The Face of Travel Today: Smart Airports, Biometrics, ePassports and Defining a Secure Identity Token


This past year, there has been a surge of activity across the travel continuum trying to enhance traveler facilitation and engagement, while at the same time implementing stronger identity assurance and security measures.  In fact, over the next three years, 77% of airports and 71% of airlines are planning major programs or R&D in biometric ID management to smooth curb-to-gate passenger flow. While Dubai has plans for a biometric tunnel – Government, industry, and aviation partners have been pushing for technologies that will allow travelers to move throughout the travel continuum (booking – airport check-in – baggage drop – security screening – airport vendor services – boarding – arrival – customs – hotel check-in – return trip) without the need for the presentation of an identity document.  Many of the solutions being considered in proof of concept demonstrations involve the use of biometrics in combination with a derivation of the traveler data from an e-passport; some of these populate and protect the token within a secure container on a mobile device.  The traveler simply presents the token at the start of their journey to prime the continuum with their identity and travel authorization data. After that first encounter, all subsequent identity validation processes will be satisfied through facial recognition matching of the traveler at various points. The end goal has been to establish a biometrically-enabled, securely vetted, traveler-controlled, identity assertion token that can facilitate traveler interactions throughout the travel continuum.

The Current Situation

All the partners see the value of such a frictionless approach.  They also agree that the identity proofing, and secure token generation/enrollment processes on the front end are critical to the mitigation of the risks that these new techniques introduce to the well-established security controls that are currently in place.  To that end, international standards for the security controls and interoperable data format are being developed to allow the e-passport data to be presented as a “Digital Travel Credential (DTC)” or identity assertion token, that is derived from the authoritative data.  These controls ensure that the DTC can be authenticated with the same level of assurance as the source e-passport document.

Several token enrollment/delivery models have also been reviewed, and some have been implemented in both vendor-specific technologies and other self-sovereign identity solutions.  One model has the government providing and maintaining the DTC, with the traveler contacting the government whenever they were going to travel to have the DTC published to the travel continuum directly by the government.  In another model, the government securely provides the traveler with the DTC when they receive their e-passport document, and the traveler then controls when the token is used and who can access the data.  A third option directly derives the data from the e-passport during an enrollment of the token into the travel continuum.  As this may be a traveler self-service enrollment, or possibly an enrollment at an airline counter, the enrollment must incorporate the performance of the ICAO required Passive Authentication (PA) process to ensure the authenticity of the source document, as well as its cryptographic binding to the traveler.

While the enrollment and backend processing capabilities vary, both government and industry capabilities are being deployed today to support this biometric facilitation concept.  The US Department of Homeland Security (DHS) has been investing in the establishment of biometric capture and assessment capabilities with its Homeland Advanced Recognition Technology (HART) suite which includes a multi-modal biometrics database and supporting services.  Identity proofing vendors across the industry have also established biometric-only, facilitation capabilities that are currently being deployed both domestically and internationally.  CLEAR provides a biometric alternative for security screening at airports and event facilities, while Vision-Box has implemented biometric border control and traveler facilitation (entry/exit) kiosks in several countries.

The Challenge & The Future

The challenge at hand is harmonizing these capabilities across an interoperable fabric that can leverage the standards-based DTC data format, as well as any proprietary formats being used within leading edge deployments; and that can be incorporated into existing commercial, government, and/or public/private partnership initiatives.  This fabric will ensure the interoperable delivery of the identity token across the travel continuum in support of reliable party systems and programs, such as:

  • CBP Entry/Exit Tracking
  • European Entry–Exit System (EES)
  • European Travel Information and Authorization System (ETIAS)
  • SITA iBorders Border Automation
  • IATA One Identity
  • Trusted Traveler Programs, including NEXUS, SENTRI, Global Entry


All these efforts can benefit from and would be enhanced by an investment in the connecting fabric that allows the individual capabilities of each to be extended and leveraged in support of the biometrics-only facilitation of the traveler.

The required security controls related to the underlying identity proofing, token generation, and token transit processes have been defined.  Interoperability across the travel continuum can be supported by standards-based interfaces between the entities.

The day that a traveler can show up at an airport and board a plane without providing anything other than a biometric is coming soon.



