Identity verification: Personal Preparedness: Information Security & Policy: Indiana University (2024)

How can I verify an individual's identity?

Once you identify what level of assurance you require, you can use these tips below to plan a method of verification, depending on the type of interaction.

Please remember NEVER to ask for a password, PIN, passphrase, or access code! Such codes are meant ONLY to be used by the individual they are assigned to, for logging into systems.

The most common way to verify identity is to see the person and a government-issued, photo ID card (e.g., driver's license, state ID card, or Passport). This is “something you have” and “something you are” factors. A few tips on verifying with a photo ID:

  • Document that you reviewed a photo ID and what kind of ID it was. Driver's license numbers are protected by privacy laws, so do NOT copy or write down the number unless it is absolutely required to provide the requested service.
  • Watch out for fake photo ID cards. Become familiar with the format of the IDs you check, and look carefully. For example, most state driver's licenses have microprint, which is hard to fake. Do a quick online lookup for the correct ID number format to spot fake numbers. For more information, read How to Spot a Fake ID.
  • If the photo on the ID is not clearly the person in front of you, or if you need more proof, consider asking for a second ID. Examples include Social Security cards, credit cards, utility bills with name and address, school ID card, etc. Again, do NOT copy or keep these numbers, unless you require them to provide the service. Social Security numbers and credit card numbers are protected by law.
  • If you need more assurance, add a “something you know” method. Keep your process private and secure from others nearby. For example, if you need to ask for such information, have the person write it on paper for you to check, and then shred the paper while the person sees you do it. This way no one else will hear or find the information.

Cards and biometric readers like fingerprint, handprint, or hand geometry scanners are common ways of providing automated, in-person identity verification. Cards are “something you have” and biometrics are “something you are”.

Verifying identity over the phone requires "something you know" methods. The person doing the verifying will need access to a record about the individual requesting access or information.

  • First, check the phone number if you have caller ID. Is it one of the numbers in the record? If the call is from an organization, does the phone number start with the correct standard numbers for that organization?
  • Phone numbers can be “spoofed” or modified to trick a recipient into thinking a malicious call is legitimate. If you need a higher level of assurance, say you will call them back and then hang up. Dial the number in your records so that you control the phone number to which you are connected.
  • Ask standard questions like name, address, and phone number, but also ask something that only the individual would know. For example, in a higher education setting, consider asking the instructor's name for a class the person took, or what semester they took a certain class.
  • Use common sense and intuition to judge the authenticity of the call. For example, it could be a red flag if the voice of the caller does not match the age of the person in the records. Is the caller's behavior appropriate (for example, not rushing you to verify) and the reason for verifying by phone reasonable?

Verifying in email or chat can be challenging, due to the need to avoid documenting protected data such as Social Security number, driver's license number, and other identifying information, and because email and chat accounts are not very secure. It is best to use another method to verify.

If you absolutely have to verify through email or chat, and you only need a minimum level of assurance that the person is who they say they are, use the following tips.

  • Ask the same questions outlined in the “Verifying via Phone” section, but don't ask for sensitive information such as passwords, passphrases, Social Security numbers, credit card numbers, or driver's license numbers.
  • You can also check the technical details of the communication. For example, does the email address match the one in the records? In chat, is the username familiar? It's important not to rely completely on the email address or chat username, though, because those can beeasily spoofed. This only provides a hint that the person may be who they claim to be.
  • Instead of replying to the message, consider initiating a new email or chat thread by typing the email or chat address you have in your records. This way you control the address you are sending to. Unfortunately, you still do not have a way to truly verify that the person responding to the messages is the person who owns the email or chat account.
  • For IU business, can you require they email you from an IU email address, or use an IU chat service like Teams Chat? These are more trustworthy than free public email and chat accounts.
  • A higher level of assurance is possible if you ask the person to verify via another method. For example, if you are emailing, ask them to call you and use the phone verification methods.

When providing access to an online application or system, in addition to a password or passphrase (“something you know”) you can also require a token (“something you have”). The use of IU Login and Two-Step Login (Duo) make online logins more secure. If technically feasible, the central authentication service (CAS) must be usedfor all services that access limited-access data on university servers, and use password tokens for any update access to restricted data on university servers.

Verifying through social media is not recommended. It is too easy to create fake accounts and profiles, and, the information shared in these environments is meant to be shared! Thus, they are not good forums for sharing verification data protected by information security and privacy law, such as identification documents and numbers.

