Trusted identity

Multi-document verification in a digital world

Share this post:

Nearly everyone has some form of Government Issued Identity Instrument (G3I). Even though a driver’s license conveys the privilege to operate certain types of vehicles, it is also the most commonly used form of G3I.

The table below lists several use cases and indicates whether an actual driver’s license (DL) or a G3I document is required and how many documents are needed:

Use Case DL Required G3I Required Documents Required
Nightclub Bouncer No Yes 1
Bank Account Creation No Yes 1
School Campus Defender No Yes 1
Airport Control No Yes 1
Vending Machine Age Verification Yes No 1
Traffic Stop Yes No 2
Traffic Accident Yes No 3
Retail Merchant No Yes 1
Car Rental Yes No 2
Hospitality Check-in No Yes 1
Online Authentication No No 1 or more
Prescription Drug Procurement No Yes 1 or more
Notary No Yes 1
Automobile Dealership Yes No 2
Post Office Box Key Pickup No Yes 2
Medical Office Visit No No 1


Note that whenever a driver’s license is the required form of identification, it is often presented with additional documents. The handling and processing of multi-documents for verification activities is easier, faster, and safer in the digital identity era.

A traffic accident exchange

Consider the example of a traffic accident. The law enforcement officer asks for at least two and perhaps three documents: a driver’s license, vehicle registration, and depending upon your state, a proof of auto insurance. Most of us must dig through the glove box to extract the physical registration and auto insurance cards — assuming we remembered to put the up to date versions into the vehicle. The officer must juggle the various documents and record the necessary information from each one. In the digital identity era you provide the information from all documents in one easy and secure electronic exchange.

With IBM Mobile Identity (MI), all three documents are securely stored on your smartphone. The latest versions of these documents are always available so you won’t scramble to find them. You can select the exact documents and identity traits to share with the law enforcement officer. The exchange of information between the phones is quick and secure.

In a hostile situation, the officer can remain at a safe distance while the information is exchanged. The officer’s official picture is displayed on the your device at the beginning of the information exchange. This assures you that his authority to request information was issued by the State. Everyone’s safety is improved by verifying identities, speeding up the exchange process, and getting people and vehicles out of further harm’s way.

Join the IBM Mobile Identity ecosystem.

Contact an IBM Blockchain Trusted Identity expert today

DE / CTO Trusted Identity, Blockchain Technologies - IBM Industry Platform

Richard Redpath

Trusted Identity, Blockchain IBM Industry Platform

Becky Gibson

Accessibility Consultant

More Trusted identity stories

Heightened focus on security for public sector agencies

Technology innovations like IoT, autonomous systems and mobile solutions invariably bring with them increased risks and security threats. Today’s news cycle features a constant stream of stories on hackers commandeering household nanny-cams, smart thermostats and video-enabled doorbells. The expansion of the Internet of Things has dramatically increased the attack surface. As the number of connected […]

Continue reading

Brewing blockchain: Tracing ethically sourced coffee

A survey by the National Coffee Association finds that 64 percent of Americans, age 18 and over, drink coffee daily. After factoring in the less-caffeinated casual coffee drinker, this results in 400 million cups of coffee consumed daily in the United States. That may seem like a lot, until compared with most European countries who […]

Continue reading

How do we start tackling the existing identity problem?

Identity and control of personal identity is top of mind, given recent events as well as the European Union’s General Data Protection Regulation (GDPR). A lot of our identity is shared without our explicit consent, gets stored in locations we are unaware of, and when compromised creates tremendous setbacks. Almost everything we do in the […]

Continue reading