Meet us at upcoming events such as ICAO or NAPHSIS




Industry Experts Declare Identity is Broken: A Discussion on Innovation in Identity

Last week in NYC, OWI hosted a panel discussion with BioCatch, InfoMart, Ipsidy, PTB Ventures and Uniken on Innovation in Identity.


Identity is Broken

The first question was, is identity broken? The answer was a unanimous yes. No one disagreed on that; rather the discourse was around what to do about it as global citizens and businesses.

We are all aware of high profile data breaches and the seemingly endless news of personal data being compromised. A popular view was that this is happening because of the many layers that we currently have around establishing identity. Entities tend to glue a lot of pieces together to verify an identity including passwords, devices, ID’s, biometrics and such.

Beyond the layers or pieces, you have other variables to consider. Take payments as an example. You have consumers, employees and multiple device types as variables. All of these must be considered and accounted for in a verification solution, and all agree that humans are the weakest link.

The view was that these layers are what make systems vulnerable and allow hackers to win, and what is missing is a complete identity verification solution that puts the pieces together wholly from the start, say at customer onboarding. The overwhelming majority of fraud is in the onboarding step and can be avoided with sufficient solutions. However, the identity must then be continually verified.

Further evidence to how pervasive the identity problem is, top carriers from the TelCo industry are joining together for Project Verify in which AT&T, Sprint, T-Mobile, and Verizon promise a solution to change identity management and security, replacing passwords with more secure, device-based, multi-factor authentication.


Trends in ID Verification Solutions

Most agreed that biometrics and Artificial Intelligence (AI) are key moving forward. Research group Goode Intelligence has projected that over 580 million bank customers will use cloud-based biometrics by 2020.

One trend is focusing on behavioral biometrics, which may lead to better solutions. This includes obvious things like keystrokes and device use/habits, but can also tap into subconscious behavior. This is one way to beat sophisticated hackers.

Biometrics will also continue to play a big role in the US Army Intelligence with Biometrics Enabled Intelligence (BEI) and in border and access control with continued terrorist threats. With 1.8 billion international arrivals expected worldwide in 2030, identity management is going to become even more complex because not all countries, government agencies, airports and airlines are at the same level of technological maturity.

Other trends included a focus on establishing trusted devices that are tied to identities, creating one single, strong login vs. multiple logins across accounts, mutual authentication – between businesses & consumers – and blockchain.


The US vs. the Rest of the World

Identity verification solutions vary greatly depending on the region. There are socioeconomics, governing systems and adoption rates to consider. In the US for example, there is not a strong identification background. There is a need to redefine this and build a stronger infrastructure. South America was mentioned as an example where identity is linked straight to the government database. Another example was the Bank ID program in Sweden. A consortium of trusted banks downloaded tokens on consumers’ computers and they use the bank ID system for activities such as voting.

Most felt that the emergence of technology will develop and be adopted outside of the US and migrate back. We are seeing many countries adopt verification technology around voting, airports/travel and payments like China’s Alipay and WeChat Pay.


What is the Solution?

Everyone recognizes there is problem with identity verification today. All industries will be looking to solve it and claim that they are “the platform.” It really depends on use case and industry to get a best of breed solution. There is no perfect solution out there.

The concept of a trusted Self Sovereign Identity (SSI) platform was discussed. Is this the answer? Not all agreed. The idea was that with SSI, consumers can present claims that are true to other people without having to go through a third party. Individuals would control what personal data they share, how and with whom. Advantages include enhancing privacy, economic benefits and decentralization.

All agreed that the private sector will drive the solutions and be led by the financial sector, as they have the most to gain and the most to lose.

It was also agreed that at the end of the day consumers want anywhere, anytime capability and convenience. They don’t want security to be their concern in transactions they conduct and do not view this as their problem. Rather consumers want the institution or business they are transacting with to deal with and solve it. Abandonment rates today are as high as 40%; if people can’t do it fast, they are on to the next. There are simply too many choices in every industry and a good experience is key. The bottom line is consumers will avoid friction – but at what cost?



Talk to a specialist about Identity Verification Solutions




Will Biometrics Help Solve the Digital Identity Crisis?

The increase of high-profile data breaches and the evolving sophistication of hackers has shifted consumer perceptions and expectations around trust and identity verification. The identity verification process, once considered a behind-the-scenes step, is now being used by organizations as a differentiator to showcase the importance being placed on protecting customer PII.

