Authentication

Authentication in terms of identity assurance is to establish that the person, to whom you are identifying, is the same identity as the identity evidence and attributes examined. Authentication can also refer to authenticating an entity or object such as an identity document or a signature. There are many ways that a person can be authenticated, the level of assurance offered and the intrusiveness of the process vary between the methods. The availability of a certain method can also vary depending on the individual being authenticated.

Authentication is commonly used in two ways, firstly to ensure that you are who you are when going through a new customer process. Secondly when using a service to confirm that the owner of the account is the same person who authorising themselves.

Strong Customer Authentication (SCA) is used under PSD2 to secure electronic payments.

There are many methods used to authenticate an identity, listed below are common identity authentication methods.

Username & PasswordBy far the most common authentication method is to compare a username and password pair.
One-Time Password Sending a one-time password or code to the individual, usually sent to a via SMS or email.
Knowledge Based Authentication Asking the individual questions, that only they should know. These questions are usually generated from credit account data or customer account data.
Document AuthenticationChecking an identity document and ensuring that the document is that of the individual. This process can also include the comparison of a photo to the document photo.
App AuthenticationA mobile app, which is specifically built to authenticate a user.
Token AuthenticationA physical token, which can be proven to be in possession of the individual.
Biometric AuthenticationChecking of biometric attributes, such as a fingerprint, iris or photo.
Certificate AuthenticationSharing of a digital certificate, which when presented again authenticates the user.
Letter to HomeSending a letter to the individuals home address, which will confirm that the person at least has access to the address.
Third Party IdentificationA third party identifying the individual.

One-Time Password

A one-time password (OTP) is a unique, single-use password that is generated by a system and is valid for a limited period of time. OTPs are often used in conjunction with other authentication methods, such as knowledge-based authentication (KBA) or certificate-based authentication, to provide an additional layer of security.

There are several different ways that OTPs can be generated and delivered to users, including:

  1. SMS: OTPs can be sent to a user’s mobile phone via SMS (short message service).
  2. Email: OTPs can be sent to a user’s email address.
  3. Physical tokens: OTPs can be generated by physical tokens, such as key fobs or smart cards, which display the OTP on a screen or generate it as a series of digits that the user can enter manually.
  4. Mobile apps: OTPs can be generated by mobile apps that the user installs on their smartphone or other device.

OTPs are often used to protect against identity fraud and other security threats, as they provide an additional layer of security that is difficult for attackers to bypass. For example, even if an attacker is able to obtain a user’s password, they would also need to have access to the user’s OTP in order to gain unauthorized access to a service or resource.

Overall, OTPs are a useful tool for improving security and protecting against identity fraud and other security threats. They are often used in conjunction with other authentication methods to provide a more robust level of security.

Knowledge Based Authentication

Knowledge-based authentication (KBA) is a method of verifying identity that involves verifying that the user knows certain information that is specific to them. This information might include a password, a personal identification number (PIN), a security question, or other information that only the user would be expected to know.

KBA is commonly used in conjunction with other authentication methods, such as possession-based authentication (e.g. a physical token or smart card) or inherence-based authentication (e.g. a biometric characteristic like a fingerprint or a voiceprint). This helps to ensure that identity verification is as secure and reliable as possible.

One of the main advantages of KBA is that it is relatively simple to implement and use. Users can typically remember a single password or PIN and use it to access multiple services or resources, which can be convenient and save time.

However, KBA does have some limitations. For example, if a user’s password is compromised or if they forget their password, they may have difficulty accessing the services or resources that they need. Additionally, KBA is vulnerable to certain types of attacks, such as dictionary attacks or brute force attacks, in which an attacker attempts to guess the user’s password by trying different combinations of characters.

Overall, KBA is a useful tool for verifying identity, but it should typically be used in combination with other authentication methods to provide a more robust level of security.

Biometric Authentication

Biometric authentication is a method of verifying identity that involves using physical characteristics of the user, such as their fingerprints, facial features, or iris patterns, to verify their identity. These characteristics are unique to each individual and can be used to identify them with a high degree of accuracy.

Biometric authentication systems typically involve the use of specialized hardware, such as fingerprint scanners or facial recognition cameras, to capture and analyze the user’s biometric data. This data is then compared to a reference sample, such as a previously enrolled fingerprint or a stored image of the user’s face, to verify the user’s identity.

