Optimized
Businesses often require more than one method for
establishing identity. A digital identity network needs
a centralized function that deploys the right tools and
data sources to produce the appropriate decision. An
optimized network will dynamically route to the highest-
performing data sources and identity services.
There are three primary requirements for optimization to
be effective:
1. Ability to integrate multiple tools that meet the range
of capabilities an organization requires
2. Ability to customize processes among the different
tools and capabilities
3. Functionality for a decision to be reached based on
the various service outputs applied
Lastly, it’s important that a digital identity network
continually evolves. Constantly monitor the network’s
success and performance, add new services or tools,
incorporate user feedback, and use technology to
keep current with the latest threats and regulations.
This continual evolution helps ensure the network is
optimized for each business based on their use cases,
risk exposure and current environment.
Diversified
A digital identity network is inclusive, providing access
to the tools, methods and data sources needed to
participate in the digital economy. For example, a
customer in North America who wants to open a
bank account could walk into a branch and have a
face-to-face, non-digital experience. Alternatively,
they could create an account online with their
laptop, and the bank could run a KYC check against
established identity attributes. This is easily done
because the customer likely has a credit file history
or an established relationship with a government
organization.
On the other hand, a customer in an underserved
market might have limited documentation and
government services. However, they will likely have
a mobile phone tied to their identity. To provide this
customer with access to financial services, a bank
would need multiple verification and authentication
layers to reach the proper levels of assurance.
The business could use the customer’s mobile
phone to provide:
• Device authentication through a mobile
network operator
• Biometric authentication, which compares a
selfie photo to the photo on an ID document
• ID document verification, which captures
images from a person’s ID document and
assesses its validity
With digital access to financial services, this customer
can also access a world of goods and services
available in the digital economy.
An optimized network will dynamically
route to the highest-performing data
sources and identity services.”
“
06
Trulioo — White Paper