<tr height="135" style="height:101.5pt">
<td height="135" style="height: 101.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.1</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#proofing-types-1" target="_blank">Proofing
Types
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">States that multiple entry
points can be used to achieve IAL2. Unattended remote means the user
completes the task without human oversight. The attended one means a person
is guiding them through the process. Onsite is the last option, where a
person physically guides them through the session. Any of these methods are
allowed.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">
The application (Trust Swiftly) has the flexibility to meet all types of
this requirement. i.e., if you want to do unattended, our system can
automatically verify a person. Otherwise, you can use our Live video option
to have an agent join the session or even set up an in-person process.
Typically, the attended option is only used as an out-of-band option to help
users who have trouble with the automated process. If you choose the
in-person process, you must employ and train your agents, as Trust Swiftly
can only provide the technology, not any physical referees or reviewers.
</tr>
<tr height="135" style="height:101.5pt">
<td height="135" style="height: 101.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.2</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-evidence-collection">Evidence
Collection
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">Clarifies
the two groupings of verification methods in identity proofing. The process
allows for different categories of evidence strength levels, with the
requirement to meet the minimum. The first grouping involves one fair
evidence and one strong method, while the second allows for one superior
evidence document, such as a cryptographic passport check. A table of more example evidence and their
strength can be seen here: https://pages.nist.gov/800-63-4/sp800-63a.html#EvidenceExamples
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">Trust Swiftly offers configurable verification templates that empower
you to select the verifications that meet IAL2 compliance. For instance, a
Driver's License and a carrier phone verification can serve as strong and
fair evidence. Our system's adaptability to various methods allows you to
increase the number of users who meet this requirement. We've observed that
certain evidence groups work better in specific industries, underscoring the
importance of planning and adjusting the verification templates when
deploying an IAL2 solution. For example, medical professionals have a higher
rate of passport ownership, which can expedite and enhance document
collection.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.3</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial1-attribute-collection">Attribute
Collection
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">Stresses the importance of
collecting and validating multiple identity data points, such as names,
addresses, phones, ID numbers, and SSNs. While collecting the data is
essential, the preferred path is to validate it, as this helps to prevent
potential misrepresentation.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">Trust Swiftly allows for
the validation of numerous attributes about a person. While the main
attributes should be validated, any additional data points can be
self-asserted, contributing to the overall proofing of an identity. For
instance, a DL number and all other text on an image can be extracted and
compared with more authoritative data sources. These attributes can be later
used for fraud detection and other security measures, underscoring the
comprehensive nature of the verification process.
</tr>
<tr height="116" style="height:87.0pt">
<td height="116" style="height: 87pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.4</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-evidence-validation">Evidence
Validation
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">Underlines
the thoroughness of the evidence validation process, stating that any
provided evidence should be rigorously validated for authenticity and
integrity. This differs from attribute validation as it refers to markers
like digital signatures and cryptographic checks. For example, the
certificate of a US passport is meticulously checked using an NFC, and then
the ICAO Public Key Directory (PKD) is used to validate it. This thorough
validation process instills a sense of security and confidence of the
identity.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports evidence validation through multiple digital
checks and ensures no tampering with submitted documents. Also, we can check
NFC identities to verify their cryptographic authenticity. If you plan to use
any in-person guided types, as mentioned in 4.2.1, you must adequately train
agents to look for any physical checks, such as checking the ID security
features of raised lettering.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.5</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-attribute-validation">Attribute
Validation
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">States all core attributes must
be validated either through an authoritative or credible data source. Core
attributes are first, middle, and last name, government identifier, and
physical address. The attributes should be tracked with the evidence that was
provided to them so each step is audited. Reference numbers should be
checked, too, if the evidence gives them.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">
The application can connect to multiple governments and third-party data
sources to verify authenticity. For example, a DL number must be checked with
a DMV to verify the name and ID match what is stored in their database. Also,
Trust Swiftly can verify superior documents by using the public key to check
a government passport. The system also automatically correlates which
evidence is linked with the identity attribute.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.6</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-verification">Verification
Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">It
states there should be multiple pathways for a user to complete
verifications, considering various scenarios. There should be more than one
method to use for each scenario determined.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application natively supports this functionality and has multiple
templates to meet this requirement. High-risk environments can use specific
verification methods to ensure high levels of security. Trust Swiftly is not
limited to a set of pathways but has hundreds of combinations that can lead
to IAL2.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.6.1</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-verification---non-biometric-pathway">IAL2
Verification - Non-Biometric Pathway
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">States that verification can be
completed using non-biometric methods of evidence verification. It is not
limited to facial biometrics and there are non-biometric methods such as one
time codes to a physical address.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application supports
both non-biometrics methods mentioned in the requirements. For fair evidence,
we support all three examples mentioned: email, phone, and postal address.
