Didyou know

Identity Authentication confirms the personally identifiable information provided by a consumer by matching or verifying data elements that are associated with the same person, such as confirming a phone number and address are associated with a name.

Identity authentication is very effective, and can provide the most relevant information to a user's identity. It should be understood that Identity Authentication alone can easily be beaten by a fraudster, and performing authentication without verification leaves you susceptible to fraudsters using stolen identities. It is a good secondary test for checking AVS data when it is not a full match.

"Gotchas" with Identity Authentication include:

There are a lot of ways to fool this test.

There are people who move a lot, such as military families, in which multiple phone numbers and addresses may be in the public records.

There are lag periods between refreshes of the address and phone data.

In cases of identity theft, a fraudster can set up these services to look completely legitimate.

They typically cannot validate unlisted phone numbers.

More and more people are listing cell phone numbers and business phone numbers.

If you use it to check the shipping address, there are valid cases in which a consumer could be sending packages or gifts to a relative’s home to pick up later.

 

subscribe to newsletter

 

 

Identity Authenticationtechnique overview

Electronic Identity Authentication is the ability to collect, authenticate and confirm the personally identifiable information provided by an end user. This could be as simple as being able to match a name, address and phone number, to verifying more specific data such as date of birth, social security number or national identity number. These services are available as a hosted bureau service or you can purchase monthly and quarterly SW distribution of data.

Key considerations when implementing or buying this functionality include:

  • How often will your provider update the information or update their software?
  • Will the data include cell phones and business phones?
  • Are there any dead spots where information is not provided such as international, Canada, Puerto Rico?
  • What is the accuracy of the data they have? Try them out: Have ten people’s information from around the country and see how well the service validates the information. Include someone who has been in place for a while, one that has recently moved and one that owns multiple properties.

How does it work?

If using it as a manual tool, you would enter the individual’s information into a hosted screen or utility their IT shop has set up for you, and the service or application would come back with some mix of the following types of results: A Full Match, Partial Match, Multiple matches to data element "XXXXXXX", Known negative indicators with data element "XXXXXX", Not Found.

 

How do you use the results?

You verify this data and see if it matches.

AdditionalResources

  • Introduction to eIdentity Authentication and Verification

    Establishes a baseline understanding of the components that make up a consumer identity when transacting or making application from an online or telephone channel.

  • OVERVIEW OF ECOMMERCE FRAUD PREVENTION TECHNIQUES.

    A core curriculum course providing an introduction to 30 plus fraud prevention techniques; what they are, high level discussion on how to employ them and big picture considerations for using them.

  • Ecommerce Fraud Moving from Tools to Solutions.

    This session covers what constitutes a fraud solution and categorizes the many types of third party fraud tools. The course outlines the common terminology of fraud solutions and describes the capabilities needed to implement a fraud solution. 

keynotes