But even with growing security concerns, consumers still expect an efficient and frictionless experience during onboarding and day-to-day transactions. As such, biometric technology has quickly become a popular method for authenticating users due to its efficacy, accuracy and convenience.

Biometrics such as facial recognition and fingerprint technology promise to improve the identity proofing process, binding a person to who they claim to be. Customers and users are finding biometrics much more convenient than passwords, paperwork, or online transaction and registration forms. Biometric verification can be used as a layer to strengthen and improve processes for on premise and for mobile or cloud-based services for initial onboarding/account opening, and as a standalone method for ongoing validation after one’s identity has been established.

Organizations are looking for a better method to authenticate users with high fraud prevention. This is especially true given an increasingly digital economy where the trend is towards conducting remote transactions on a mobile device. A new report from Juniper Research predicts that the biggest shift in mobile payment security will be the move towards software-based methods. It predicts that built-in biometrics (such as that offered by voice or facial recognition) will authenticate 1.5B mobile payments by 2023.

However, mainstreaming biometrics faces a variety of challenges. While it is expected that 67% of people worldwide will own smartphones by 2019, data privacy and user acceptance remain the key barriers to adoption. To overcome this, organizations across all industries must invest in appropriate data security mechanisms to protect biometrics data and focus on balancing security with a good user experience. Solutions should be easily adoptable and include familiar behaviors, such as taking selfies for facial recognition and utilizing fingerprints.

As more end-users grow comfortable with verification methods such as iris scanning or facial recognition software, we’ll see biometrics adopted at greater rates across all industries. In particular, airports are beginning to adopt biometrics for easy board gating and to support immigration and emigration border processes. And it’s working — just last month, a newly introduced facial recognition system helped catch an impostor at Dulles International. A 26-year-old man traveling from Brazil with a French passport was flagged by the airport’s facial recognition technology, which was put in place just three days ago. Upon a secondary check, he was found to be from the Republic of Congo and impersonating the man whose picture was in his passport.

Consumers want to feel secure and expect businesses to protect their information, but they still expect their transactions and onboarding to happen in a fast, convenient and effortless way. Similarly, companies need to approve more legitimate customers and ensure their trust, while defending their systems from fraud.



security white paper cta

The Next Wave of Digital Identity Powered by Codebase and Acuant

Codebase Technologies’ Digibanc Product suite joins forces with USA’s Acuant in providing the Gulf Cooperation Council (the GCC includes Saudi Arabia, Kuwait, the United Arab Emirates, Qatar, Bahrain, and Oman) region with an unparalleled digital identity and eKYC solution, Digibanc Identity.

Digital Identity has revolutionized the concept of how we perceive identity by creating a simple yet effective means of how we verify, access and stay up to date with our surroundings at both home and work.

Codebase technologies’ digital identity and customer onboarding module utilizes the innovative machine learning forensics and smart document analysis augmentations to create Digibanc Identity. Together Acuant and Codebase aim to offer a strong customer focused solution to industries who are heavily focused on their customers and are looking to provide deeper and more engaged customer experience.

With Digibanc Identity, organizations can now lower their customer acquisition costs, operating expenditures, onboarding times, and physical location footfalls from 40% – 70%.

Digibanc Identity’s has successfully been deployed for a large scale regional bank in the GCC providing them with robust regulatory compliance and increased customer satisfaction.

Digibanc Identity aims to establish itself as the benchmark technology for institutions for the verification and onboarding of their valuable customer base on a global scale starting with the GCC and South Asian Regions.

Codebase Technologies is a long-established technology service provider that practices innovation at its core. Established in 1998, CBT is part of an investment group based out of UAE with diversified service offering across industries. It provides competitive and state-of-the-art technology solutions for the globalized economic multi-verse that is working and shaping today’s most crucial and diverse industry needs.




security white paper cta

The Key to Transacting with Trust In the “Selfie” Generation


There are 70 million of them in the U.S. alone. They are “digital natives,” who grew up with the Internet and are fluent in mobile technology and social media. They spend a whopping $600 billion annually – and growing. They are forecasted to account for 35% of spending by 2030. They are set to outnumber Baby Boomers next year and are the largest generation in the workforce. They take, on average, one selfie every day and account for 55% of selfies on social media.

They are the deeply studied, oft-maligned Millennial generation. Pew Research has defined this group as those born from 1981-1996.

