Trusted identity

Identity requests: Let us count the ways

Share this post:

We use our identity documents many times per week without much thought. Verification of our identity or a specific privilege tied to our identity is so commonplace that we rarely question the request. Essentially, identity interactions are part of our daily life experiences. While most people in the US use a driver’s license, any form of Government Issued Identity Instrument (G3I) is sufficient to satisfy most identity requests. Examples of G3Is include national ID card, passport, driver’s license, state ID card, military ID and voter ID card.

Before we can migrate identities to the digital world we must understand the many use cases.

There are three main types of identity requests:

  • Verification of identity
  • Verification of age
  • Verification of identity and associated driving privileges

Proof of identity

Proving that you are actually the person whom you claim to be is one of the most prevalent reasons for identity verification.

  • Air travel – An individual must present a G3I to a security control agent. The agent scans the G3I to determine its validity and visually binds the G3I to the holder via the portrait. Back-end systems perform travel security clearance searches using the information from the G3I.
  • Hotel stay – Hotel staff may require travelers to present a G3I as a precondition of check-in. This validates the individual with the reservation and confirms the ownership of the credit card being presented for payment.
  • Prescription pick-upMany US states require proof of identification when purchasing prescription drugs. The consumer must present a valid G3I. Depending on the drug, a pharmacist may require multiple forms of identifying proof of name, address, and photo. Additionally, many states have reporting requirements on the pharmacist.
  • Medical office visit – Patient needs to present proof of healthcare insurance coverage and proof of identity.
  • School campus entry – Many school districts verify the identity of campus visitors. A visitor inserts his or her G3I into a scanner which then validates the individual’s G3I and checks the individual against the National Offender database. The objective is to stop unwanted or unknown individuals from entering the campus.
  • New bank account – Federal law requires financial institutions to obtain information that identifies each individual who opens an account. The individual must provide Identity traits such as name, address, date of birth, and other information as well as a G3I for proof of identity.
  • Post office box key pickup – When renting a post office box, a person must present two current forms of ID. One must include a photo and the other a residential address. Acceptable forms of ID are specified by the US Post Office.

Identity and proof of age

Proving our identity and age to participate in age restricted activities is a common type of verification request.

  • Nightclub entry – A local night club wants to avoid expensive fines for allowing entrance to underage customers. It screens patrons at the door to verify that they are of legal drinking age and that the presented G3I is valid.
  • Retail purchases – In locations where the sale of alcohol and tobacco are age restricted, the consumer must present a G3I to the merchant as proof of age.
  • Car rental – In addition to verifying driving privileges, most car rental companies require the renter to be over a threshold age and use the driver’s license for age verification.
  • Vending machine purchases – Retail vending machines of lottery tickets (USA) and liquor (Japan) require a driver’s license for age verification. This is one of the only cases where a driver’s license is required for a non-vehicle related verification.

Identity and associated driving privileges

There are only a few cases where a driver’s license is the required form of G3I and they are associated with vehicles and driving privileges. An additional document is almost always required in these situations.

  • Traffic stop – A police officer performs a roadside stop to identity the driver of a vehicle and his or her privileges. The driver must present a valid driver’s license and a vehicle registration document.
  • Traffic accident – The police officer requests multiple forms of identification from each party associated with the accident. The requested documents are a driver’s license, vehicle registration, and in many states proof of vehicle insurance.
  • Car rental – A person renting a vehicle must present proof of identity, valid proof of driving privileges for that vehicle class, and optionally proof of insurance if he or she desires to decline company provided insurance.
  • Automobile purchase – Car dealers validate identity and driving privileges to avoid fraud during the sale of a vehicle and title transfer.

Any digital identity solution must handle these use cases and adapt to future needs. Identity verification needs to be fast, convenient, secure and unalterable, all while protecting citizen privacy. Find out how IBM Mobile Identity achieves this goal.

Contact an IBM Blockchain Trusted Identity expert today

DE / CTO Trusted Identity, Blockchain Technologies - IBM Industry Platform

Becky Gibson

Accessibility Consultant

More Trusted identity stories

The internet’s next step: The era of digital credentials

Imagine being able to rid your wallet of a driver’s license, an insurance card, a student or employee ID and more. Imagine not having to worry about losing your passport and vaccination records on a trip abroad, or about the authenticity of the designer shoes you just purchased. This and much more is possible with […]

Continue reading

Automating workplace vaccination verification — a path out of the pandemic

Workplace vaccination mandates are coming for employers. In the United States, The Department of Labor’s Occupational Safety and Health Administration (OSHA) recently released a rule on requiring all employers with 100 or more employees to ensure their workforce is fully vaccinated or require any workers who remain unvaccinated to produce a negative test result on […]

Continue reading

Blockchain to transform insurance value chain

The insurance industry at its core is built on the legal promise to pay a compensation in case of a loss. Trust is at the core of this promise. However, the level of trust consumers have on their insurance provider is average. The IBM Institute for Business Value (IBV) surveyed 1,100 business insurance executives in 34 countries […]

Continue reading