Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enter date here Authenticate Pro Helen Clift 15 th November 2005.

Similar presentations


Presentation on theme: "Enter date here Authenticate Pro Helen Clift 15 th November 2005."— Presentation transcript:

1 Enter date here Authenticate Pro Helen Clift 15 th November 2005

2 Agenda What is identity authentication Electronic ID authentication Customer scenarios QAS Authenticate Pro

3 What is identity authentication Proves a persons identity by comparing biographical information given at point of application against data held within authoritative databases i.e: ER, PAF, NCOA,CAIS (Credit Account Info) and CIFAS (Fraud Prevention)

4 What is identity authentication? Proving an identity exists Proving that the applicant is the correct owner of that identity ….does Helen Clift exist? ….am I Helen Clift?

5 Cabinet Office ID fraud study “Most current processes for issuing government documentation used for identity verification ….. do not meet the highest private sector standards of security”

6 Cabinet Office ID fraud study “ For most people, checks against databases run by credit reference agencies will give much more satisfactory validation and verification of identity “

7 JMLSG guidance notes 2003 JMLSG guidance notes 4.90 to 4.97 state : - electronic data can be used as an alternative to documentary evidence (not to complement) electronic data can be distilled into an index BBA authored 2005 guidance notes will make this reference more prominent

8 JMLSG guidance notes 2005 Para Re-affirms the use of electronic data as an alternative to documents Para 5.20 Need to apply more stringent check for remote interactions

9 FSA view “…..electronic verification offers a number of advantages It is quick It resulted in less documents being sent through the post, with the attendant risks of loss It makes the customer experience easier.” Head of Policy, Financial Crime, FSA, 9th September 2004

10 The electronic approach? Access to wide range of data stores Assimilation of all appropriate data Does not stop at 1+1 Appraisal of the breadth, depth & quality Identifies any negative conditions

11 Scenarios - Finance Compliance with AML regulations Paper process = inconvenience for customers Increased risk of ID Fraud 13% of customers ‘drop off’ through the application process * * QAS-Direct Dialog consumer survey August 2005.

12 Scenarios – Retail/Telecoms High value products Increased risk of fraud Unlimited credit -> substantial bills Spontaneous purchases

13 Scenarios – Retail/Telecoms 27% of customers do not carry ID with them at all times * 70% of customers would be more likely to complete an application if the application took just seconds * * QAS-Direct Dialog consumer survey August 2005.

14 The QAS proposition Off the shelf identity management solution Natural extension to QAS’s data capture possibilities Trusted data sources from Experian

15 Technical overview PAF Experian Authenticate Plus QuickAddress Pro ER

16 Technical overview PAF Experian Authenticate Plus QuickAddress Pro Name & Address ER Authenticate Capture Screen Dedicated or Internet Connection Name & Address from Pro Former Addresses? Time at these addresses? Date of Birth? Male or Female? Telephone Numbers? No of Dependents? Bank Details? Owner Occupier?

17 Technical overview PAF Experian Authenticate Plus QuickAddress Pro Name & Address ER Authenticate Capture Screen Authenticate Results Page Dedicated or Internet Connection Yes/No 70 Name & Address from Pro Former Addresses? Time at these addresses? Date of Birth? Male or Female? Telephone Numbers? No of Dependents? Bank Details? Owner Occupier?

18 Over 450 million records on 44 million people PUBLIC INFORMATION FILE Associations Alias & T H E F I L E Dete ct Experian’s data sources

19 Authentication Measures identity in three dimensions: Breadth Depth Quality

20 The results Authenticate Index Authentication Decision Yes/No

21 What is a template? Pre-configured model that defines Which data sources are checked How many matches are required The threshold for identity authentication Designed for different level of risks Face-to-face or remote Identity checking or Anti-Money Laundering Product Type – High, Medium, or Low risk

22

23

24

25

26 Summary Electronic authentication replacing paper based processes Quicker Lower fraud risk More customer friendly Partnership with Experian – best of breed customer solution

27 Thank you for listening


Download ppt "Enter date here Authenticate Pro Helen Clift 15 th November 2005."

Similar presentations


Ads by Google