Studies also show that they keep their mobile phone with them all the time (not more than 3 feet away) and they love their cameras. One survey found that 68% of Millennials would rather snap a picture than type something into their device. They have big ideas of how to use the smartphone camera to make transactions easier.

Millennials are using smartphones daily to conduct their business, whether it’s shopping, making payments or banking. And in the sharing economy, they are using popular apps to use these services via their smartphone. Some reports show they are deciding to who to do business with based on their mobile capabilities. This should be a wake-up call for all industries wanting to tap into this influential demographic. Even the Olympics has adopted this technology for the 2020 Tokyo Olympic games utilizing facial recognition.

Let’s look at banking for moment. An infographic from the American Bankers Association shows that banks that offer digital services are better positioned to reach Millennials. In fact, Millennials are three times more likely to open a new account with their phone vs. in person. Consumers commonly think that opening a bank account is a cumbersome process – so many forms to fill out and documentation to provide. But while banks collect more information then ever before and have more steps during onboarding due to regulatory compliance, they can provide a better digital experience to a generation used to signing up for new accounts via mobile devices.

Millennials prefer taking a picture for data capture. More than half have deposited a check by taking a picture with their smartphone. They are optimistic that mobile capture will be part of all mobile transactions in the next five years. Whether that’s for banking, or a car rental service, or a visit to the doctor’s office, the ease of snapping a photo is vastly superior to filling out long, tedious forms. It’s not surprising then why so many users of Acuant’s AcuFill solution report they save time and impress customers with a streamlined and modern on-boarding process.

Beyond mobile capture, Millennials also prefer to validate and verify their identities via facial recognition. The introduction of the iPhone X and its facial recognition technology became the first real mainstream use of this concept. Acuant’s FRM (Facial Recognition Match) technology can make this an option for just about any online transaction. The process can be as easy as taking a selfie and knowing in seconds whether there is a match, or the transaction should be flagged for fraud.

One common form of facial recognition fraud is using a photo to assume someone else’s identity – a face spoof attack. Acuant FRM uses a liveness test to prevent this and ensure that it’s a live person taking that selfie. This type of verification can be useful in two scenarios – when you want to be sure that the ID is valid and that the person matches the photo on the ID, and when you already know this customer and only need to know that this person is actually the person who holds the account.

When appealing to and engaging Millennials, it is important for businesses to provide a seamless, modern experience that meets their digital expectations. At the same time, that user experience must be balanced against risk – and how much risk you are willing to accept.



download free infographic

Five Identity Proofing Trends in Identity and Access Management for 2018


The days of auto-filling your personal information in exchange for “free” access, content and offers are limited. People generally don’t think twice about providing personal information in exchange for what they want quickly, but that is beginning to change as cases of personal data being misused and even breaches on major platforms increase (see Facebook).

The issue of regulations around Personally Identifiable Information (PII) is coming to a head. Self Sovereign Identity (SSI), the concept that people and businesses can store their own identity data on their own devices and provide it efficiently to those who need to validate it, without relying on a central repository of identity data, and what that should mean is paramount in the digital age. The idea of owning your own data and consenting to its use may have seemed impossible just a few years ago. However, European courts gave someone the right to be forgotten and scrubbed from Google search results in 2014 and Google says it has received more than 650,000 requests to remove certain websites from its search results since.

Identity and Access Management (IAM) is moving toward fewer instances of storing personal data and more toward scenarios where information is requested as needed to process services.

As businesses look for ways to streamline and secure digital transactions, here are some of the top IAM trends:


People Will Own Their Data

Due to GDPR and other similar laws going into effect, more and more digital interactions will rely on individuals giving consent for their data to be used. This practicality has birthed the concept of Self Sovereign Identity (SSI) where a person holds and controls all of their own data, including biometrics. This concept could,  and has already in some countries , give way to passport-less travel, where an individual’s biometrics will be used to access all the information needed for border control.


Biometric Authentication Will Go Mainstream

Biometrics is not just a novel way to unlock your iPhone anymore. Expect to see more mainstream adaptations of biometric authentication as leaders in IT fear digital threats will continue to increase. Access control, in particular, is moving from access cards to biometrics with gait recognition being the technology that is gaining popularity for high-security areas.


More Industries Will Invest in Blockchain

The future of using cryptocurrency such as bitcoin for everyday transactions remains to be seen. However, companies like Mastercard are utilizing blockchain technology to reduce fraud and credit card skimming. Mastercard plans to roll out its investment into blockchain technology – the company is the largest holder of blockchain-related patents in the world.

