SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
MANY SERVICES CAN BENEFIT FROM IDENTITY AUTHENTICATION USING A
KNOWN LEVEL OF UNDERLYING STRONG IDENTITY VERIFICATION.
Identity verification is commonplace through identity providers such as
government registries and the Know Your Customer (KYC) process used by
regulated businesses such as banks and telecoms providers. These verified
identity attributes from such trusted organisations can then be used to
register or validate customers to application and service providers that need
to know the identity of the user to high levels of confidence.
USING EXTERNALLY VERIFIED
STRONG IDENTITIES
Reduce fraud risk and improve your
customer experience
REGULATION DICTATES THAT BANKS,
TELECOMMUNICATIONS COMPANIES AND
OTHER KYC LED ORGANISATIONS MUST
PERFORM STRONG IDENTITY VERIFICATION
WHEN ONBOARDING CUSTOMERS.
The Ubisecure Identity Platform provides benefits
across the entire identity ecosystem:
The benefit to the customer is a simplified, secure
and private means to register and log into online
applications and services
The benefit to the identity provider (IdP) is to
federate strong identities and gain new ROI on
the KYC investment
The benefit to the service provider is the
confidence that the identity of the customer has
been verified to high levels of confidence,
reducing fraud without the need to invest in their
own KYC infrastructure
THE UBISECURE IDENTITY PLATFORM
CONVENIENTLY, SECURELY AND PRIVATELY
CONNECTS EXISTING STRONG (VERIFIED)
IDENTITIES FROM GOVERNMENT, BANKS, TELCO
PROVIDERS (AND MORE) TO APPLICATIONS AND
SERVICES
CONNECT IDENTITIES - USE CASE
SECURE YOUR BUSINESS WITH STRONG AUTHENTICATION
In the case of fintech applications or government services, neither the service provider or the customer would expect to
rely only on basic username/password security – the risk of compromise is simply too high. For such sensitive transactions,
users have increasing expectation that strong authentication will be used to protect their assets and digital information.
The Ubisecure Identity Platform connects service providers with dozens of strong identity providers and multi-factor
authentication (MFA) form factors to build the ideal authentication solution depending on the transaction situation.
MULTIPLE AUTHENTICATION METHODS
The Platform has built-in support for multitude of authentication methods such as Government eIDs, national bank IDs,
telco IDs and Mobile PKI. The Authentication Adaptor microservice is extendable in any other external source using
standardised connection methods. Enterprises can use a single solution to achieve step-up authentication, such as using
social identities to capture and convert visitors, and when required for higher value or more sensitive
engagement/transactions, use the same solution to step-up to strong customer authentication. This ensures that your
users can benefit from strong authentication with familiar “bring their own identity” method.
Using externally verified strong identities can reduce the risk of
fraud and improve the customer experience in registering and
engaging with your services.
We can help you get started with using external strong identities for your
applications and services - visit www.ubisecure.com or talk to us today.
About Ubisecure Inc
Founded in 2002, Ubisecure is a pioneering b2b and b2c Identity Services software and cloud services provider dedicated to enabling the true
potential of digital business. Ubisecure’s Identity Platform comprises of Customer Identity & Access Management (CIAM) and Identity-as-a-Service
(IDaaS) solutions that allow businesses to put the customer’s identity at the beginning of their journey to create a seamless, secure experience
across digital services and devices. Uniquely, the Identity Platform also connects digital services and Identity Providers such as social networks,
mobile networks, banks and Governments, to allow Service Providers to benefit from the rich, verified identities to streamline login, registration
and customer engagement while improving privacy and consent around personal data sharing. Ubisecure is headquartered in Finland, with offices
in the UK and Sweden, and works through a network of local and global system integrator partners.
E: sales-team@ubisecure.com | FI: +358 9 251 77250 UK: +44 1273 957 | www.ubisecure.com
© 2018 Ubisecure Inc. All rights reserved.
CONNECT IDENTITIES - USE CASE

Más contenido relacionado

La actualidad más candente

swift_connectivity_factsheet_l2ba
swift_connectivity_factsheet_l2baswift_connectivity_factsheet_l2ba
swift_connectivity_factsheet_l2ba
Frederik Adriaensen
 

La actualidad más candente (19)

Case Study: Frontier Communications
Case Study: Frontier CommunicationsCase Study: Frontier Communications
Case Study: Frontier Communications
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
eWise at FinDEVr
eWise at FinDEVreWise at FinDEVr
eWise at FinDEVr
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Bank digital KYC service
Bank digital KYC serviceBank digital KYC service
Bank digital KYC service
 
apidays LIVE Singapore - The even better Singpass for an easier Connected Lif...
apidays LIVE Singapore - The even better Singpass for an easier Connected Lif...apidays LIVE Singapore - The even better Singpass for an easier Connected Lif...
apidays LIVE Singapore - The even better Singpass for an easier Connected Lif...
 
