Quickly being able to confirm someone is who they claim to be ultimately leads to faster purchase approvals, a better customer experience and quicker revenue for you. The key is to do this without increasing your costs or putting your customer’s identity at risk.
We offer two knowledge-based authentication (KBA) solutions, both based on an out-of-wallet questions process, that businesses can use to establish trust with their consumers and then maintain this trust throughout the entire customer lifecycle. Use them individually, or together, to expand your out-of-wallet authentication capabilities.
- ExpectID IQ – verify consumers and generate out-of-wallet KBA questions based on IDology’s data sources
- ExpectID Enterprise – create custom out-of-wallet KBA questions using internal proprietary data behind your firewall
Knowledge-Based Authentication Infographic: The Difference Between Static, Dynamic & Enhanced KBA
Knowledge based authentication, also known as KBA, is a type of authentication which looks to prove that the person providing identity information truly is that exact person. As its name suggests, KBA is based on some sort of knowledge the individual has. Knowledge based authentication continues to get more sophisticated in order to keep information and access in the right hands.
There are three different forms of KBA – static, dynamic and enhanced KBA.
Static and Dynamic KBA
Static KBA methods allow users to select security questions and provide answers that are stored by a company and accessed later, usually when a password needs to be retrieved or reset. Dynamic KBA, on the other hand, goes a step further by generating questions that apply only to the intended end user and do not require a previous relationship with the customer. These types of questions have also been called “out-of-wallet” as the content is generated from information within a person’s credit history or public records. Therefore, the answers could not be found in a wallet or purse, making it difficult for anyone other than the actual person to know the answer.
Increase Protection with Enhanced Dynamic KBA
Enhanced dynamic KBA goes even further by using your proprietary data collected that is stored behind your firewall to create custom security questions for your customers. This gives you a complete end-to-end authentication solution so you can verify new and existing customers online.
The FTC issued a letter approving the use of KBA as a method of obtaining prior verifiable parental consent under the Children’s Online Privacy Protection Act (COPPA).
For more information on Knowledge Based Authentication, check out our infographic below! Click on the image to expand the infographic.
Click below to embed this infographic into your website
|<img src= https://www.idology.com/wp-content/uploads/2014/05/KBA-Knowledge-Based-Authentication-infographic_idology_lrg.jpg /> <br><a href=https://www.idology.com/knowledge_based_authentication_KBA_infographic title=” Knowledge Based Authentication Infographic: Difference between Static, Dynamic & Enhanced KBA ” width=”550″> Knowledge Based Authentication Infographic: Difference between Static, Dynamic & Enhanced KBA </a>|