Identity Proofing Overview Common challenges and solutions solved via Precise IDSM Sal Guariano Vice President, Experian Government Services © 2011 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Information Solutions, Inc. Other product and company names mentioned herein are the trademarks of their respective owners. No part of this copyrighted work may be reproduced, modified, or distributed in any form or manner without the prior written permission of Experian. Confidential and proprietary Experian overview How Experian can help Four global business lines Credit Services A trusted third party identity and attribute provider delivering foundational support in the definition and promotion of the identity ecosystem Identity proofing expertise Decision Analytics Marketing Services Interactive What sets us apart Over a decade of providing hosted riskbased authentication services to private and public sector Depth and breadth of data assets Operational and thought leadership in data management, analytics and technology Scale and resource capacity required in enabling Identity Proofing and risk assessment Consultative approach to services design, implementation and evolution © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary Best-in-class analytics and authentication services suite 2 Common challenges Common fraud threats Account takeover First party fraud Synthetic identity Identity theft © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 3 Common challenges Common fraud threats Common business drivers Customer experience Hosted and flexible services Regulatory pressure and outsort rates New access channels and markets © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 4 Common challenges Common fraud threats Common business drivers Solutions Real-time decisioning Holistic customer views Mitigate fraud and meet security and compliance requirements © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 5 Common challenges Common fraud threats Common business drivers Solutions Urgency for emerging eservices to get it right Fraud will migrate to healthcare and government services that become a path of lesser resistance Security standards could drive massive referral volumes and high costs © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 6 Identity Proofing Common Challenges in Operational Implementation Pass rates ► Balance customer experience, cost, fraud prediction/prevention Out-of-wallet questions ► Customer awareness and willingness to participate ► Predictive value Risk-based authentication vs. Rules-based ► Balance use of analytics and diverse data assets with certain regulatory rules/checks Flexible and dynamic decisioning strategies ► Diverse addressable market segments ► Varied risks associated with online access and functionalities © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 7 What and why risk-based authentication? Definition ► Holistic assessment of a subject and transaction with the end goal of applying proportionate authentication and decisioning treatment Core value propositions ► Efficiency and proportionality in process and transactional cost ► Risk-assessment performance lift over traditional binary rule sets and policies ► Customer / subject user experience ► Evolutionary adoption of emerging technologies and data assets ► Flexibility and interoperability with core platforms and third party partners © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 8 Risk-based approach to identity proofing Four core elements and value proposition Element Description Value Data Broad reaching and accurately reported data sources Data sources spanning multiple public record and/or consumer credit information Far reaching and comprehensive opportunity to positively verify consumer identity elements Analytics Target analytics Scores designed to consistently reflect overall confidence in consumer authentication as well as fraud risk associated with identity theft, synthetic identities and first party fraud Allows institutions to establish consistent and objective score-driven policies to authenticate consumers and reconcile high-risk conditions Reduce false positive ratio associated with single or grouped binary rules Provides internal and external examiners with a measurable tool for incorporation into both written and operational programs © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 9 Risk-based approach to identity proofing Elements and value proposition Element Description Value Summary Detailed and summary-level consumer authentication results Consumer authentication summary and detailed-level outcomes that portray the level of verification achieved across identity elements such as name, address, Social Security number, data of birth and phone Delivers a breadth of information to allow positive reconciliation of high-risk fraud and/or compliance conditions Strategy Flexibly-defined decisioning strategies and process Data and operationally-driven policies, including KBA, that can be applied to the gathering, authentication and level of acceptance or denial of consumer identity information Employ consistent policies for detecting high-risk conditions, reconciling those conditions that can be, and ultimately determine, the response to authentication results whether it is acceptance or denial of access Specific results can be used in manual or automated decisioning policies as well as scoring models Adjust as operational policies warrant © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 10 NIST SP 800-63 for the four levels