Trusted identity

Identity requests: Let us count the ways

Share this post:

We use our identity documents many times per week without much thought. Verification of our identity or a specific privilege tied to our identity is so commonplace that we rarely question the request. Essentially, identity interactions are part of our daily life experiences. While most people in the US use a driver’s license, any form of Government Issued Identity Instrument (G3I) is sufficient to satisfy most identity requests. Examples of G3Is include national ID card, passport, driver’s license, state ID card, military ID and voter ID card.

Before we can migrate identities to the digital world we must understand the many use cases.

There are three main types of identity requests:

  • Verification of identity
  • Verification of age
  • Verification of identity and associated driving privileges

Proof of identity

Proving that you are actually the person whom you claim to be is one of the most prevalent reasons for identity verification.

  • Air travel – An individual must present a G3I to a security control agent. The agent scans the G3I to determine its validity and visually binds the G3I to the holder via the portrait. Back-end systems perform travel security clearance searches using the information from the G3I.
  • Hotel stay – Hotel staff may require travelers to present a G3I as a precondition of check-in. This validates the individual with the reservation and confirms the ownership of the credit card being presented for payment.
  • Prescription pick-upMany US states require proof of identification when purchasing prescription drugs. The consumer must present a valid G3I. Depending on the drug, a pharmacist may require multiple forms of identifying proof of name, address, and photo. Additionally, many states have reporting requirements on the pharmacist.
  • Medical office visit – Patient needs to present proof of healthcare insurance coverage and proof of identity.
  • School campus entry – Many school districts verify the identity of campus visitors. A visitor inserts his or her G3I into a scanner which then validates the individual’s G3I and checks the individual against the National Offender database. The objective is to stop unwanted or unknown individuals from entering the campus.
  • New bank account – Federal law requires financial institutions to obtain information that identifies each individual who opens an account. The individual must provide Identity traits such as name, address, date of birth, and other information as well as a G3I for proof of identity.
  • Post office box key pickup – When renting a post office box, a person must present two current forms of ID. One must include a photo and the other a residential address. Acceptable forms of ID are specified by the US Post Office.

Identity and proof of age

Proving our identity and age to participate in age restricted activities is a common type of verification request.

  • Nightclub entry – A local night club wants to avoid expensive fines for allowing entrance to underage customers. It screens patrons at the door to verify that they are of legal drinking age and that the presented G3I is valid.
  • Retail purchases – In locations where the sale of alcohol and tobacco are age restricted, the consumer must present a G3I to the merchant as proof of age.
  • Car rental – In addition to verifying driving privileges, most car rental companies require the renter to be over a threshold age and use the driver’s license for age verification.
  • Vending machine purchases – Retail vending machines of lottery tickets (USA) and liquor (Japan) require a driver’s license for age verification. This is one of the only cases where a driver’s license is required for a non-vehicle related verification.

Identity and associated driving privileges

There are only a few cases where a driver’s license is the required form of G3I and they are associated with vehicles and driving privileges. An additional document is almost always required in these situations.

  • Traffic stop – A police officer performs a roadside stop to identity the driver of a vehicle and his or her privileges. The driver must present a valid driver’s license and a vehicle registration document.
  • Traffic accident – The police officer requests multiple forms of identification from each party associated with the accident. The requested documents are a driver’s license, vehicle registration, and in many states proof of vehicle insurance.
  • Car rental – A person renting a vehicle must present proof of identity, valid proof of driving privileges for that vehicle class, and optionally proof of insurance if he or she desires to decline company provided insurance.
  • Automobile purchase – Car dealers validate identity and driving privileges to avoid fraud during the sale of a vehicle and title transfer.

Any digital identity solution must handle these use cases and adapt to future needs. Identity verification needs to be fast, convenient, secure and unalterable, all while protecting citizen privacy. Find out how IBM Mobile Identity achieves this goal.

Contact an IBM Blockchain Trusted Identity expert today

DE / CTO Trusted Identity, Blockchain Technologies - IBM Industry Platform

Becky Gibson

Accessibility Consultant

More Trusted identity stories

Heightened focus on security for public sector agencies

Technology innovations like IoT, autonomous systems and mobile solutions invariably bring with them increased risks and security threats. Today’s news cycle features a constant stream of stories on hackers commandeering household nanny-cams, smart thermostats and video-enabled doorbells. The expansion of the Internet of Things has dramatically increased the attack surface. As the number of connected […]

Continue reading

Brewing blockchain: Tracing ethically sourced coffee

A survey by the National Coffee Association finds that 64 percent of Americans, age 18 and over, drink coffee daily. After factoring in the less-caffeinated casual coffee drinker, this results in 400 million cups of coffee consumed daily in the United States. That may seem like a lot, until compared with most European countries who […]

Continue reading

How do we start tackling the existing identity problem?

Identity and control of personal identity is top of mind, given recent events as well as the European Union’s General Data Protection Regulation (GDPR). A lot of our identity is shared without our explicit consent, gets stored in locations we are unaware of, and when compromised creates tremendous setbacks. Almost everything we do in the […]

Continue reading