{"id":872,"date":"2020-12-23T13:59:39","date_gmt":"2020-12-23T10:59:39","guid":{"rendered":"https:\/\/airome.tech\/?p=872"},"modified":"2023-05-24T12:31:30","modified_gmt":"2023-05-24T09:31:30","slug":"authentication-is-done-what-about-identification","status":"publish","type":"post","link":"https:\/\/airome.tech\/id\/authentication-is-done-what-about-identification\/","title":{"rendered":"Authentication is done. What about Identification?"},"content":{"rendered":"<div style=\"display: flex; align-items: center; margin-bottom: 1em;\">\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-393\" style=\"width: 100px; height: auto; border-radius: 50%; border: 3px solid #eee;\" src=\"https:\/\/airome.tech\/wp-content\/uploads\/2019\/12\/melnichenko.jpg\" alt=\"Pavel Melnichenko\" \/><\/p>\n<p style=\"margin: 0 0 0 1em;\">By Pavel Melnichenko, CTO<\/p>\n<\/div>\n<p>All our previous topics were about authentication \u2013 how to authenticate a user or a transaction, how to reduce risks of hijacking authentication data, how to prevent data substitution, score a device and many more.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" class=\"aligncenter size-full wp-image-873\" src=\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-blog_pavel.jpg\" alt=\"\" srcset=\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-blog_pavel.jpg 1200w, https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-blog_pavel-640x360.jpg 640w, https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-blog_pavel-768x432.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>We have been working around authentication and transaction confirmation technologies for a long time. And we made advanced products in this field. Yet, with the pandemic situation, we faced with a new challenge on how to personalize a user\u2019s device to make him able to authenticate? To work with critical data is usual for us. These mean that we cannot just use login\/password to authenticate a user. We have to provide strong cryptographic authentication with key distribution schemes. The usual case for technologies like this is to visit some authority personally as bank\u2019s branch office, certification authority for PKI purposes or some customer service.<\/p>\n<p>As I said before, the pandemic situation has made us confused.<\/p>\n<p>According to security tutorials, there are three mechanisms to work with your user:<\/p>\n<ol>\n<li>identification (meet your client);<\/li>\n<li>authentication (has been done);<\/li>\n<li>authorization (usually is application level).<\/li>\n<\/ol>\n<p>These mechanisms work from the first to the last. For example, you cannot authorize your user without authenticating him. You cannot authenticate him without identifying him.<\/p>\n<p>We realized that our solutions cover the second step because we used to work with applications, which identifies a user by themselves. After identification, an application can personalize a user\u2019s device with the authentication factor (private key in our case) and authenticate him in the future.<\/p>\n<p>The modern request from our customers in pandemic situation became different: \u201cwe want you (means us) to provide us (means application holder) identified user with personalized device\u201d.<\/p>\n<p>This request became actual because of our customers (bank, FinTech, logistics, insurance) cannot meet user offline to identify him. Even before the pandemic situation, they were not glad to open branch offices. Pandemic became a catalyst to move identification from offline to online.<\/p>\n<p>I know you think about many solutions called digital (or electronic) KYC (know your client). But if you will take a look a few paragraphs above, you will understand that eKYC covers identification step only. Our solutions cover the authentication step. Sure, advanced application holders and developers can combine eKYC and authentication factors distribution in their application, but this will lead to many efforts for developers and, as a result, costs increasing. At the same time, the product will be a multi-vendor solution, which is harder to support.<\/p>\n<p>For us, the conclusion was obvious \u2013 we should try to combine eKYC and personalization process for authentication purposes together. Result solution will cover two of the most sensitive and complicated steps in remote interaction with a user \u2013 identification and authentication.<\/p>\n<p>Moreover, the outcome of identification will be a user, who entirely ready for online communications: with user\u2019s record in an application and with device personalized to authenticate a user himself and his transactions.