Select Page

Remote IDentity Proofing good practices

by | Identity Verification

 

Over the past decade, we’ve experienced an unprecedented digital revolution that has brought numerous benefits to both society and the European economy. It has facilitated trade, remote service delivery, and the creation of new market niches and business opportunities. The pandemic further highlighted the importance of well-regulated and standardized remote identification processes, as well as digital identities trusted by both public and private organizations. These aspects are also emphasized in the planned review of the eIDAS regulation (eIDAS 2.0), which will provide EU citizens with secure and transparent access to a new generation of electronic services, including the EU Digital Identity Wallet (EUDIW).

Remote Identity Proofing (RIDP) is a key function for most services envisaged in this context, thus intensifying the need for secure remote identity verification services that can be deployed quickly, at scale, and cost-effectively. This is because it is a key enabler for electronic transactions in the Digital Single Market.

However, the emergence of increasingly sophisticated cyber-attacks raises concerns about the reliability of the technology behind RIDP processes, pushing us to improve in areas such as awareness, risk analysis, and the development of robust countermeasures.

Through this article, we aim to provide professionals in the field with an updated insight into best practices for strengthening the security of remote identity verification methods, crucial for safely driving the European digital transformation.

To do this, we will analyze the recent best practices report regarding the Identity Proofing process published by ENISA, the European Agency for Cybersecurity.

 

Report on good practices for identity verification control

The main drivers behind ENISA’s creation of this report are the emergence of new threats and identity spoofing attacks, which breed distrust and concern regarding the reliability of identity verification technologies, as well as the request from various interested organizations and companies for information and guidance on implementing best practices in the use and implementation of these technologies.

Therefore, with this report, ENISA aims to achieve the following strategic objectives in the field of trusted services and electronic identification:

  1. Increase awareness among the various stakeholders involved.
  2. Assist in risk analysis practices, given the changing threat landscape in identity verification.
  3. Contribute to the development of robust countermeasures, enhancing the trust and reliability of remote identity verification methods (RIDP).

Evolution of Remote IDentity Proofing processes (RIDP)

Regarding RIDP methods (remote identity verification), it’s important to note that not all offer the same level of security and trust. Some rely solely on verifying identity documents, while others include capturing and validating user biometric data. This has direct implications for the level of assurance they can provide.

For example, methods solely based on capturing and validating identity documents may be susceptible to attack instruments such as forgery or manipulation of these documents, both physically and digitally.

In contrast, methods incorporating user biometric verification, such as capturing the face for facial recognition, offer a higher level of assurance by being able to more confidently link digital identity with the real identity of a physical person.

Furthermore, these developments are particularly relevant in the context of eIDAS 2.0 and the introduction of the EU Digital Identity Wallet (EUDIW), as the cases requiring identity verification with a high level of security will significantly increase.

Additionally, standardization bodies such as CEN, ETSI, and ISO are developing standards and technical requirements related to biometric security, presentation attack detection (PAD) testing, and remote identity verification methods. These efforts will contribute to establishing a common and coherent framework at the European level to address the security challenges posed by RIDP.

 

Summary of remote identity verification methods

 

MethodDescription
Videocall with operator

The applicant submits personal information and is then interviewed by a human operator through a video conferencing system.

Videocall with operator, assisted by software

A videocall is conducted with a human operator, while software (including AI) may be used to assist or streamline the collection of information. The human operator conducts the process and takes the decisions.

Fully automated with photo/video

The applicant’s identity is verified through face photo/video with fully automated methods, without any intervention by a human operator.

Fully automated with photo/video, reviewed by operator for low score

The applicant’s identity is verified as in the ‘fully automated’ method; a review by a human operator takes place in cases where the assurance level of the recognition software falls below a pre-established threshold.

Unattended with photo/video, reviewed by operator (hybrid)

The applicant’s identity is verified as in the ‘fully automated’ method; a review by a human operator takes place in all cases.

Electronic identification means

The electronic identity provided by identity providers (e.g. financial institutions) is used, taking advantage of the identity proofing already performed by them in the past.