swift_connectivity_factsheet_l2ba
swift_connectivity_factsheet_l2baswift_connectivity_factsheet_l2ba
swift_connectivity_factsheet_l2ba
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
The main purpose for the eIDAS is supporting business
The main purpose for the eIDAS is supporting businessThe main purpose for the eIDAS is supporting business
The main purpose for the eIDAS is supporting business
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributes
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
 

Similar a Using Strong / Verified Identities

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
Keynectis
 

Similar a Using Strong / Verified Identities (20)

Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Transaction&process integrity
Transaction&process integrityTransaction&process integrity
Transaction&process integrity
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
EVS 2015 Solution Overview
EVS 2015 Solution OverviewEVS 2015 Solution Overview
EVS 2015 Solution Overview
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Remote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideRemote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate Guide
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 

Más de Ubisecure

Más de Ubisecure (12)

Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for Microservices
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 

Último

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Using Strong / Verified Identities

  • 1. MANY SERVICES CAN BENEFIT FROM IDENTITY AUTHENTICATION USING A KNOWN LEVEL OF UNDERLYING STRONG IDENTITY VERIFICATION. Identity verification is commonplace through identity providers such as government registries and the Know Your Customer (KYC) process used by regulated businesses such as banks and telecoms providers. These verified identity attributes from such trusted organisations can then be used to register or validate customers to application and service providers that need to know the identity of the user to high levels of confidence. USING EXTERNALLY VERIFIED STRONG IDENTITIES Reduce fraud risk and improve your customer experience REGULATION DICTATES THAT BANKS, TELECOMMUNICATIONS COMPANIES AND OTHER KYC LED ORGANISATIONS MUST PERFORM STRONG IDENTITY VERIFICATION WHEN ONBOARDING CUSTOMERS. The Ubisecure Identity Platform provides benefits across the entire identity ecosystem: The benefit to the customer is a simplified, secure and private means to register and log into online applications and services The benefit to the identity provider (IdP) is to federate strong identities and gain new ROI on the KYC investment The benefit to the service provider is the confidence that the identity of the customer has been verified to high levels of confidence, reducing fraud without the need to invest in their own KYC infrastructure THE UBISECURE IDENTITY PLATFORM CONVENIENTLY, SECURELY AND PRIVATELY CONNECTS EXISTING STRONG (VERIFIED) IDENTITIES FROM GOVERNMENT, BANKS, TELCO PROVIDERS (AND MORE) TO APPLICATIONS AND SERVICES CONNECT IDENTITIES - USE CASE
  • 2. SECURE YOUR BUSINESS WITH STRONG AUTHENTICATION In the case of fintech applications or government services, neither the service provider or the customer would expect to rely only on basic username/password security – the risk of compromise is simply too high. For such sensitive transactions, users have increasing expectation that strong authentication will be used to protect their assets and digital information. The Ubisecure Identity Platform connects service providers with dozens of strong identity providers and multi-factor authentication (MFA) form factors to build the ideal authentication solution depending on the transaction situation. MULTIPLE AUTHENTICATION METHODS The Platform has built-in support for multitude of authentication methods such as Government eIDs, national bank IDs, telco IDs and Mobile PKI. The Authentication Adaptor microservice is extendable in any other external source using standardised connection methods. Enterprises can use a single solution to achieve step-up authentication, such as using social identities to capture and convert visitors, and when required for higher value or more sensitive engagement/transactions, use the same solution to step-up to strong customer authentication. This ensures that your users can benefit from strong authentication with familiar “bring their own identity” method. Using externally verified strong identities can reduce the risk of fraud and improve the customer experience in registering and engaging with your services. We can help you get started with using external strong identities for your applications and services - visit www.ubisecure.com or talk to us today. About Ubisecure Inc Founded in 2002, Ubisecure is a pioneering b2b and b2c Identity Services software and cloud services provider dedicated to enabling the true potential of digital business. Ubisecure’s Identity Platform comprises of Customer Identity & Access Management (CIAM) and Identity-as-a-Service (IDaaS) solutions that allow businesses to put the customer’s identity at the beginning of their journey to create a seamless, secure experience across digital services and devices. Uniquely, the Identity Platform also connects digital services and Identity Providers such as social networks, mobile networks, banks and Governments, to allow Service Providers to benefit from the rich, verified identities to streamline login, registration and customer engagement while improving privacy and consent around personal data sharing. Ubisecure is headquartered in Finland, with offices in the UK and Sweden, and works through a network of local and global system integrator partners. E: sales-team@ubisecure.com | FI: +358 9 251 77250 UK: +44 1273 957 | www.ubisecure.com © 2018 Ubisecure Inc. All rights reserved. CONNECT IDENTITIES - USE CASE