In addition to the finance industry investing in blockchain, healthcare is another industry that is highly concerned with secure yet more streamlined documentation. Ideally, healthcare records would be complete and travel with the patient regardless of doctor or insurance changes. This is still a working concept as the records are stored in many different systems, which have resulted in many recent high-profile data breaches.


Artificial Intelligence Will Improve Security

Currently, Artificial Intelligence is powering identity solutions by learning from millions of transactions and documents to spot anomalies. This is a powerful tool to help combat fraud. Industry leaders envision a future where AI can monitor computer sessions to identify if a real person is conducting a transaction or if a session is abnormal or the result of a breach. Rather than checking against credentials, AI could use a combination of biometrics and user behavior to figure out whether that person poses a risk to security. AI learning the identity of users and their habits dynamically is still a future technology but is one that shows a lot of promise.


Investments in building identity solutions for your business need to include both proven experience as well as groundbreaking innovations. Acuant is proud to be one of the four providers of Identity Proofing Solutions named IDC Innovators, offering the combination of physical document and biometric authentication through human assisted machine learning.



Beyond Machine Learning

How Identity Verification Solutions Can Make Summer Travel a Breeze and Enhance Revenue

We all look forward to summer travel plans, but there can also be some stress involved including long lines at the airport, car rental counters, and hotels. The good news is that identity verification technology is being adopted to make these processes more streamlined and efficient; as an added benefit to businesses, they are revenue enhancing and customer pleasing.

A growing number of customer-facing processes in hospitality depend on identity verification, especially due to the growth of sharing economy businesses like Airbnb. Customers, most notably the well-traveled Millennial market, increasingly prefer to do everything from booking to check-in to keyless entry from their mobile devices. With mobile scan-and-verify solutions, it becomes possible to securely accommodate guests who’d like to avoid check-in lines altogether. And if they cause damage, you have all the verified information you need to recoup losses and report them to law enforcement.

As more hotels get mobile and hi-tech with their offerings, ID capture and verification is essential. These include digital keys, concierge text chat, guest service apps, self-serve kiosks, and mobile check-in. Identity verification also reduces fraud and enhances visitor security programs in a very customer friendly and cost-efficient manner.

In a recent study by Resonance Group, surveys showed that Millennial travelers highly value free Wi-fi, privacy, and safety. Customer data-driven offerings like kiosks, branded apps, mobile check-in, and keyless entry hit all these highly valued needs while simultaneously benefiting customer and business. Innovative digital processes make the vacation experience at leading brands more convenient, relaxing, and comfortable. Streamlined service interactions (virtual concierge), advanced amenities and sophisticated back-end processes (room availability, fraud prevention) all involve the capture and use of customer data. Those same solutions will also reduce risk, revenue and property loss while enhancing the customer experience.

Scan-and-verify solutions include desktop devices and mobile scanning apps that quickly capture and digitize all the information from a driver’s license, passport, or other identity card. The digitized information is automatically exported to customer database records, and a digital replica of the ID is stored for regulatory and security purposes. The information, including photo ID, can then be checked against DMV records, credit bureaus, and other databases to verify the guest’s identity and payment method. Customer records can then be used by internal systems to complete billing and marketing processes. Personal data can also be leveraged, through CRM and GEM systems, to create more tailored experiences and to target opportunities to upsell and maximize revenue from each guest during their visit. Scanning IDs reduces keystroke entry errors, eases language barriers for foreign guests, and frees customer service reps to have more meaningful and relaxed interactions with guests. The entire check-in experience is streamlined and pleasant with fewer manual tasks.

Vacation is supposed to allow us to escape everyday stress and relax. With advanced identity capture and verification solutions, hotels, rental agencies, and tourist attractions can start to deliver that smooth-sailing experience before customers even arrive.



Read A Hospitality Case Study

Acuant Talks Identity Proofing with TAG Cyber

Recently, we spoke with Ed Amoroso of TAG Cyber on the topic of identity verification solutions today in the marketplace. Here are some of the highlights:

     Our discussion covered the wonderful work they are doing to simplify, integrated, consolidate, and secure the tangle of identification documents, and associated validation processes that are not exactly the pride of our society. I think their approach is solid, and I’ll try to share with you below what I learned:

“Our purpose at Acuant,” explained Kevin Vreeland, Managing Director, “is to simplify the identity validation ecosystem to maximize the trust of any transaction that is reliant upon an individual’s identity. We believe identity is the new currency, and it is more important than ever that PII is protected. Acuant accomplishes this by providing workflows that are fast and secure by streamlining the lifecycle process for establishing confidence in a reported identity.”

