Building trust in mobile apps