What is the Difference between Identification, Identity Verification and Authentication?

Mar 7, 2022
-minute read
Senior Solutions Architect

Identification, verification and authentication all have a role in identity management and security. Keeping bad actors from using stolen identities and credentials requires enterprises to be proactive. According to the FBI, internet crime costs Americans $4.2 billion in 2020.

 

Choosing the appropriate level of security depends on the application. For example, a financial services company with high-value assets and transactions typically requires more proof of identity than a social media company. Of course, that doesn't mean social media companies can forgo strong identity security measures. In 2016, hackers took over Katy Perry's Twitter account, which was the most followed account at the time.

 

Let's discuss how identification, verification and authentication are used for online identity management and security.

What is Identification?

Identification asks the question: "Who are you?" When a new user completes the registration process, they are identifying themselves for you. Some companies limit their identity management process to just identification, taking the information users provide at face value. This can be very risky.

 

Without additional steps to ensure the user is who they claim to be, companies often have no way of knowing whether the person is using their real identity or a fraudster is using a fake name or stolen identity. For example, bad actors can easily create social media accounts with fake names and personas for a variety of nefarious purposes, including human trafficking.

What is Identity Verification?

Verification moves from "Who are you?" to "Prove it." To verify the person is using their real name, address, phone number and so on, enterprises ask for verification. Verification can be in the form of a driver's license or government issued ID card, or biometric data, such as fingerprints or verified photos to be used for facial recognition.

 

Verification is typically used once, during the registration process. Identity verification can be integrated directly into mobile apps to help ensure customers are who they claim to be.

 

 

If a verification process isn't in place, fraudsters with stolen identities or credentials can  successfully use them. At the beginning of the pandemic, organized crime rings used stolen identities to file fraudulent unemployment claims and collect millions of dollars in benefits. Once the scope of the fraud was uncovered, states started using identity proofing services that compared selfies to official photo documentation to ensure applicants were legitimate. Because fraudsters couldn't provide the required selfies, they were stopped from committing additional fraud. Unfortunately, real applicants who didn't have devices capable of taking selfies were kept from collecting legitimate benefits. 

 

Watch this short video to see the customer verification process in action.

 

Today's users want secure digital banking.
Let's see how Ping enables customers to bank from anywhere, Including opening new accounts and completing transactions.
For new accounts, Ping makes it easy for you to provide a seamless and KYC-compliant account Opening experience with a Mobile SDK that powers Live face capture and scanning of Government IDs.
First, we see our new customer, Alicia taking several selfies to complete the Live face capture process.
Next, she'll scan the front and back of her driver's license to complete the process.
Ping supports US and international driver's licenses, ISO-based international passports, and European ID cards with a three-line MRZ code.
This step supports KYC compliance, but also makes the enrollment process easier by Replaying the data captured from the driver's license onto the registration form.
We then capture the remaining information required for compliant account opening with the Added convenience of letting customers choose how they'd like to log in.
Her account is now open.
Identity verification isn't just for opening accounts.
The face matching process can also be used to approve transactions.
Here, we see Alicia entering an account, an amount, and a destination for the wire transfer.
She can then approve this transfer on her phone, again leveraging face match.
The transfer is now confirmed.
With PingOne, secure digital banking is easy.
Contact us to learn more.

What is Authentication?

Authentication is also used to prove users are who they claim to be. Authentication typically occurs every time a user signs on, and can also be implemented when a user attempts a high-value transaction or tries to access sensitive data from a high-risk location, like an airport.

 

Types of authentication fall into three main categories, also known as authentication factors:

 

  • Knowledge - Something you know. Information or secrets unique to you, including passwords, PINs and answers to security questions.

 

  • Possession - Something you have. Possessions include smartphones, cards, key fobs and physical tokens that can either generate or receive one-time passwords or codes.

 

  • Biometrics - Something you are: These are unique physical traits, confirmed through fingerprint scans, voice recognition, facial recognition and other scanning techniques that require some type of device.

 

Two-factor authentication (2FA) and multi-factor authentication (MFA) require users to provide proof from more than one category, which stops bad actors with compromised passwords or other credentials from accessing accounts.

 

Watch this brief video to learn more about modern multi-factor authentication (MFA).

 

Today's identity threat landscape is full of unrelenting attacks that target your employees, Partners, and customers.
However, new APPs and resources that users rely on to enable digital business are exposing Sensitive data, intellectual property, and personal information.
Deploying multi-factor authentication everywhere is the clear way to prevent account Takeover attempts and costly security breaches, but the challenge is balancing increased Protection with a seamless End-User experience.
Enter PingOne, an enterprise-proven cloud delivered MFA solution built with security and Convenience in mind.
PingID gives your users options.
A broad range of secondary factors, from smartphones and hard tokens to desktop Applications and one-time passcodes are available to satisfy the needs of any user Population.
Ping ID is intelligent.
By leveraging contextual data such as geolocation or IP address, Adaptive policies allow you to define when users should have access without interruption.
You can also require MFA during high-risk scenarios such as access from new devices or Time since the last successful login.
With PingOne ID, more security means a better experience and happier users.
PingOne is versatile.
It works with Windows login, Office 365, VPN access, single sign-on, access management systems, or APIs.
You can even embed PingOne ID directly into your own customer-facing mobile apps, Enabling strong authentication and custom transaction approvals.
Now you can empower users to conveniently access what they need when they need it, all without compromising security.
In these uncertain times, it's never been more important to confirm the identity of your Employees, partners, and customers, and it's never been easier to provide a seamless user Experience that's both unobtrusive and reliable.
PingID delivers MFA everywhere, freeing users to work without boundaries.

What's the Difference between Identification, Identity Verification and Authentication?

Identification is the first step in the process, where a user provides information about themselves when setting up an account. While a legitimate user will provide accurate information, a fraudster can provide false or stolen information.

 

Verification forces the user to prove the information they provided is true. Because stolen identities can be used to set up accounts, this step stops fraudsters unable to provide the required proof of identity from creating fake accounts. Users may be asked to provide a fingerprint, facial scan, copy of a driver's license or other form of verification.

 

Authentication also requires users to prove their identities and can occur every time a user logs on. Methods used for verification are also used for authentication, including fingerprint scans and facial recognition. Risk-based, adaptive authentication incorporates contextual data into the decision-making process, stepping up the need for additional proofs based on whether the user is logging on at an unusual time, location or other factor.

 

To learn more the importance of ensuring users are who they claim to be, read our blog

Everything You Need to Know about Online Fraud.

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.