The Acuant solution is offered in three levels: First, images of credential information such as driver’s licenses are captured into the app to support basic tasks including familiar auto-fill into on-line forms. Second, strong authentication is performed in seconds by more than fifty forensic tests including biometric facial recognition, often needed for higher assurance. And third, the solution supports both RFID and a manual review for the most critical applications.

Our conversation moved quickly to privacy, and establishing confidence to put all of one’s credentials into one bucket. Vreeland explained the company’s approach to encryption and its disaggregation of credentials as they are validated, significantly reduce the risk of any compromise. He stressed the company’s belief that individuals should be in control of PII. He also outlined rational use-cases for stored and non-stored credentials by the app provider.   


You can read the full blog here.

At Acuant we are mindful that a mission must be founded upon a set of core values and business principles. For us this means that we take a customer centric approach that defines our purpose, guides our products and harnesses the innovation and enthusiasm of our people.

We recognize that the need for strong, customer-friendly identity proofing solutions has never been greater. As PII is continuously jeopardized, Acuant serves to find a way to create trusted transactions that puts individuals at ease and in control, while simultaneously allowing businesses to address their appropriate level of risk.


Contact us today to learn more

Buzz from the Know Identity Conference 2018

The 2nd annual Know Identity Conference just took place in Washington DC and Acuant was in attendance to catch this year’s buzzworthy topics. A major one was how firms will establish consumer identity especially in the digital world and how/when most consumers would use digital identity.  Enter SSI. The industry has unified around the term self-sovereign identity (SSI) to represent both the digital identity credential and the right for the consumer to control access to it and who gets what portion of their identity.


So how do we test whether digital identity is ready for the consumer mainstream? One line of thought by David Birch of Consult Hyperion, was that by taking care of 3 audiences of online consumers (the 3 W’s), that would be enough to ensure the right amount of protection to make business transactions secure. The 3 W’s are witness protection, whistle blowers and people who browse explicit material (wankers in his informal British prose). If digital identities allow the 3 W’s to browse anonymously and protect their transactions, then we can all have an appropriate level of security in the digital world.


Scott Galloway, a professor at NYU Stern School of Business, worries about the ever-increasing control of personal information in the digital world by four companies: Google, Facebook, Amazon and Apple.  He calls these firms the brain, heart, stomach and libido of the digital world.  These four companies each create more revenue each year than the GDP of all other nations except USA, China, Japan and Germany.  Scott argued these companies are already monopolies and innovation could gather renewed energy if these companies were broken into smaller entities, further pondering that they may have just too much information about individual consumers. In the backdrop of the recent Facebook debacle and the pending European GDPR laws, protection of consumer information was at the forefront of many conversations.


The General Data Protection Regulation (GDPR) goes live May 2018.  The hardest part of compliance with this new regulation mentioned by many of the panelists, is compliance with the laws mandating the right for a consumer to be “forgotten” by any company.  With the size and breadth of systems in many companies, the right to erasure of a consumer may prove a daunting task. The days of selling consumer contact lists will be over in the EU come May and the UK is currently racing down the path to adopt similar laws as GDPR by the end of 2018.


Biometrics and its various forms was also highly visible at the conference.  Most sessions and panels discussed biometrics whether it was facial recognition, iris, fingerprint or voice as the natural next step in security. Most experts suggested a multi-modal approach to biometrics (more than one biometric) as there always needs to be a fallback when something does not work quite right. The fear factor of biometrics is much lower now and with adoption rates increasing we should all expect to see more usage across industries.


Lastly, there was a theme of hope as digital ID was seen as a solution to the unbanked and underrepresented for many parts of the world.  Many areas where government IDs are made available at birth (but other forms of identification are scarce, unreliable or inaccurate), could benefit from digital IDs backed by initial ID documents.  With Washington DC as a backdrop, new ways of proving identity with low friction, high confidence and mobility shined through.



security white paper cta

How Identity Verification Technology is Changing the Auto Industry, from Rentals to Car & Ridesharing Services

A Better Car Rental Experience with Fraud and Theft Protection

When it comes to renting a car, the first thought people have is of long lines and annoying paperwork including photocopying of IDs and insurance cards. It is not a pleasant experience, but one that most will justify going through for the outcome. Smart rental companies are realizing that in order to retain and attract customers, they need to make this experience faster and less painful. Today, consumers have many choices that compete with rentals.