<\/p>\n<p>Before start, we formulated the essential requirements for the identification process (eKYC). Here they are:<\/p>\n<ol>\n<li>eKYC must be done with the user\u2019s mobile device only<\/li>\n<li>onboarding process must be as simple as possible;<\/li>\n<li>eKYC must verify if there is an alive user in front of a mobile device (e.g. liveness detection);<\/li>\n<li>an application will wish to have a user\u2019s photo to know a user (selfie);<\/li>\n<li>we have to ask a user to provide an identification document to get his name, age and so on;<\/li>\n<li>this document must contain a photo to compare with a selfie to be sure that there is a user\u2019s document;<\/li>\n<li>we have to recognize fields of the document;<\/li>\n<li>we have to verify if the document is not a fake;<\/li>\n<li>we have to verify the document with external for us sources, like governmental databases, black-lists, police databases and so on;<\/li>\n<li>after success data collection, we have to provide an initial key set to the user\u2019s device to start the personalization process for authentication in future and do this securely.<\/li>\n<\/ol>\n<p>As you see, remote identification includes a set of complicated technologies based on mobile development, video analysis (liveness), face recognition (compare faces in liveness, selfie, id document), optical character recognition, images integrity checks, government integration and set of security mechanisms to finish personalization.<\/p>\n<p>As one of the most important thing, it must be effortless for end-user.<\/p>\n<p>Looking ahead, I can tell that we realized our vision in our solution \u2013 PayConfirm platform. The onboarding process for our user takes about 20 seconds and seems very simple. As a result \u2013 the user will have wholly fulfilled the record in the target application and device to control his actions (authentication and transactions confirmation). Application holder can be sure that a user has passed all the security checks, and the user\u2019s data is correct. And all this has been done remotely.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pandemic became a catalyst to move identification from offline to online for many organizations. Even we faced a new challenge on how to personalize a user\u2019s device to make him able to authenticate?<\/p>\n","protected":false},"author":2,"featured_media":874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[58,11,18,17,82,38],"class_list":["post-872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-2fa","tag-authentication","tag-banking-app","tag-digital-banking","tag-identification","tag-payconfirm"],"translation":{"provider":"WPGlobus","version":"3.0.0","language":"id","enabled_languages":["en","id"],"languages":{"en":{"title":true,"content":true,"excerpt":true},"id":{"title":false,"content":false,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Authentication is done. What about Identification? - Airome<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authentication is done. What about Identification? - Airome\" \/>\n<meta property=\"og:url\" content=\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\" \/>\n<meta property=\"og:site_name\" content=\"Airome\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/airometech\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T10:59:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-24T09:31:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pavel Melnichenko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@airome_tech\" \/>\n<meta name=\"twitter:site\" content=\"@airome_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavel Melnichenko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\"},\"author\":{\"name\":\"Pavel Melnichenko\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/39590fac892ce31e8c1eda802e421f00\"},\"headline\":\"Authentication is done. What about Identification?\",\"datePublished\":\"2020-12-23T10:59:39+00:00\",\"dateModified\":\"2023-05-24T09:31:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\"},\"wordCount\":807,\"publisher\":{\"@id\":\"https:\/\/airome.tech\/#organization\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg\",\"keywords\":[\"2FA\",\"authentication\",\"banking app\",\"digital banking\",\"identification\",\"PayConfirm\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\",\"url\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\",\"name\":\"Authentication is done. What about Identification? - Airome\",\"isPartOf\":{\"@id\":\"https:\/\/airome.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg\",\"datePublished\":\"2020-12-23T10:59:39+00:00\",\"dateModified\":\"2023-05-24T09:31:30+00:00\",\"description\":\"Moreover, the outcome of identification will be a user, who entirely ready for online communications\",\"breadcrumb\":{\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage\",\"url\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg\",\"contentUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/airome.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authentication is done. What about Identification?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/airome.tech\/#website\",\"url\":\"https:\/\/airome.tech\/\",\"name\":\"Airome\",\"description\":\"Simple. Mobile. Secure. Your mTAS.\",\"publisher\":{\"@id\":\"https:\/\/airome.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/airome.tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/airome.tech\/#organization\",\"name\":\"Airome\",\"url\":\"https:\/\/airome.