Trusted identity

Safely vetting a digital driver’s license

Share this post:

As the adoption of mobile driver licenses (mDL) evolves, the safety of law enforcement must be taken into consideration. When an officer pulls over a driver and approaches the vehicle the officer must not be distracted so that he or she can have “eyes on the driver” at all times. In these situations, the officer will eventually gather the identity credentials from the driver for verification. This gathering activity must be thorough yet not a distraction to the officer.

The vetting of a drivers license is not simple so it is not something that should be performed during face-to-face encounters when physical risk is high. During the vetting of paper or plastic driver licenses, the officer will typically return to the police car with the driver’s credentials to perform the required verification processes. Some law enforcement agencies are advocating that verification activity of mobile driver licenses should also be performed within the safe surroundings of the police vehicle. Unfortunately, there remains a disconnect between this officer safety requirement and mDL vendor solutions.

Let’s solve digital identity together

Some vendors and government agencies are advocating the use of a mDL reading device that would essentially take a picture of the credentials rendered on the driver’s mobile phone display so that the reader could transmit the image back to a DMV system for verification. This has a number of issues. For starters, this approach is not realistic when connectivity to the DMV is not possible. Additionally, taking a picture of a phone display with another device is a safety issue for the officer. Aside from the need to deal with Moire Pattern Issues and the difficultly of snapping an image when the devices are typically shaking, this gathering process significantly preoccupies an officer and thereby fails to meet the aforementioned safety requirement.

IBM Mobile Identity provides the flexibility to allow verifiers to compress or decompress the data gathering user interface tasks. During an identity challenge where the safety of a verifier is not a concern, the decompressed workflow allows the identity owner and the verifier to go through several steps of verification. First, both parties can verify that the portraits associated with the devices match the individuals participating in the challenge transaction. Second, the devices securely exchange request and response data using peer-to-peer communications.

Conversely, during an identity challenge where the safety of an officer is a concern, IBM Mobile Identity can be configured to use a compressed data exchange workflow. IBM refers to this compressed workflow as No Eyes Off Authentication or Neo-Authentication. Furthermore, given the peer-to-peer communications support, the Officer can place his device in request mode, put the device in his pocket (or somewhere on uniform) and then approach the vehicle with both hands free. As a result, this approach is actually safer than the officer reaching his or her hand out to receive the plastic driver’s license.

Imagine that a citizen at a traffic stop is asked by an officer standing outside the car to present his or her Driver’s License. The citizen can simply use an App for the license on their phone and press a button for the officer to receive the officer’s request.

The citizen does not hand over their phone, the officer does not take eyes off the citizen but receives a beep and vibrate when the requested personal identification information is received. At that point the officer can return to his or her vehicle to perform verification processing. The owner doesn’t need a connection over the Internet since this solution supports peer-to-peer communications from up to 20 meters away to exchange information.

Essentially, No Eyes Off Authentication support within IBM Mobile Identity offers a safer driver vetting process than our law enforcement has today.

Contact an IBM Blockchain Trusted Identity expert today

DE / CTO Trusted Identity, Blockchain Technologies - IBM Industry Platform

Richard Redpath

Trusted Identity, Blockchain IBM Industry Platform

More Trusted identity stories

Blockchain to transform insurance value chain

The insurance industry at its core is built on the legal promise to pay a compensation in case of a loss. Trust is at the core of this promise. However, the level of trust consumers have on their insurance provider is average. The IBM Institute for Business Value (IBV) surveyed 1,100 business insurance executives in 34 countries […]

Continue reading

Heightened focus on security for public sector agencies

Technology innovations like IoT, autonomous systems and mobile solutions invariably bring with them increased risks and security threats. Today’s news cycle features a constant stream of stories on hackers commandeering household nanny-cams, smart thermostats and video-enabled doorbells. The expansion of the Internet of Things has dramatically increased the attack surface. As the number of connected […]

Continue reading

Brewing blockchain: Tracing ethically sourced coffee

A survey by the National Coffee Association finds that 64 percent of Americans, age 18 and over, drink coffee daily. After factoring in the less-caffeinated casual coffee drinker, this results in 400 million cups of coffee consumed daily in the United States. That may seem like a lot, until compared with most European countries who […]

Continue reading