X.509 certificate-based

This method is based on an internal or third-party trust service, where evidence is based on the possession of the private key of an X.509 certificate, and the person’s identification data is retrieved from the certificate, issued through a physical face-to-face process.

Combined methods

A combination of any of the above methods in a single identity proofing process, in order to increase security and the level of assurance.

 

Emerging threats to Remote IDentity Verification (RIDP)

Two categories of attacks stand out for their relevance and difficulty of detection: presentation attacks and injection attacks, targeting both the subject’s face and identity documents.

Presentation Attack Detection (PAD)

Presentation Attack Detection involves the combination of software and/or hardware methods enabling a biometric system to detect attempts of identity spoofing during the biometric data capture phase.

In the case of presentation attacks against the face, researchers have identified tools such as 3D masks, high-quality prints, video screens, and deepfakes. Attack methods include directly presenting these tools to the verification system, as well as more sophisticated techniques like using Generative Adversarial Networks (GANs) to generate realistic synthetic images.

 

Injection Attack Detection (IAD)

Injection Attack Presentation involves the combination of software and/or hardware methods enabling a biometric system to detect attempts of identity spoofing immediately after biometric capture.

Injection attacks against the face focus on identity spoofing through the injection of false biometric data during live capture. Instruments such as modified cameras, video playback devices, and deepfake software come into play here. Attack methods encompass injecting this data through APIs, in real-time, or asynchronously.

 

Attacks on Identity Documents

Concerning attacks on identity documents, attempts to forge or manipulate the data contained in these documents are examined, whether physically (e.g., altering real documents) or digitally (e.g., identity spoofing through synthetic documents: synthetic identity fraud).

A key aspect emphasized is the growing availability of tools and computational resources that enable the scaling and automation of such attacks, posing an increasingly significant risk to the reliability of RIDP processes.

Given this constantly evolving threat landscape, it is crucial for remote identity verification service providers to implement a set of robust best practices to effectively mitigate these risks.

pin

Mobbeel’s AI-based technology has been trained to detect various identity spoofing threats, including presentation attacks, injection attacks, or manipulations of identity documents.

Our identity proofing solution, MobbScan, has been certified and included in the Catalog of Products and Services of Security of Information and Communication Technologies (CPSTIC), confirming its compliance with the highest security requirements set by the National Cryptologic Center (CCN) in the HIGH category of the National Security Scheme (ENS).

Good practices for reinforcing RIDP Security

The countermeasures proposed by ENISA are organized into six main categories:

      1. Environmental Controls: These controls focus on the physical and digital environment in which the RIDP process takes place, aiming to minimize risks associated with factors such as lighting, backgrounds, distance, and camera quality, among others.
      2. Presentation Attack Detection (PAD) Controls: These measures concentrate on implementing advanced techniques for detecting attempts of biometric spoofing, such as texture analysis, motion analysis, reflectance analysis, and other indicators or liveness detection tests that prove the presence of a real person in front of a camera.
      3. Injection Attack Detection (IAD) Controls: Complementing PAD controls, these practices aim to identify attempts to inject false biometric data during live capture.
      4. Identity Document Controls: These measures focus on the verification and validation of identity documents presented during the RIDP process. Key practices include checking official document records, reading NFC chips (when available), and detecting alterations or forgeries.
      5. Procedural Controls: This set of practices addresses aspects related to workflow and user interactions during the remote identity verification process. Some key recommendations include requesting multiple pieces of evidence, conducting live sessions, and following standardized protocols.
      6. Organizational Controls: Finally, this group of best practices focuses on governance, policies, and processes at the organization level that provides the RIDP service. They include establishing clear roles and responsibilities, staff training, incident management, and continuous monitoring of emerging threats.

An important aspect highlighted is that, given the increasing sophistication of threats, it is no longer sufficient to rely solely on reactive or detection approaches. Instead, there is an emphasis on the need to implement preventive measures that hinder the success of attacks.