Next, Trust Swiftly can turn off any automatic biometric checks and maintain
maximum privacy for your users as long as you staff an agent to properly
compare the biometrics during one of the proofing types mentioned earlier.
Lastly, we can send physical letters to an address with a unique code from
the evidence and validated with an authoritative source.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.6.2</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#dig-evidence-pathway">IAL2
Verification - Digital Evidence Pathway
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">It
states that verifications can use digital methods, which allows for greater
automation. The fair, strong, and superior evidences each have further
requirements to verify an account.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application provides options for each level of evidence to support
IAL2. Micro-transactions can be done against a financial account for the fair
level. Also, the OTP to a phone is another option. Lastly, the connection and
authentication of a bank account is another option that meets superior
evidence as long as the bank fulfills AAL3/FAL2 requirements. Trust Swiftly
can gather bank account identity information such as name, phone, and
address.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.6.3</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#ial2-verification---biometric-pathway">IAL2
Verification - Biometric Pathway
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">This requirement is similar to
4.2.6.1 but allows automation using a system that compares face biometrics.
For example, the Driver's License evidence has the portrait image, which then
is compared to a live facial image taken during the verification process.
Another comparison method can be using non-facial biometric evidence or ones
from an authoritative database.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application allows for
automated biometric checks, which vectorize faces to compare each piece of
evidence. The system is able to adjust for various scoring levels of
comparison and can even add a combination of biometric and non-biometric
oversight pathways. There should be another check of the values for strong
and superior checks to verify their records with the original evidence.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.7</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#remote-attended-requirements">Remote
Attended Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The
requirement is for agents to guide a user through proofing processes.
Specific checks include agreements, recording, fraud, and deepfake
prevention.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports each requirement through a high-definition
video connection with the support for recording through privacy-preserving
methods. Our solution allows the scheduling of remotely attended sessions and
the recording of decisions about the evidence presented. The agent must be
trained to spot fraud and create a structured process to verify a person
properly.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.8</td>
<td class="xl67" width="298" style="width: 224pt; font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a target="_blank" href="https://pages.nist.gov/800-63-4/sp800-63a.html#onsite-attended-requirements">Onsite
Attended Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">States that a person can be
proofed at a physical location. The proofing agents will guide the person
through each step and be properly trained. There can be a recording of the
onsite session.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application can be used
as a tool to aid an onsite verification process. The agents will need to be
separately trained, but they can use Trust Swiftly on an approved device in
person. The agent would walk the user through each step, state the different
consent requirements, and be responsible for recording the interaction.
</tr>
<tr height="116" style="height:87.0pt">
<td height="116" style="height: 87pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.9</td>
<td class="xl67" width="298" style="width: 224pt; font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#onsite-unattended-requirements-devices--kiosks" target="_blank" style="opacity: 1; transition: opacity 0.2s ease-in-out 0.1s; outline: 0px;">Onsite Unattended Requirements (Devices & Kiosks) </a></td>
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">States a
onsite device or kiosk can be used to complete the proofing process. The
device should be appropriately secured and locked down to prevent tampering.
