Authentication

In this method of identity verification (KYC) users provide personal data that allow providers to verify that a person is actually the person he or she claims to be. Common authentication methods are passwords or identification numbers (PIN), identity documents or devices (e.g., smartcards, token, badges) or biometric features (e.g., fingerprints, iris scans). Typically, the data provided by the user are validated with the data in the provider’s systems. Identity management services have emerged to support customers in the process of signing up (onboarding) with service providers.

More Term Definitions



Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top