• Trusted Digital Identity

    ????????????????????????????????????????????????????Enabling swift and secure multi-channel Trusted Digital Identities

    ? Digital identity

    To ensure their position in a future landscape, MNOs, OEMs and service providers need to claim new territory in the digital market, cut operational costs, and attract new customers. This can be achieved by establishing seamless and entirely digital customer journeys. A Trusted digital identity is the key to securing these journeys and to opening up a wealth of access for customers to security-sensitive services.

    ?What is a Trusted Digital Iden?tity?

    To begin with, a digita?l ID is the technological link between a real entity such as a person and its digital equivalent entities. It includes a collection of electronically captured and stored identity attributes including biographic and biometric data.

    People own many digital identities that consist of an email address and a password to access different online services. In some cases, such as engaging with media o?r entertainment, we may access social media using a pseudonym to reveal less about our identity. But when it comes to certain areas, like government services and banking, it’s critical that you are who you claim to be: IDs need to be trusted.

    A Trusted Digital Identity is created when the information provided has been verified, or checked for authenticity.

    A trusted digital ID consist of a set of verified attributes (like verified ID documents or biometrics), thus providing a certifiable link between an individual an?d their digital identity. These attributes may also include verification with third parties such as Government databases, social identity, credit card number or mobile records.

    ?For MNOs, OEMs and other enterprises, trusted digital IDs mean smoother digital workflows, faster customer acquisition processes and consistent customer data. Operating costs are reduced and the customer experience enhanced. Moreover, a Trusted Digital Identity can serve as a gateway for subscribers to access multiple security-sensitive services such as mobile money, eGov and online banking, allowing MNOs to take a lead in these fast growing sectors.

    This is where Gemalto's Trusted Digital Identity Services Platform comes into play, a one-stop services platform to digitalize mobile subscriber enrollment. 

    It orchestrates everything needed by Telecom Operators to digitalize customer enrollment, including the capture, verification and authentication of customer credentials and biometrics.  Drawing on Gemalto's in-depth experience and expertise in these fields, as well as complementary services from trusted partners worldwide, the platform enables streamlined enrollment, both in-store and online. 

    As a result, Telecom Operators, OEMs and other enterprises can accelerate their digitalization strategies, launch new services, fight fraud and meet regulations.

    Trusted Digital Identity services platform to digitalize mobile subscriber enrollment 


    ??How to create a Trusted Digital Identity??

    A trusted digital ID is created by conducting three general steps: capture, verify, digitalize. The details of each step may vary according to the extent of the information the MNO wishes to capture and the regulations they are subject to, for example, around personal data privacy.

    1. ????Ca??pture
    2. Verify 
    3. ???Digitalize ?
    verify identity: capture 
    Identity checking 
    Digitalize: digital identity 
    ? ??

    1. Capture


    In-store or remotely, identity attributes are captured. Those attributes are ID documents such as passports, driving licenses, ID cards and also biometrics such as faces. The hardware needed can range from a mobile phone to specialized high end scanners.


    Read more

    2. Verify

    Identity verification aims to verify the authenticity of the end user ID document and validates if the person is who they claim to be. This may require a combination of solutions, depending on the level of assurance needed.
    Read?? more


    3. ?Digitalize

    After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user's digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. ?
    Read more?

    ? ? ?
    ? ????

    1. How to capture ID documents and biometrics??

    identity checking: capture ID documents

    Capture ID do?cuments

    The subscriber's ID information is captured from an identity document (passport, driver's license, or national ID, resident permits etc.). In this process, information such as name and birthdate can be extracted through image analytics (optical character recognition). This technology helps ensure that accurate and detailed customer information is entered in the CRM.

    Identity checking: capture biometricsCapture biometr?ics

    A biometric capture device (such as a mobile phone, web camera, tablet or kiosk or specialized fingerprint scanner) is used to capture the user's biometric information. Types of biometrics that can be collected include information from the face or fingerprint.?