One method of having the individual provide “something you have” is to request a faxed photo ID, like a driver's license. Don't do this unless it is absolutely required for the service you are providing, because you will end up with a copy of sensitive data protected by privacy laws. Usually then you will also require the address on the faxed ID to match your existing records, or require multiple forms of verification to be provided.

A higher level of assurance is gained if you fax a test blank form or info page to the number you have, and asking the person to email or call you back, or to fill out the form and fax it back.

Identity verification: Personal Preparedness: Information Security & Policy: Indiana University (2024)

FAQs

What are the three methods for verifying someone's identity? ›

6 Identity Verification Methods: How to Prove They're Who They Say They Are
  • Knowledge-Based Authentication. Knowledge-based Authentication is a system that utilizes something the person knows, like their PIN number or password. ...
  • Credit Bureau Based Authentication. ...
  • Database Methods. ...
  • Online Verification.

What documents can be used to verify identity? ›

You can use any document from the following list:
  • State identification (ID) card.
  • Driver license.
  • US passport or passport card.
  • US military card (front and back)
  • Military dependent's ID card (front and back)
  • Permanent Resident Card.
  • Certificate of Citizenship.
  • Certificate of Naturalization.

What is included in identity verification? ›

Details that will be checked by identity verification services can include photo (facial recognition), address, date of birth, qualifications, social security number, phone number, and more.

What is the difference between identity verification and identity authentication? ›

Identity verification usually involves some official form of documentation, such as government IDs, and/or a live photo that proves a person's physical identity. Authentication may not be tied at all to the person's physical identity; it can use information such as passwords or possession of a code or key.

What is the process of verifying the identity of a user or process? ›

Authentication is verifying the identity of a user or computer system. The authentication process is done to verify that the person using the system or requesting access to it is who they claim to be.

What are the 2 main verification methods? ›

There are two main methods of verification:
  • Double entry - entering the data twice and comparing the two copies. This effectively doubles the workload, and as most people are paid by the hour, it costs more too.
  • Proofreading data - this method involves someone checking the data entered against the original document.

Why can't my identity be verified online? ›

You did not enter a SSN on your form. You have a limited credit history. You are the victim of identity theft. You have a security freeze on your credit.

What are examples of identity authentication? ›

Examples include fingerprint scanners, facial recognition technology, iris or retina scanners, and even DNA analysis. Biometrics provide a high level of security as these characteristics are difficult to replicate or falsify.

What is identity verification in information security? ›

The process of confirming or denying that a claimed identity is correct by comparing the credentials (something you know, something you have, something you are) of a person requesting access with those credentials previously proven and stored in the PIV Card or system and associated with the identity being claimed.

What is the strongest form of identity authentication? ›

Physical security key

A physical authentication key is one of the strongest ways to implement multifactor authentication. A private key, stored on a physical device, is used to authenticate a user, such as a USB device that a user plugs into their computer while logging in.

How to authenticate identity? ›

What are Authentication Factors? Typically, an individual's identity is authenticated through the use of one or more factors, such as a personal identification number (PIN), password, or some other factor known or possessed only by the authorized user.

Why do I need to verify my identity? ›

It's about protecting you from scammers who may try to set up an account in your name to access your information and benefits. After you verify your identity, you won't have to do it again for that account unless you lose access to your account's multifactor authentication method or need to recreate your account.

What is the difference between verification and authentication? ›

Although they both aim to protect digital identity, there is a clear difference between authentication and verification. Authentication guarantees that a user trying to access an account has permission to do so. On the other hand, verification validates that the information that the user provided is indeed authentic.

What is the difference between authorization and verification? ›

- Authorization determines WHAT someone or something is allowed to do. Authentication determines the identity of persons, applications or devices and verification ensures that this identity is authentic. Finally, authorization specifies what access rights can be granted by the system.

What are the three types of authentication? ›

There are three authentication factors that can be used: something you know, something you have, and something you are. Something you know would be a password, a PIN, or some other personal information.

Is identity verification the same as multi factor authentication? ›

Identity verification helps us make sure only you can create your sign-in account—and no scammer can create one in your name. Multifactor authentication (MFA) is an extra layer of protection that's part of the process of signing in to use your account.

Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 6283

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.