Trusted Digital Identity

​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​Enabling swift and secure multi-channel Trusted Digital Identities

Digital identity

To ensure their position in a future landscape, MNOs, OEMs and service providers need to claim new territory in the digital market, cut operational costs, and attract new customers. This can be achieved by establishing seamless and entirely digital customer journeys. A Trusted digital identity is the key to securing these journeys and to opening up a wealth of access for customers to security-sensitive services.

​What is a Trusted Digital Iden​tity?

To begin with, a digita​l ID is the technological link between a real entity such as a person and its digital equivalent entities. It includes a collection of electronically captured and stored identity attributes including biographic and biometric data.

People own many digital identities that consist of an email address and a password to access different online services. In some cases, such as engaging with media o​r entertainment, we may access social media using a pseudonym to reveal less about our identity. But when it comes to certain areas, like government services and banking, it’s critical that you are who you claim to be: IDs need to be trusted.

A Trusted Digital Identity is created when the information provided has been verified, or checked for authenticity.

A trusted digital ID consist of a set of verified attributes (like verified ID documents or biometrics), thus providing a certifiable link between an individual an​d their digital identity. These attributes may also include verification with third parties such as Government databases, social identity, credit card number or mobile records.

​For MNOs, OEMs and other enterprises, trusted digital IDs mean smoother digital workflows, faster customer acquisition processes and consistent customer data. Operating costs are reduced and the customer experience enhanced. Moreover, a Trusted Digital Identity can serve as a gateway for subscribers to access multiple security-sensitive services such as mobile money, eGov and online banking, allowing MNOs to take a lead in these fast growing sectors.

Leveraging our unrivalled experience across fields such as identity verificationbiometrics and mobile services, we integrate all the technologies needed to seamlessly capture and verify user identities, and then digitalize them securely. As a result, MNOs, OEMs and other enterprises will be able to accelerate their digitalization strategies, launch new services, fight fraud and meet regulations.

​How to create a Trusted Digital Identity?​

A trusted digital ID is created by conducting three general steps: capture, verify, digitalize. The details of each step may vary according to the extent of the information the MNO wishes to capture and the regulations they are subject to, for example, around personal data privacy.

  1. ​​​​Ca​​pture
  2. Verify 
  3. ​​​Digitalize ​
verify identity: capture 
Identity checking 
Digitalize: digital identity 
​ ​​

1. Capture

In-store or remotely, identity attributes are captured. Those attributes are ID documents such as passports, driving licenses, ID cards and also biometrics such as faces. The hardware needed can range from a mobile phone to specialized high end scanners.

Read more

2. Verify

Identity verification aims to verify the authenticity of the end user ID document and validates if the person is who they claim to be. This may require a combination of solutions, depending on the level of assurance needed.
Read​​ more


3. ​Digitalize

After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user's digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. ​
Read more​

​ ​

1. How to capture ID documents and biometrics?​

identity checking: capture ID documents

Capture ID do​cuments

The subscriber's ID information is captured from an identity document (passport, driver's license, or national ID, resident permits etc.). In this process, information such as name and birthdate can be extracted through image analytics (optical character recognition). This technology helps ensure that accurate and detailed customer information is entered in the CRM.

Identity checking: capture biometricsCapture biometr​ics

A biometric capture device (such as a mobile phone, web camera, tablet or kiosk or specialized fingerprint scanner) is used to capture the user's biometric information. Types of biometrics that can be collected include information from the face or fingerprint.​


​​2. How to verify ID documents and biometrics? ​

identity checking: verify the authenticity of an ID document

Verif​​y identity

After it has been captured, the system verifies the authenticity of an ID document with dedicated software. Different methods can be used to check security features of the provided identity document against an ID database. In this phase, the personal information of the card holder can also be extracted to automatically populate the fields in registration forms, the CRM, etc. This results in a faster and simpler onboarding process for customers, as well as time savings and greater data accuracy for MNOs.

There are different levels of document verification: standard, based on ID picture from visible light, advanced with security features existing in white, infra-red and ultra violet and chip-based with electronic document verification.

Identity checking: verify biometrics​​Verify bi​​ometrics

Biometric technology is used to verify if the person presenting the document is who they claim to be. It also presents an opportunity for later use as simple and modern way to access serv​ices that require identification — and in particular when verification needs to be conducted remotely. 

Two technologies most commonly used are for instance facial recognition and fingerprint scans:

​​3. How is a digital ID created​?

Digitalize: digital IDDigitalize

After a match is established between the biometric data and the identity document, a digital ID may be created. Going forward, the user’s digital ID can be used to easily log in to the service. The user can gain access by simply presenting the requested biometric attribute, such as their fingerprint. This function enables users to seamlessly access the MNO’s services or third party services.

ID Verification

ID Verification:
Capture and Verify​

Fighting identity fraud while complying with national ID registration regulations is a major challenge for mobile operators. Gemalto multi-channel Identity Verification Service helps you reduce fraud linked to the use of fake IDs during a smooth customer enrollment process.

Identity Verification ​services
for Mobile Operators​

Mobile ID

Mobile ID​: Digitalize, Authenticate a​nd Sign​

There is a critical need to bring convenience and trust to digital authentication. With Mobile ID, Gemalto offers an unprecedented, single means of authentication to securely access online services, confirm transactions and sign documents.

Solutions for a single and secure
digital identity

  • Why fighting identity fraud is critical for MNOs

    Why is fighting ID fraud crucial for CFOs and fraud departments of Mobile Network Operators? What are the impacts in terms of revenues, reputation, regulations? Find out how to put things right, with an ID verification service relying on our expertise in telecommunication and government sectors.

    Watch video

Mobile ID

Mobile Software Security​​

Gemalto in-app security solutions rely on a systematic approach for many use cases such as mobile banking, mobile payment, mobile government, mobile enterprise and much more. We help industries and government to build greater trust in the mobile ecosystem.

Building trust in mobile apps

Data Protection

Identity & Data Protection Services

The explosion of corporate cloud and authentication services represents a massive opportunity for mobile network operators to enlarge their business service offers. Discover Gemalto’s offers powered by SafeNet.

D​eliver trusted authentication and cloud data protection solutions

backup and mobile protection

Personal Cloud​​

Gemalto helps mobile operators to maximize customer value by providing trustful mobile protection services to mobile users. The offer includes backup and mobile protection.

Secure all mobiles' backup. In the Cloud.