Technology that automates the intake of ID documents like driver’s licenses and insurance cards, speeds up the process and protects businesses. Simply scan an ID to auto-populate the information into CRM or Dealer Management Systems and store data and images of the ID, no photocopies or pages of paperwork needed. With mobile devices, businesses can offer rental cars from any location or even drive the vehicle to the customer.

Another benefit to the rental companies is the protection ID verification provides. In the same swipe or mobile capture of an ID, the license can be verified in seconds to ensure that it is not fake and the driver is who they claim to be. This prevents fraud by catching fake IDs and provides a copy of the license image on file which is needed in many states to submit claims for stolen vehicles. Rental theft can be very costly and is often accomplished with only the aid of a fake ID.

Easy and Secure Car Sharing

The car sharing market continues to grow as many would-be car owners in cities and urban areas feel it is more economical and even more environmentally friendly to opt for a service such as Zip Car. Drivers can simply pick up vehicles they locate on a mobile app and can drive them to a destination for easy drop-off.

ID verification allows for quick and easy onboarding of members for such service providers. They can verify the identities of their users, ensure that a license is valid and have their ID images and data on file. Facial recognition match or other biometric technology can then be used to unlock cars at their pick-up location. The process is easy, fast, convenient and most importantly, secure. Businesses can protect their fleet and know who is driving their cars.

Safer Ridesharing Services

Another extremely popular form of transportation is ridesharing services such as Uber and Lyft. New services are popping up worldwide due to the convenience and ease of use this model provides. Users simply access a mobile app for on-demand service, but the service is not without pitfalls as evidenced by many stories of rides gone bad. This can be due to a bad customer or a bad driver. In both cases, it is important to know the identity of both parties.

Ride Sharing companies must properly identify their drivers and know who is providing services at all times. ID verification technology allows for this with proper validation for customer onboarding and proper validation and screening of drivers. Riders should also provide proper ID when signing up so that drivers will always know who is in the car with them should any trouble or danger arise, and drivers should have to initially and continually prove their identity. A preliminary check will catch fake ID’s and continual checks for drivers via biometrics such as facial recognition match, can ensure that the driver is who they claim to be throughout service times.

Acuant Announces 3 New Auto Partners


Navotar is a worldwide provider of fleet management software for rental companies, dealerships, and automotive manufacturers. Through this partnership, car rental customers will now be able to do a quick scanning of passports and driver’s license for data extraction into Navotar customer management systems, while at the same time verifying their validity in seconds. Acuant optimizes operations and provides an additional layer of security against fraud.

Working in real time, the partnership eliminates manual screening errors, speeds up the document inspection process and significantly reducing employee training, operating costs and customer inconvenience.

Clutch Technologies

Clutch’s vehicle subscription platform provides the automotive industry with an innovative and scalable way to enable vehicle subscription access. Clutch chose Acuant’s patented technology to authenticate driver’s licenses. As part of the verification process, Acuant extracts biometric and alphanumeric data from IDs and applies 50+ forensic tests instantly. Clutch will also perform facial recognition match to validate users. Acuant FRM is as easy as taking a selfie and comparing it to biometric data contained in the government-issued ID. Results are given in seconds, comparing the face biometrics of a selfie to the image on the ID and include a liveness detection test to prevent fraudsters from using static images by ensuring that a live person is in front of the camera.


Pony Car Sharing

Pony Car Sharing is Romania’s first and largest car sharing service. Offering flexible pricing models, cars are parked on the street where users unlock them with mobile phones and can track them in real time on the app. Pony Car Sharing chose Acuant to verify members during onboarding, automatically capturing and validating identification information. Identity information will then accurately auto-populate the Pony Car Sharing database. This eliminates manual entry, photocopying and paperwork. Pony Car Sharing will also employ facial recognition match for stronger authentication. Customers using the Pony Car Sharing app can be remotely authenticated and unlock cars with their mobile phones.

To learn more about Acuant Solutions Book a Meeting today!