Some of the key practices mentioned include checking the status of identity documents in official records, reading NFC chips to validate holder information and the biometric photo, and the combined use of presentation and injection attack detection techniques.

 

Control categoryKey good practices
Environmental controls
  • Adequate lighting
  • Neutral backgrounds without distractions
  • Optimal distance and capture angle
  • Quality camera and microphone
PAD controls
  • Texture and motion analysis
  • Detection of signs of vitality
  • Reflectance and heat testing
  • Combination of multiple techniques
IAD controls
  • Detection of impersonation attempts
  • Analysis of movement patterns
  • Cross-verification with biometric data
  • Monitoring of user behavior
Document controls
  • Validation with official records
  • Reading NFC chips (when available)
  • Detection of alterations and forgeries
Procedural controls
  • Requesting multiple pieces of evidence
  • Live verification sessions
  • Following standardized protocols
Organisational controls
  • Clear roles and responsibilities
  • Staff training
  • Incident management
  • Continuous monitoring of threats

 

However, the report also highlights certain challenges in implementing some of these practices. For example, the lack of centralized and updated records of identity documents at the EU level, and regulatory inconsistencies regarding the reading of NFC chips by private entities (trusted service providers and RIDP).

These obstacles reflect broader concerns related to the fragmentation of the regulatory framework among the Member States, which can affect the safe and consistent adoption of remote identity verification methods across Europe.

In summary, this set of best practices, organized into different control areas, aims to strengthen both the trust and reliability of remote identity verification services. Additionally, relevant challenges are identified that go beyond technical aspects and need to be addressed comprehensively.

Challenges and additional considerations

One of the key concerns that can affect the adoption of remote identity verification mechanisms is the inconsistency and fragmentation of the regulatory framework among the European Union Member States regarding the recognition and acceptance of RIDP. This results in differences in the levels of security that can be achieved, complicating interoperability and mutual trust among Member States.

Similarly, the lack of alignment between the policies and practices of different national authorities is noted, which can create uncertainty and obstacles for online verification service providers in meeting regulatory requirements in different countries.

 

“One of the primary obstacles to the widespread adoption of remote identity verification methods is the fragmentation and lack of harmonization in the regulatory framework among Member States. Greater collaboration and coordination at the European level are needed to ensure interoperability and mutual trust among Member States.”

José Luis Huertas (CEO, Mobbeel) 

 

Another key aspect highlighted is the necessity for enhanced collaboration and coordination at the European level to comprehensively address security and trust challenges surrounding remote identity verification. This entails:

  • Developing common standards,
  • Sharing best practices, and
  • Establishing harmonized oversight and compliance mechanisms.

Overall, the report concludes that while significant progress has been made, there still exist notable challenges related to the regulatory framework, alignment among Member States, and the imperative for greater collaboration at the European level.

 

Conclusion

Enabling citizens to remotely verify their identity with confidence is pivotal for propelling European digital transformation, allowing many traditionally in-person processes to transition online.

However, the current landscape presents new threats through increasingly sophisticated presentation and injection attacks, posing a significant challenge that various identity verification service providers must effectively address.

At Mobbeel, we recognize the importance of implementing the best practices proposed by ENISA, and thus, we integrate all its principles into the development and training of our algorithms.

Hence, by adhering to best practices, alongside the unification of regulatory criteria and increased cooperation at the European level, the groundwork will be laid for citizens and businesses in the European Union to place full trust in remote identity verification processes. 

Contact us if you want to learn more about how our technology can enhance passenger flows in airports.

Face Recognition Guide

Discover what is face recognition

  • Learn about the history of facial recognition. Origins and evolution.
  • Learn how facial recognition systems work.
  • See the different uses and applications.
  • Understand the different implications of the technology in our society today.
  • Discover the challenges in cybersecurity.
  • Learn about the regulations involved in biometric processes.

Discover what is face recognition

Face Recognition Guide
What is identity theft?

What is identity theft?

Current developments and advancements in AI have created a universe of impressive opportunities. Nevertheless, they bring along an increasingly...