27
Enter date here Authenticate Pro Helen Clift 15 th November 2005

Enter date here Authenticate Pro Helen Clift 15 th November 2005

Embed Size (px)

Citation preview

Page 1: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Enter date here

Authenticate Pro

Helen Clift

15th November 2005

Page 2: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Agenda

What is identity authentication

Electronic ID authentication

Customer scenarios

QAS Authenticate Pro

Page 3: Enter date here Authenticate Pro Helen Clift 15 th November 2005

What is identity authentication

Proves a persons identity by comparing biographical information given at point of application against data held within authoritative databases i.e: ER,

PAF, NCOA,CAIS (Credit Account Info) and CIFAS (Fraud Prevention)

Page 4: Enter date here Authenticate Pro Helen Clift 15 th November 2005

What is identity authentication?

Proving an identity exists

Proving that the applicant is the correct owner of that identity

….does Helen Clift exist?

….am I Helen Clift?

Page 5: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Cabinet Office ID fraud study

“Most current processes for issuing government

documentation used for identity verification ….. do

not meet the highest private sector standards of

security”

Page 6: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Cabinet Office ID fraud study

“ For most people, checks against databases run by

credit reference agencies will give much more

satisfactory validation and verification of identity “

Page 7: Enter date here Authenticate Pro Helen Clift 15 th November 2005

JMLSG guidance notes 2003

JMLSG guidance notes 4.90 to 4.97 state : -

electronic data can be used as an alternative to

documentary evidence (not to complement)

electronic data can be distilled into an index

BBA authored 2005 guidance notes will

make this reference more prominent

Page 8: Enter date here Authenticate Pro Helen Clift 15 th November 2005

JMLSG guidance notes 2005

Para 5.4.10 - 5.4.14Re-affirms the use of electronic data as an alternative to documents

Para 5.20Need to apply more stringent check for remote interactions

Page 9: Enter date here Authenticate Pro Helen Clift 15 th November 2005

FSA view

“…..electronic verification offers a number of advantages

It is quick

It resulted in less documents being sent through the post, with the attendant risks of loss

It makes the customer experience easier.”

Head of Policy, Financial Crime, FSA,

9th September 2004

Page 10: Enter date here Authenticate Pro Helen Clift 15 th November 2005

The electronic approach?

Access to wide range of data stores

Assimilation of all appropriate data

Does not stop at 1+1

Appraisal of the breadth, depth & quality

Identifies any negative conditions

Page 11: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Scenarios - Finance

Compliance with AML regulationsPaper process =

inconvenience for customersIncreased risk of ID Fraud

13% of customers ‘drop off’ through the application process *

* QAS-Direct Dialog consumer survey August 2005.

Page 12: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Scenarios – Retail/Telecoms

High value products

Increased risk of fraud

Unlimited credit -> substantial bills

Spontaneous purchases

Page 13: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Scenarios – Retail/Telecoms

27% of customers do not carry ID with them at all times*

70% of customers would be more likely to complete an application if the application took just seconds*

* QAS-Direct Dialog consumer survey August 2005.

Page 14: Enter date here Authenticate Pro Helen Clift 15 th November 2005

The QAS proposition

Off the shelf identity management solution

Natural extension to QAS’s data capture possibilities

Trusted data sources from Experian

Page 15: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Technical overview

PAF

Expe

rian A

uthen

ticate P

lus

QuickAddress Pro

ER

Page 16: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Technical overview

PAF

Expe

rian A

uthen

ticate P

lus

QuickAddress ProName & Address

ER

AuthenticateCapture Screen

Dedicated or Internet

Connection

Name & Address from ProFormer Addresses?Time at these addresses?Date of Birth?Male or Female?Telephone Numbers?No of Dependents?Bank Details?Owner Occupier?

Page 17: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Technical overview

PAF

Expe

rian A

uthen

ticate P

lus

QuickAddress ProName & Address

ER

AuthenticateCapture Screen

AuthenticateResults Page

Dedicated or Internet

Connection

Yes/No

70

Name & Address from ProFormer Addresses?Time at these addresses?Date of Birth?Male or Female?Telephone Numbers?No of Dependents?Bank Details?Owner Occupier?

Page 18: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Over 450 million records on 44 million people

PUBLICINFORMATION

FILE

AssociationsAlias&

T H E

F I L E

Detect

Experian’s data sources

Page 19: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Authentication

Measures identity in three dimensions:

Breadth

BreadthD

epth

Depth

Qua

lity

Quality

Page 20: Enter date here Authenticate Pro Helen Clift 15 th November 2005

The results

Authenticate Index

Authentication DecisionYes/No

Page 21: Enter date here Authenticate Pro Helen Clift 15 th November 2005

What is a template?

Pre-configured model that definesWhich data sources are checked

How many matches are required

The threshold for identity authentication

Designed for different level of risksFace-to-face or remote

Identity checking or Anti-Money Laundering

Product Type – High, Medium, or Low risk

Page 22: Enter date here Authenticate Pro Helen Clift 15 th November 2005
Page 23: Enter date here Authenticate Pro Helen Clift 15 th November 2005
Page 24: Enter date here Authenticate Pro Helen Clift 15 th November 2005
Page 25: Enter date here Authenticate Pro Helen Clift 15 th November 2005
Page 26: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Summary

Electronic authentication replacing paper based processes

QuickerLower fraud riskMore customer friendly

Partnership with Experian – best of breed customer solution

Page 27: Enter date here Authenticate Pro Helen Clift 15 th November 2005

Thank you for listening