Identity Proofing

Identity proofing is a detailed authentication process that businesses use to ensure their clients are who they claim to be. To avoid data breaches and fraud, which can be costly, businesses can require multiple steps of identity verification, and identity proofing goes beyond basic authentication to add additional verification measures such as government documents, photo IDs, and personal questions.

Clients often undergo a stringent identity proofing process to access new accounts or join organizations, depending on how much security those businesses require. Identity proofing solutions can get this done in an automated manner to meet security needs without major disruptions to user experience.

When documentation (a picture of a government ID, for example) isn t enough, businesses may need more evidence. Remote identity proofing, which is often necessary when customers live elsewhere, offers the customer a more convenient experience but requires more care since it s become easier for fraudulent actors to gain access to others information online. Businesses, then, may ask for multiple steps in the identification process. Multi-factor authentication, which is becoming increasingly common, can include personal identification questions, touch ID, facial recognition, and sometimes other biometrics.

The National Institute of Standards and Technology has a three-step identity proofing process:

  • Resolution: involves collecting evidence such as IDs
  • Validation: involves checking documents against existing records
  • Verification: ensures the photos and documents are all the same

Businesses can go about their identity proofing process in different ways, but the challenge is accurately identifying customers while also providing a relatively smooth authentication process. It s not realistic for businesses (large ones especially) to manually verify each person s identity, but sometimes automated processes can fail or give customers a sluggish, negative experience. Businesses must balance both strong security and quality customer service to meet the challenge.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...