    ??2. How to verify ID documents and biometrics? ?

    identity checking: verify the authenticity of an ID document

    Verif??y identity

    After it has been captured, the system verifies the authenticity of an ID document with dedicated software. Different methods can be used to check security features of the provided identity document against an ID database. In this phase, the personal information of the card holder can also be extracted to automatically populate the fields in registration forms, the CRM, etc. This results in a faster and simpler onboarding process for customers, as well as time savings and greater data accuracy for MNOs.

    There are different levels of document verification: standard, based on ID picture from visible light, advanced with security features existing in white, infra-red and ultra violet and chip-based with electronic document verification.

    Identity checking: verify biometrics??Verify bi??ometrics

    Biometric technology is used to verify if the person presenting the document is who they claim to be. It also presents an opportunity for later use as simple and modern way to access serv?ices that require identification — and in particular when verification needs to be conducted remotely. 

    ??3. How is a digital ID created??

    Digitalize: digital IDDigitalize

    After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user’s digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. This function enables users to seamlessly access the MNO’s services or third party services. 


    • Trusted Digital Identity at work: making the leap into a digital future



    ID Verification

    ID Verification:
    Capture and Verify?

    Fighting identity fraud while complying with national ID registration regulations is a major challenge for mobile operators. Gemalto multi-channel Identity Verification Service helps you reduce fraud linked to the use of fake IDs during a smooth customer enrollment process.

    Identity Verification ?services
    for Mobile Operators?

    Mobile ID

    Mobile ID?: Digitalize, Authenticate a?nd Sign?

    There is a critical need to bring convenience and trust to digital authentication. With Mobile ID, Gemalto offers an unprecedented, single means of authentication to securely access online services, confirm transactions and sign documents.?

    Solutions for a single and secure
    digital identity

    • Why fighting identity fraud is critical for MNOs

      Why is fighting ID fraud crucial for CFOs and fraud departments of Mobile Network Operators? What are the impacts in terms of revenues, reputation, regulations? Find out how to put things right, with an ID verification service relying on our expertise in telecommunication and government sectors.

      Watch video

    Mobile ID

    Mobile Software Security??

    Gemalto in-app security solutions rely on a systematic approach for many use cases such as mobile banking, mobile payment, mobile government, mobile enterprise and much more. We help industries and government to build greater trust in the mobile ecosystem.

    Building trust in mobile apps

    Data Protection

    Identity & Data Protection Services

    The explosion of corporate cloud and authentication services represents a massive opportunity for mobile network operators to enlarge their business service offers. Discover Gemalto’s offers powered by SafeNet.

    D?eliver trusted authentication and cloud data protection solutions

    backup and mobile protection

    Personal Cloud??

    Gemalto helps mobile operators to maximize customer value by providing trustful mobile protection services to mobile users. The offer includes backup and mobile protection.

    Secure all mobiles' backup. In the Cloud.?

    ? ??

    Related Blogs

    • Posted on Feb 27, 2019

      Trusted Digital Identities – the interview

      Juana Catalina Rodriguez and Didier Benkoel-Adechy discuss how important developments in the digital identity ecosystem will benefit end-users

      Read this post
    • Posted on Feb 26, 2019

      Digital Identities – the linchpin to unlocking the digital economy

      Highlighting four of the key ways digital identities are bringing value to the digital economy.

      Read this post
    • Posted on Feb 14, 2019

      Transforming customer enrollment with Trusted Digital Identity and human-centric design

      Here’s how service providers can transform the customer enrollment process by combining Trusted Digital Identity with human-centric design.

      Read this post
    • Posted on Feb 11, 2019

      Top 6 trends driving Trusted Digital Identities in 2019

      Ahead of MWC Barcelona, we look into the market trends and dynamics that will shape the digital identity industry in 2019.

      Read this post
    • Posted on Feb 04, 2019

      Smart mobility and the blockchain

      Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps?

      Read this post