Loading...

Knowledge-Based Authentication for Reconciliation

January 2, 2009 by Keir Breitenfeld

I’ve talked (sorry, blogged) previously about taking a risk-based approach to reconciling initial Red Flag Rule conditions in your applications, transactions, or accounts. In short, that risk-based approach incorporates a more holistic view of a consumer in determining overall risk associated with that identity. This risk can be assessed via an authentication score, alternate data sources and/or verification results. I also want to point out the potential value of knowledge-based authentication (a.k.a. out-of-wallet questions) in providing an extra level of confidence in progressing a consumer transaction or application in light of an initially detected Red Flag condition.

In Experian’s Fraud and Identity Solutions business, we have some clients who are effectively embedding the use of knowledge-based authentication into their overall Red Flags Identity Theft Prevention Program. In doing so, they are able to identify the majority of higher risk conditions and transactions and positively authenticate those initiating consumers via a series of interactive questions designed to be more easily answered by a legitimate individual — and more difficult for a fraudster. Using knowledge-based authentication can provide the following values to your overall process:

1.Consistency: Utilizing a hosted and standard process can reduce potential subjectivity in decisioning. Subjectivity is not a friend to examiners or to your bottom line.

2.Measurability: Question performance and reporting allows for ongoing monitoring and optimization of decisioning strategies. Plus, examiners will appreciate the metrics.

3.Customer Experience: This is a buzzword these days for sure. Better to place a customer through a handful of interactive questions, than to ask them to fax in documentation –or to take part in a face-to-face authentication.

4.Cost: See the three values above…Plus, a typical knowledge-based authentication session may well be more cost effective from an FTE/manual review perspective.

Now, keep in mind that the use of knowledge-based authentication is certainly a process that should be approved by your internal compliance and legal teams for use in your Red Flags Identity Theft Prevention Program. That said, with sound decisioning strategies based on authentication question performance in combination with overall authentication results and scores, you can be well-positioned to positively progress the vast majority of consumers into profitable accounts and transactions without incurring undue costs.

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image