The Digital Identity Network

Read the White Paper: Trust is needed for digital economies to thrive, verifying digital identity as part of the onboarding process is the first critical step.

Optimized

Businesses often require more than one method for

establishing identity. A digital identity network needs

a centralized function that deploys the right tools and

data sources to produce the appropriate decision. An

optimized network will dynamically route to the highest-

performing data sources and identity services.

There are three primary requirements for optimization to

be effective:

1. Ability to integrate multiple tools that meet the range

of capabilities an organization requires

2. Ability to customize processes among the different

tools and capabilities

3. Functionality for a decision to be reached based on

the various service outputs applied

Lastly, it’s important that a digital identity network

continually evolves. Constantly monitor the network’s

success and performance, add new services or tools,

incorporate user feedback, and use technology to

keep current with the latest threats and regulations.

This continual evolution helps ensure the network is

optimized for each business based on their use cases,

risk exposure and current environment.

Diversified

A digital identity network is inclusive, providing access

to the tools, methods and data sources needed to

participate in the digital economy. For example, a

customer in North America who wants to open a

bank account could walk into a branch and have a

face-to-face, non-digital experience. Alternatively,

they could create an account online with their

laptop, and the bank could run a KYC check against

established identity attributes. This is easily done

because the customer likely has a credit file history

or an established relationship with a government

organization.

On the other hand, a customer in an underserved

market might have limited documentation and

government services. However, they will likely have

a mobile phone tied to their identity. To provide this

customer with access to financial services, a bank

would need multiple verification and authentication

layers to reach the proper levels of assurance.

The business could use the customer’s mobile

phone to provide:

• Device authentication through a mobile

network operator

• Biometric authentication, which compares a

selfie photo to the photo on an ID document

• ID document verification, which captures

images from a person’s ID document and

assesses its validity

With digital access to financial services, this customer

can also access a world of goods and services

available in the digital economy.

An optimized network will dynamically

route to the highest-performing data

sources and identity services.”

06

Trulioo — White Paper

Made with Publuu - flipbook maker