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png\",\"contentUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png\",\"width\":206,\"height\":64,\"caption\":\"Airome\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/airometech\",\"https:\/\/x.com\/airome_tech\",\"https:\/\/www.linkedin.com\/company\/airome\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/39590fac892ce31e8c1eda802e421f00\",\"name\":\"Pavel Melnichenko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/246a21965fc6a89db6cb22c33d46be148b8cccdca405c81d973a6ee05be42af2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/246a21965fc6a89db6cb22c33d46be148b8cccdca405c81d973a6ee05be42af2?s=96&d=mm&r=g\",\"caption\":\"Pavel Melnichenko\"},\"url\":\"https:\/\/airome.tech\/id\/author\/p-melnichenko\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authentication is done. What about Identification? - Airome","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/","og_locale":"id_ID","og_type":"article","og_title":"Authentication is done. What about Identification? - Airome","og_url":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/","og_site_name":"Airome","article_publisher":"https:\/\/www.facebook.com\/airometech","article_published_time":"2020-12-23T10:59:39+00:00","article_modified_time":"2023-05-24T09:31:30+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg","type":"image\/jpeg"}],"author":"Pavel Melnichenko","twitter_card":"summary_large_image","twitter_creator":"@airome_tech","twitter_site":"@airome_tech","twitter_misc":{"Written by":"Pavel Melnichenko","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#article","isPartOf":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/"},"author":{"name":"Pavel Melnichenko","@id":"https:\/\/airome.tech\/#\/schema\/person\/39590fac892ce31e8c1eda802e421f00"},"headline":"Authentication is done. What about Identification?","datePublished":"2020-12-23T10:59:39+00:00","dateModified":"2023-05-24T09:31:30+00:00","mainEntityOfPage":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/"},"wordCount":807,"publisher":{"@id":"https:\/\/airome.tech\/#organization"},"image":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg","keywords":["2FA","authentication","banking app","digital banking","identification","PayConfirm"],"articleSection":["Blog"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/","url":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/","name":"Authentication is done. What about Identification? - Airome","isPartOf":{"@id":"https:\/\/airome.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage"},"image":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg","datePublished":"2020-12-23T10:59:39+00:00","dateModified":"2023-05-24T09:31:30+00:00","description":"Moreover, the outcome of identification will be a user, who entirely ready for online communications","breadcrumb":{"@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/airome.tech\/authentication-is-done-what-about-identification\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#primaryimage","url":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg","contentUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/12\/23-12-2020-mini-blog_pavel.jpg","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/airome.tech\/authentication-is-done-what-about-identification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/airome.tech\/"},{"@type":"ListItem","position":2,"name":"Authentication is done. What about Identification?"}]},{"@type":"WebSite","@id":"https:\/\/airome.tech\/#website","url":"https:\/\/airome.tech\/","name":"Airome","description":"Simple. Mobile. Secure. Your mTAS.","publisher":{"@id":"https:\/\/airome.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/airome.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/airome.tech\/#organization","name":"Airome","url":"https:\/\/airome.tech\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/#\/schema\/logo\/image\/","url":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png","contentUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png","width":206,"height":64,"caption":"Airome"},"image":{"@id":"https:\/\/airome.tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/airometech","https:\/\/x.com\/airome_tech","https:\/\/www.linkedin.com\/company\/airome\/"]},{"@type":"Person","@id":"https:\/\/airome.tech\/#\/schema\/person\/39590fac892ce31e8c1eda802e421f00","name":"Pavel Melnichenko","image":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/246a21965fc6a89db6cb22c33d46be148b8cccdca405c81d973a6ee05be42af2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/246a21965fc6a89db6cb22c33d46be148b8cccdca405c81d973a6ee05be42af2?s=96&d=mm&r=g","caption":"Pavel Melnichenko"},"url":"https:\/\/airome.tech\/id\/author\/p-melnichenko\/"}]}},"_links":{"self":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":2,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":952,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/872\/revisions\/952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/media\/874"}],"wp:attachment":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/media?parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/categories?post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/tags?post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}