The device would then be used to complete evidence collection and the
verifications.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">
An onsite device or kiosk can load the application for verifications. Trust
Swiftly can be embedded as part of an application with secure sessions. Each
new person must have a separate verification session, and the device loads
the proofing steps. The CSP is responsible for using a secure device and
locking it down so no tampering is allowed during the session. For example,
an iPad in a secure kiosk stand can be used with a custom application that
starts the proofing process.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">4.2.10</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#ProofingNotifs" target="_blank">Notification
of Proofing
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">States that a person should be
notified through email, mail, or phone about the status of their proofing. It
should provide details about the identity proofing event and give subscribers
options about false verifications or other privacy concerns.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">Trust Swiflty can notify
the user through email about proofing their identity once they complete all
the steps. There is a customizable email that can include each requirement
and provides methods to contact the organization. Notifications can also be
triggered through SMS and email to start the proofing process. It is
essential to use notifications in multiple methods to prevent socially
engineered verifications and provide the next steps in the process.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">4.2.11</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#initial-authenticator-binding" target="_blank">Initial
Authenticator Binding
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">It
states that the user can be granted an authenticator upon completion of the
identity-proofing process. They are initially referred to as an applicant but
then a subscriber in the system as proof. An authenticator can be bound to
the account, and it should be distributed in a secure manner to the device or
address verified in previous steps.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports binding a device authenticator through
Passkeys. The passkey can be restricted to a FIDO2 compliant device with
certificate verifications. This will require a biometric authentication for
the device. If you need to use a physical authenticator, it should be mailed
by the organization only to the validated address used during the proofing
process.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.1</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#DocRecReqs" target="_blank">Identity
Service Documentation and Records
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">These general requirements are
multiple policy and documentation audits to oversee the IAL2 process. This
includes assessments and other training that improve the overall
identity-proofing process.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application includes
multiple ways to address proofing errors and documents each action through an
audit trail of events. The system also provides privacy agreements and
click-through acceptance of biometric checks. Lastly, there are tools in
place to support fraud checks and reviewing verifications out of the cycle.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">3.1.2</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#FraudMgmt" target="_blank">Fraud
Management
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">This is
a vital requirement that requires a solution to do multiple fraud checks. For
example, duplicate accounts and other device checks can be used to prevent
overall fraud during verifications. A process should be in place to handle
fraud, and training is required to handle different scenarios.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">Trust Swiftly employs a comprehensive set of fraud detection measures,
using multiple signals and data points to detect any fraudulent activity. The
system implements many suggested fraud detection techniques, such as sim swap
indicators, geolocation checks, device activity monitoring, and liveness
checks. This robust approach, including N:1 face duplicate detection, ensures
that repeated fraud identities and personas are effectively prevented,
providing a high level of security.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.3</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#PrivacyReqs" target="_blank">General
Privacy Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The privacy requirements detail
steps that applicants should take to be notified about the proofing process,
PII collected, and retention policies. Lastly, policies and documentation
should outline the PII collected and provide risk assessments.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">
The application supports the configuration of multiple privacy options. For
example, PII can be stored in regulated storage locations, and data can be
redacted or turned into anonymous identifiers. Custom privacy notifications
and agreements can be placed in the flow prior to the identity-proofing
process.
</tr>
<tr height="97" style="height:72.5pt">
<td height="97" style="height: 72.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">3.1.4</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#EquityReqs" target="_blank">General
Equity Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">
Emphasizes the importance of the equity requirement, ensuring that
solutions meet the needs of multiple communities. Any discrimination or bias
in a solution is rigorously checked and tested to ensure equity in the tool.
