Remote ID Proofing

IdExchange Remote Identity Proofing

Don’t Give the Right MFA To the Wrong Person

Easily add Supervised Remote Identity Proofing or In-Person proofing to your workforce security program to ensure your MFA credentials are distributed to the right person.

Private ID Proofing for Secure Enterprises

Different from other identity proofing solutions, IdExchange is a closed system, installed in your cloud to give you full control over the way you choose to validate your workforce identity.

https://www.youtube.com/watch?v=BhmUOQOChow

See how IdExchange Makes Remote Identity Proofing Simple and Secure

Remote or In-Person

Whether your workforce is in an office or remote, IdExchange provides the technology, security controls, and workflow to enable collaboration between a company security officer and an applicant to perform the identity enrollment process. This enables the security officer to ask security questions, enroll biometrics, and capture identity documentation securely and conveniently either remotely or in-person.

  • Capture the photo, identity document, and fingerprints
  • Real-time interaction with applicant and security officer
  • Applicant can use WebEx client to perform remote session
  • Stability and security of WebEx Infrastructure
  • No infrastructure network changes needed
  • Both the applicant and operator can be remote

Security Controls for Modern Identity Attacks

From applying machine learning to analyze for presentation attacks to traditional pre-screening interview techniques to confirm identity, IdExchange weaves a wide range of technical controls into all phases of the identity proofing process to add resiliency against the latest identity fraud and forgery attacks.

AI + Knowledge Based Interview

IdExchange uses a hybrid of Artificial Intelligence and Knowledge Based Interviewing techniques to ensure the security officer is enrolling the correct applicant. During the interview, the applicant’s video feed will be analyzed for facial landmarks and sentiment analysis while answering a series of questions only they would know. This approach helps to prevent the applicant from circumventing the process.

Biometric Validation

For higher assurance, biometrics that were captured from the applicant can be submitted to external services to perform background checks or other supplemental biometric validation. By default, IdExchange saves biometric data in standard ANSI formats to ensure compatibility with 3rd party background investigation services.

Physical Address Verification

The applicant’s physical address can be validated using Address Validation services as a means to both verify the user’s address on their documents as well as a way to securely ship credentials to the applicant.

Video storage

The entire identity enrollment session between the security officer and applicant can be recorded and stored securely with the applicant’s record for later review. Depending on the security policy, multiple security officers can review the session to determine whether to approve the applicant.

Multiple Levels of Process Validation

To augment the technical controls, the IdExchange also implements a series of procedural NIST 800-63A based validations to provide multi-person verification of the process to detect any signs of fraud or impersonation

Applicant Pre-Registration and Determination
Phase 1
Applicant Invitation
The organization will make a determination that an applicant needs identity proofing. After ensuring the applicant has a legitimate business need to be proofed and credentialed, the organization will send the applicant an invitation which outlines the steps to begin the identity proofing process.   SECURITY CONTROLS  
  • Business Need: An authorized organization official must have documented a business need for the applicant.
  • Pre-registration: Applicant information (last name, first name, email address) is already on file with the organization.
Remote Identity Capture
Phase 2
Applicant’s photo and identity documents are captured

The applicant will receive an invitation to perform the remote identity proofing capture process. This invitation will include instructions for obtaining the cature software or steps to schedule a supervised remote session. During this process, the applicant will capture their own photo, identity documents, and other information required by the enrollment process. This process will be performed at the applicant’s location using the applicant’s computing equipment (mobile device, laptop with webcam).

 

SECURITY CONTROLS

 

  • Liveness detection: The applicant must perform certain gestures to ensure they are capturing their information in real time.
  • Document Verification: The documents that are being captured will be reviewed for accuracy and authenticity.
  • Public records check: The applicant’s information will be verified against 3rd party sources.
Approval
Phase 3
Identity Information Is Reviewed

An authorized official must review the captured documents, quality score and other related information. They will review the photo, captured identity documents, and related quality score indicators.

 

SECURITY CONTROLS

 

  • Separation of Duties: Authorization official is different than the requesting official to enforce separation of duties.
  • Data Review: The Authorization official is required to review the captured documents and associated documentation.
  • Secondary Verification: The Authorization official can request a supervised remote session where they remotely meet with the applicant to see the documents that were captured.

Schedule your demo to see just how easy it can be to add Identity Proofing to your workflow within hours.

Whether you want to add full NIST IAL3 enrollment or just want a way to verify a person before reissuing credentials, IdExchange can help. Schedule a demonstration where we show you the enrollment process, describe the architecture, and walk through an installation of IdExchange.