Methods for verifying customer identity: requirements, instructions, and which method to choose
Read more
Reading time:
Date of publication:
Verification of a customer's identity is one of the cornerstones of transaction security, both in face-to-face and online relationships. Within the scope of this article, we will focus exclusively on remote processes.
Identification can be a mandatory or optional element - depending on the legal requirements or the level of risk for a particular relationship. Identity verification can be performed in connection with a variety of online services, from opening a new bank account to investing. The process, known as KYC (Know Your Customer), involves confirming that the person using a particular service is indeed who they say they are.
Confirming identity is particularly important wherever there are high-risk, high-value contracts or contracts subject to specific laws, including, for example, accessing financial or administrative services.
However, this is not just a whim of a particular company.
According to Agata Kolorz-Lentini, Information Security Compliance Manager at Autenti, who supports Autenti's clients in implementing remote identity verification solutions on a daily basis:
"The KYC procedure may result primarily from:
At the same time, it should not be forgotten that organizations implementing identity verification processes must also meet requirements related to the protection of personal data, including, above all, respecting the principles of minimization, adequacy and accountability. The challenges in this area are many, including accessibility and ease for the recipient himself. Designing identity verification processes therefore requires a holistic approach to safeguard every aspect and the interests of both parties.
There are many online identification options on the market today, each with a different level of security as to identity, which should be considered as part of the risk analysis. Most of the methods are subject to regulations and standards, such as the eIDAS Regulation, for trust and electronic identification services. It all boils down to the need to implement secure and reliable methods for confirming customers' identities."
In this article, we discuss the most common identity verification methods used in KYC processes:
So as to make it easier for your company to choose the right method.
Until a few years ago, verifying a customer's identity involved physically presenting documents and providing a signature.
For example, let's compare the process of opening a bank account.
It used to require preparing the relevant documents, signing them on paper and physically visiting the branch to show the identity document. Today, we will handle the entire process in a few minutes from home, confirming our identity through, for example, video verification.
Remote identity verification carried out using solutions such as those available from Autenti makes it possible to choose different identification methods depending on the nature of the business process, the level of security required and the user's preferences.
The process takes place completely online and usually takes no more than a few minutes.
The customer receives an invitation for verification, performs the required actions, for example, logs into online banking or confirms the data with an identity document, and the identification result is automatically sent to the company.
Using Autenti's identity verification services as an example, we'll go through seven methods for confirming a customer's identity.
Starting with one of the simplest methods available on the market.
Video verification is a method of confirming a user's identity remotely by taking a photo of the user's face or a short video recording, during which appropriate head movements must be made and the image compared to that person's identity document.
The process uses biometrics and liveness detection mechanisms to verify that there is a live, real person on the other side, rather than a photo or recording.
The tools are equipped with mechanisms for detecting so-called "deep fakes," i.e. attempts to use someone else's identity, including through artificial intelligence. In addition, the tools analyze the presented identity document for its veracity.
The entire process usually takes from tens of seconds to a few minutes.
Another method we will discuss in this article, which is a common part of efficient KYC processes, is verification of a customer's identity using an e-card.
Such verification involves confirming user data using the electronic layer of an identity document equipped with an NFC chip. This method allows direct reading of the data stored in the document and its cryptographic confirmation.
It sounds like a complicated process, but in fact it is one of the simplest methods of identity verification, as you will soon see for yourself.
The process usually takes tens of seconds.
An equally frequently used method of confirming a person's identity is to use electronic banking or the Trusted Profile, under the so-called "National Node". For some processes, it is possible to use a method involving a simple verification transfer, however, this method is generally considered to be ancillary, due to the low level of security as to identity.
Logging in to electronic banking, provided by the National Clearing House (MojeID) and the Trusted Profile involves so-called authentication to an electronic identification means, issued by banks integrated with the National Node or by authorized state authorities.
The last category of identity verification methods we will go through is confirming our personal information by using a qualified signature.
This method involves confirming a user's data by providing an electronic signature assigned to a specific person.
A qualified electronic signature must be issued by any qualified trust service provider within the European Union, listed on the Trusted List in accordance with the eIDAS Regulation.
This method is based on a previously performed user identification process and allows for unambiguous confirmation of identity in a digital environment.
A qualified electronic signature has a legal status equivalent to a handwritten signature, while a trusted signature is a means of identification used in online public services.
Depending on the data that the process requires to be confirmed, you can use different methods to verify the customer's identity.
In the table below you will find detailed information about the data verified depending on the method you choose.
|
Purpose of verification / scope of data |
Video Verification |
E-evidence |
Electronic banking |
Qualified / trusted signature |
|
Confirmation of an individual's identity |
✔️ |
✔️ |
✔️ |
✔️ |
|
High level of identity security |
❌ |
✔️ |
❌ |
✔️ (for qualified signature) |
|
Medium level of identity security |
✔️ |
✔️ |
✔️ (MyID only) |
✔️ |
|
Verification of image match with document |
✔️ |
❌ |
❌ |
❌ |
|
Confirmation of the authenticity of the document |
✔️ |
✔️ |
Indirectly |
Indirectly |
|
Confirmation of personal information (name, surname, PESEL) |
✔️ |
✔️ |
✔️ |
Depending on the content of the certificate |
|
Signing of documents |
❌ |
❌ |
❌ |
✔️ |
|
Verification without physical document |
❌ |
❌ |
✔️ |
✔️ |
Choose video verification when the user/customer does not have an electronic signature and a quick confirmation of identity is required.
Choose e-proof when a very high level of assurance and cryptographic confirmation of the document is required.
Select e-banking when the user has an active bank account and a fast and convenient process is expected.
Choose qualified signature when verification is part of document signing. Qualified signature or trusted signature are also possible to use if at least a medium level of security is required as to identity. A qualified signature guarantees a high level.
If you care about time and at the same time the process requires a qualified electronic signature (e.g., when signing an employment contract with copyright transfer), you can use one-time qualified signatures on a selfie or based on mCitizen identification.
Remote identity verification is a fast, convenient and secure way to meet your clients or customers, but also to meet regulatory requirements at the same time.
By choosing the right method, video verification, e-ID, e-banking or qualified signature, you can tailor the process to your business needs or regulatory requirements.
Move to digital signatures and digital identity verification with a trusted provider.
Move to the digital power side with Autenti.
It's a process to confirm that the person who initiates a process (e.g., creating an account, signing a contract) is who they say they are.
On average, 90 seconds for simple processes. More elaborate verifications can take up to tens of minutes, especially when referring to verification processes related to qualified electronic signatures (QES).
Yes. Data is encrypted and processed according to the highest security standards. All methods are equipped with appropriate technical safeguards to minimize identity impersonation and detect fraud.
Depending on the method chosen:
No, all methods work fully remotely.
The choice depends on the purpose of the process and available customer data:
Mateusz Kościelak
Mateusz Kościelak brings over 10 years of experience in B2B Sales & Marketing with the specialization in Enterprise B2B SaaS. A V-Shaped marketer experienced in building lead generation machines using content, SEO & performance marketing with the focus on international expansion.
Visit author's profileMateusz Kościelak
Read more
Natalia Gębska
Read more
Marcin Łukasik
Read more