This commitment to inclusivity makes the audience feel included and valued,
knowing that their needs are being considered in the identity proofing
process.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports multiple custom identity proofing processes
and exception handling for automated decisions. The solution is adaptable to
allow trusted referee options and is monitored by an agent to ensure the
process is equitable.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.5</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#SecurityReqs" target="_blank">General
Security Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The security requirement is a
general list of best practices to protect the proofing process. Automated
attempts and other fraud mitigation should be applied, and security settings
should be enabled, such as a WAF. The security requirement covers suppliers
and requires assessing the risks to create appropriate controls.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application is securely
audited and protected against many types of attacks. Automated
identity-proofing attacks are the top measure to stop. We can check duplicate
identifiers and enable captchas and firewalls to stop abusers. Bots are also
blocked, and traffic analysis is performed to rate limit attempts. More
information about our security can be found here:
https://security.trustswiftly.com.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">3.1.6</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#redress" target="_blank">Redress
Requirements
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The
redress requirement means the person can retry or correct their
identity-proofing steps. There should also be a method to contact the CSP for
help or resolving issues.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports multiple retry options and an override or
rejection method for agents. If proofing fails, the system can prompt the
person to provide additional evidence. There also is a self-help option for
the user to select a different verification pathway automatically. Lastly,
live chat and support links are available to increase pass rates and resolve
problems.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.8</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#ConfirmCodes" target="_blank">Requirements
for Confirmation Codes
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The confirmation code
requirement is to check the random decimals sent for a proofing process. Each
method allows different validity times. For example, a text with a code
should only work within 10 minutes.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application, by
default, meets all confirmation code requirements by expiring codes in the
appropriate timeframe. The codes can also be sent via multiple methods, such
as postal address, email, and phone.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">3.1.9</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#ContinueCodes" target="_blank">Requirements
for Continuation Codes
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The
continuation code requirement is a checkaround for transferring an incomplete
session or using a new proofing type. The codes should be throttled and
securely generated.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports QR codes to transfer a session from one device
to the next in a secure manner. For example, if a verification requires a
transfer to a phone for an attended verification, the user can scan a QR code
on their PC to continue the session.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.11</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#ProofBios" target="_blank">Requirements
for the Use of Biometrics
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The biometrics requirements
detail various methods to verify based on a person. It can include voice,
facial, or other behavior based on the person. The biometrics should be
tested to keep false match rates low and account for other privacy
requirements. Anti-fraud techniques should be applied to ensure biometric
accuracy and not another person.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application allows for
custom consent messages about the collection of biometric data. It also has
multiple methods that NIST has tested to ensure the algorithms correctly
match facial attributes. The solution also has secure measures to prevent
spoofing and other deepfakes.
</tr>
<tr height="58" style="height:43.5pt">
<td height="58" style="height: 43.5pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">3.1.12</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#requirements-for-evidence-validation-processes-authenticity-checks" target="_blank">Requirements
for Evidence Validation Processes (Authenticity Checks)
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The
evidence authenticity requirement includes additional steps to verify a
document. Automated or visual inspection checks will be used depending on the
proofing type. Documents with MRZ or barcode should be matched against the
visual text portion.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application supports multiple authenticity checks to verify a
document. Virtual cameras are detected, and checks are made to match a PDF417
barcode with the front of a driver's license. Live document capturing is also
supported to prevent saved images from being uploaded.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219); background: rgb(217, 225, 242);">3.1.13</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#TRs-ARs" target="_blank">Exception and
Error Handling
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The exception and error handling
requirement requires processes to remediate failures during proofing. Trusted
referees can be used to aid in completing or reviewing any errors in evidence
documents. An applicant reference can also vouch for a person's different
core attributes.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none; background: rgb(217, 225, 242);">The application can handle
exceptions and errors during the proofing process. For example, if the user
takes a blurry or too-dark image, the system will inform them of the issue
and require another clear image. There are exceptions upon errors where a trusted
referee can guide a user during proofing. The training of the referees is up
to the organization and is staffed by their team to ensure the privacy and
security of the process.
</tr>
<tr height="77" style="height:58.0pt">
<td height="77" align="right" style="height: 58pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: 0.5pt solid rgb(142, 169, 219);">5.1</td>
<td class="xl65" style="font-size: 11pt; color: rgb(5, 99, 193); text-decoration-line: underline; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;"><a href="https://pages.nist.gov/800-63-4/sp800-63a.html#accounts" target="_blank">Subscriber
Accounts
<td class="xl66" width="625" style="width: 469pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: none; border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The
subscriber account requirements cover various details about the person once
they have completed a proofing process. It provides guidelines on their
ability to access and maintain their account. Lastly, it details the
suspension or termination of the account due to various circumstances.
<td class="xl66" width="719" style="width: 540pt; font-size: 11pt; color: black; border-top: 0.5pt solid rgb(142, 169, 219); border-right: 0.5pt solid rgb(142, 169, 219); border-bottom: 0.5pt solid rgb(142, 169, 219); border-left: none;">The application automatically keeps each subscriber account separate
and unique during enrollment and proofing. Each account is assigned a unique
identifier, which also supports reference IDs. The application supports
additional authentications and updates through the submission of
authenticated requests. The option to terminate an account is also available,
as well as reactivate it if the suspension is temporary.
</tr>