of assurance defined by OMB Relevant industry capabilities 1. Little or no confidence in the asserted identity’s validity Identity proofing is not required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing protected transaction of data User ID PIN Password / secret questions 2. Requires confidence that the asserted identity is accurate Provides for single-factor remote network authentication, including identity-proofing requirements Identity proofing ► Identity element verification ► Authentication and fraud scores 3. Provides multi-factor remote network authentication At this level, identity proofing procedures require verification of identifying materials and information Ideally online Out of wallet questions Financial instrument verification One-time password 1. Provides the highest practical assurance of remote network authentication Authentication is based on proof of possession of a key through a cryptographic protocol Requires personal presence PKI digital signature Biometrics Multi-factor token © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary Addictive layers Increased strength for increased identity assurance Levels 1-4 11 Precise IDSM Solution Overview Precise IDSM combines a wide range of fraud-fighting and identity proofing tools that use industry-leading data sources to provide an accurate picture of each customer in real-time. It is a powerful and fully integrated identity proofing tool that combines key components into a seamless process to effectively address emerging government identity proofing and authentication needs. © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 12 Precise IDSM application and use Account opening and ID screening relationships ► Card issuers ► DDA accounts ► eCommerce ► Government ► Direct to consumer ► Healthcare ► Personal loans ► Mortgage, HELOC ► Automotive ► Telco Account changes ► Authentication of consumer during high risk transactions ► Risk assessment prior to expansion of relationship with consumer © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 13 Experian capabilities and components Identify proofing Risk-based authentication Out-of-wallet data Public and private data sources Risk-based score – minimum input Knowledge-based authentication Customized business rules Real-time identity verification Out-of-wallet data questions Use primary data to verify Cross-industry identity information Progressive questioning Seamless integration © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 14 Key Precise ID output Fraud and identity risk scores and score factors Identity element verification results to include: ► Match level result codes ► Additional addresses, associated consumers, phone, DOB, SSN info High risk credit profile conditions Historical application checks National Fraud Database checks Fraud classification types IP address verification and detail Credit card verification Knowledge-based authentication (out of wallet) questions Customized decisioning © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 15 Experian ID Proofing Data source summary Checkpoint File One Shared Application Data National Vehicle Database National Fraud DatabaseSM BizSource ConsumerView RentBureau 3rd Party Partnerships 3rd party wireless 3rd party IP Address 3rd party DDA Negative files © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 16 Identity Proofing Components 1. Precise ID for Account Opening score ► 1 – 999 (higher score = lower risk) 2. Fraud Shield indicators ► High risk conditions associated with a consumer credit profile and identity 3. Financial instrument verification ► Association or disassociation of, for example, full credit card with a consumer 4. Knowledge IQ out-of-wallet question performance ► Flexibility in # of questions, weighting, categories, and hierarchy 5. Address Verification ► Address verification to name via residential, phone, DL, or credit profile information © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 17 Identity Proofing Components Decisioning Initially a conservative approach in healthcare / ePrescribe: ► All 5 components must pass: ● Default Precise ID score and Knowledge IQ question – matrix ▲ Conservative score and question thresholds ● Fraud Shield high risk conditions ● Credit Card verification ● Address verification © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 18 Identity Proofing Components Opportunities Performance monitoring ► Pass rates ► Fraud forensics ► Customer experience Available ‘dials’ to turn in the decisioning strategy: ► Score thresholds ► Fraud Shield indicator combinations ► Question logic and performance thresholds ► Address verification requirements © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary 19 Current e-Prescribing Service summary NIST Level 3 Remote Identity Proofing using Experian Precise ID and Symantec VIP. Multiple form-factors for OTP tokens for multiple platforms (PC, Workstation, and Mobile). Two-Factor Authentication with PIN, OTP and in-the-cloud validation service supporting authentication of prescribers at time of prescription approval. Symantec VIP Token Experian Precise ID (NIST 800-63-1 Level 3) Symantec PKI (Cross-Certified Federal Bridge) Symantec VIP OTP Authentication Service Prescriber © 2011 Experian Information Solutions, Inc. All rights reserved. Confidential and proprietary Clearinghouse E-Prescribing Application Pharmacy 20 Questions © 2011 Experian Information Solutions, Inc. All rights reserved. Experian Public. 21 © 2011 Experian Information Solutions, Inc. All rights reserved.