One of the main advantages of biometric authentication is that it is very difficult to forge or duplicate. This makes it an effective way to protect against identity fraud and other security threats. Additionally, biometric authentication can be more convenient for users than other authentication methods, such as knowledge-based authentication (KBA), which requires the user to remember a password or personal identification number (PIN).

However, biometric authentication does have some limitations. For example, some users may be unable to use certain types of biometric authentication due to physical disabilities or other factors. Additionally, biometric data can be compromised if the user’s biometric characteristics are stolen or if the system is hacked.

Overall, biometric authentication is a useful tool for verifying identity, but it should typically be used in combination with other authentication methods to provide a more robust level of security.

Token Authentication

Token authentication is a method of verifying identity that involves the use of a physical or digital token to verify the user’s identity. A token is a small device or piece of software that contains a unique code or other identifying information, and can be used to authenticate the user’s identity when they attempt to access a service or resource.

There are several different types of tokens that can be used for authentication, including:

  1. Physical tokens: These are small, portable devices that generate a unique code or other identifying information. Physical tokens might include smart cards, USB tokens, or key fobs.
  2. Digital tokens: These are software-based tokens that can be stored on a computer or mobile device. Digital tokens might include mobile apps that generate unique codes, or software-based tokens that are stored on the user’s computer or device.
  3. One-time password (OTP) tokens: These are tokens that generate a unique, single-use password that is valid for a limited period of time. OTP tokens are often used in conjunction with other authentication methods, such as knowledge-based authentication (KBA), to provide an additional layer of security.

Token authentication is often used in conjunction with other authentication methods, such as knowledge-based authentication (KBA) or biometric authentication, to provide a more robust level of security. It is particularly useful for protecting against identity fraud and other security threats, as it can be difficult for attackers to obtain or forge a physical or digital token.

Overall, token authentication is a useful tool for verifying identity and can help to improve security and protect against identity fraud and other security threats.

Certificate Authentication

Certificate-based authentication is a method of verifying identity that involves the use of digital certificates to confirm the identity of a user or device. A digital certificate is a small file that contains a unique code or other identifying information, and is issued by a trusted third party, known as a certification authority (CA).

In certificate-based authentication systems, a user or device presents a digital certificate to verify their identity when attempting to access a service or resource. The service or resource then checks the certificate against a trusted list of certificates to verify that it is valid and has been issued by a trusted CA. If the certificate is valid and has been issued by a trusted CA, the user or device is granted access to the service or resource.

Certificate-based authentication is often used to secure access to sensitive information or resources, such as corporate networks or financial systems. It is particularly useful for protecting against identity fraud and other security threats, as it can be difficult for attackers to obtain or forge a digital certificate.

However, certificate-based authentication does have some limitations. For example, it requires the use of a trusted CA to issue and manage certificates, and it can be complex to set up and manage. Additionally, certificate-based authentication is vulnerable to certain types of attacks, such as man-in-the-middle attacks, in which an attacker intercepts and modifies the certificate to gain unauthorized access.

Overall, certificate-based authentication is a useful tool for verifying identity and can help to improve security and protect against identity fraud and other security threats. It is often used in conjunction with other authentication methods to provide a more robust level of security.

Document Authentication

Document authentication is the process of verifying the authenticity of a physical or digital document, such as a passport, driver’s license, or birth certificate. Document authentication is often used to confirm the identity of an individual or to verify that the information contained in a document is accurate and legitimate.

There are several different methods that can be used to authenticate documents, including:

  1. Visual inspection: This involves examining the physical features of a document, such as its layout, formatting, and security features, to determine if it is genuine.
  2. Data verification: This involves checking the information contained in a document against other reliable sources of information, such as government databases or financial records, to confirm that it is accurate and legitimate.
  3. Forensic analysis: This involves using specialized techniques and equipment, such as spectroscopy or microscopy, to examine the physical properties of a document and determine if it is genuine.
  4. Digital authentication: This involves using digital techniques, such as encryption or digital signatures, to verify the authenticity of a digital document.

Document authentication is often used in a variety of contexts, including employment verification, financial transactions, and immigration processes. It is an important security measure that helps to ensure that only genuine documents are accepted and that individuals are accurately identified.

Overall, document authentication is a useful tool for verifying the authenticity of physical and digital documents and can help to improve security and protect against identity fraud and other security threats.