1Kosmos BlockID brings biometrics authentication and liveness detection to identify and authenticate users in a reliable, secure and fast way.
To reach the highest level of Identity Assurance Level and Authentication Assurance Level per the NIST SP 800-63 guidelines, 1Kosmos BlockID uses several types of claims (or variables), which need to be triangulated many ways by leveraging sources of truth.
The claims used are the user’s full name, date of birth, address, place of birth, photo ID, phone number, social security number or national ID. To verify the pertinence of a given claim, we proceed to a document verification by leveraging a state or bank-issued document such as a driver’s license, passport, credit card or social security number. Finally, to verify that a document is indeed valid and not stolen, and in an attempt to strengthen the level of assurance as required by NIST, we query the appropriate governmental database (State Department for a passport, AAMVA for a driver’s license), prior to leveraging biometrics chips and liveness tests.
In the example above, a photo ID is triangulated several ways to reach the highest Identity Assurance Level of IAL3.
Step 1: Both the user’s passport and driver’s license are used to validate the user’s name, date of birth and ensure that photos on both documents are a match. Once validated, an IAL1 score is reached. However, this is not satisfactory enough to make sure that this user actually is who he says he is. Thus, an individual may have stolen both documents and is now attempting to enroll under the name mentioned on the passport and driver’s license.
Step 2: 1Kosmos queries the State Department and AAMVA databases (two sources of truth) to check whether either document is valid, lost or stolen. Once validated, a NIST IAL2 score is attained.
Step 3: We do not rest assured that all is in order until we can certify a user has reached an IAL3 score. To that effect, we leverage extra sources of truth such as the biometrics chip on the user’s passport and a liveness test. The latter consist of the user following a prompt on his 1Kosmos BlockID mobile application to first blink and then smile. Once validated, the user has reached the highest identity assurance level per the NIST guidelines of IAL3.
Naturally, further sources of truth can be leveraged on top of those used to triangulate this photo ID 3 ways, as shown in the example above. Those sources include an employer’s name, a credit card, a bank account number or a loyalty program, among others.
KYC (Know Your Customer) is the mandatory process of identifying and verifying the identity of a client when opening an account and periodically over time.
Today, it is a significant element in the fight against financial crime and money laundering.
Thanks to 1Kosmos BlockID, our clients can achieve customer mandatory KYC checks and meet KYC compliance faster and more efficiently.
Biometric technology has become crucial for ID verification in a wide array of government organizations, banks and financial institutions, as well as high security areas. Biometric systems are capable of recognizing people swiftly, consistently, and reliably.
One of the main advantages pertaining to biometric technology is high individual identification accuracy. Biometrics relies on the use of unique physical traits (fingerprint, iris pattern, facial characteristics) rendering biometric technology a very accurate technique of authenticating end users such as employees and customers. Superior accuracy is why a lot of businesses use biometrics for their security purposes.
Since biometric characteristics cannot be conjectured or stolen, biometric systems present a superior level of security than usual means of authentication.
Biometric technology is less exposed to damage and sudden changes. The behavioral and physical elements accessed for biometric verification like iris/retina, voice, pulse, DNA, vein, etc. are less in danger to damage and sudden changes.
Another vital advantage of biometric technology is that it is less time consuming, dependable, user friendly, hard to falsify, requires negligible training, is inexpensive and accesses distinctive recognition features of individuals resulting in accurate verification.
Biometric technology can be used in a lot of industries such as healthcare, civil ID, business, schools, financial industries etc. A lot of countries have already used biometric technology for voter registration, national ID, and national healthcare or e-passport projects.
Biometric technology can be effectively employed in forensics. It is a useful technology that can be utilized for criminal identification and prison security.
With the flourishing of Internet based businesses and the increased requirement for accurate verification when accessing accounts, biometric technology turns out to be the best and most suitable solution for secure mobile transaction identification.
Biometric technology can be used to avert illicit access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks.
Passwords and PINS are easy to forget causing people to write them down and consequently can be stolen, and can at times be hacked. With biometrics technology, fingerprints won’t be lost and can’t be attained and copied by someone aiming to illegally gain access.