Remote-access Guide

what does remote access use to verify identity

by Aliza DuBuque I Published 2 years ago Updated 2 years ago
image

A wide variety of methods are available to authenticate users remotely, ranging from passwords and one-time passcodes (OTPs), to fingerprint scanning and face authentication. Each relies on a different factor to establish trust: Something you know (like passwords)

Full Answer

What is read ID?

ReadID is used extensively in banking, government, digital signing and many other industries. It has proven its value in millions of verifications. In combination with face verification it creates the highest level of certainty possible.

What is readid ready?

ReadID Ready is our ready-to-use app that can be tailored to the clients’ look and feel and can be up and running within days.

How many scans can readID do?

ReadID can scale from a few to hundreds-of-thousands of scans per day . No manual steps involved.

Is OCR correct on a chip?

All personal information obtained from the chip is correct. No OCR mistakes, no characters missed, no fields overlooked.

Can SDK be integrated into mobile application?

Our SDK can be integrated in any mobile application through well-documented APIs. You can have full control of user interaction or leverage the knowledge in our high-level API.

Is MRZ included in inspection?

Capturing the visual inspection zone and reading the MRZ is always included. Try it for free with our demo application.

Can you onboard a customer using their smartphone?

Onboarding customers, creating AML compliance or issuing travel credentials, it can all be done securely over the internet using remote identity verification. From the safety of their home, using their smartphone and ID, your customers can share their identity.

What is identification verification?

Any method used to authenticate identity is a form of identity verification. Techniques vary from simple (looking at your passport) to the sophisticated (photographing the iris of your eye and comparing it to a database).

How does a verification service work?

Imagine that you work in an industry that requires (or simply wants) to verify customer's identities. How can you do that?

What is SMS code?

SMS codes are in-band authentication, which offers less security than you might expect . If a user is buying something via a mobile app and the app provider sends an SMS code to that mobile device to verify the purchase, the SMS code is not actually providing any additional security—the code is being sent to the same device and is, therefore ‘in-band’. If the device has been compromised, the OTP is worthless. iProov face authentication is out of band: it assumes that the device has been compromised and so the authentication is processed securely and privately in the cloud. Even if a bad actor had full access to another’s device, the authentication process remains secure.

What is iproov verification?

Here at iProov, we provide biometric face verification to some of the world’s most secure organizations to enable them to authenticate online users.

Why is authentication important?

Ultimately, authentication is needed to restrict and allow access to personal information and accounts.

Why is SMS code so frustrating?

SMS codes can add complexity and additional steps to the authentication process. If customers are using a computer to complete a task online and are asked to find their mobile device to retrieve an SMS code, it can be frustrating and potentially cause the user to drop off and abandon the transaction.

What happens if your authentication process takes too long?

Completion rates: If your authentication process asks the user to follow too many instructions, or if it takes too long, or it needs repeated attempts before it succeeds, there’s a high risk of drop-offs and lost business. This impacts any organization, whether it’s a retailer dealing with abandoned baskets or citizens failing to return to access online government services.

What is face authentication?

Facial authentication uses a face scan done by a human on any device with a front-facing camera to prove they are who they say they are. For face authentication to be secure, it needs to verify that the user is the right person, a real person, and that they are authenticating right now. This is what iProov’s Genuine Presence Assurance technology delivers.

Why are passwords not secure?

In recent years organizations have started to move away from knowledge-based authentication. Passwords are not secure, because they can be shared, guessed or stolen. Passwords also cause user frustration, because they are easily forgotten. This ultimately leads to drop-off and poor completion rates.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9