Unemployment Insurance Modernization
  • Introduction
  • What we're reading
    • Language Access Resources
    • Tracking implemented solutions
  • Language Access Resources
    • USDR Language Access Support
    • AI Translation Assistants for Unemployment Insurance Benefits
    • Spanish Translation Guide for Unemployment Insurance
      • Using This Guide
      • Writing Inclusive Spanish
      • Writing Plain Spanish
        • Guidance For Word Choice
        • Guidance For Sentence Structure
        • Spanish Grammar Conventions
      • Designing Reader-Friendly Content for Spanish Speakers
      • Final Notes
      • USDR Language Access Support
      • Links to Resources
      • Spanish Translation Guide Changelog
  • Plain Spanish Glossary of Unemployment Insurance Terms
  • Multilingual Retroactive PUA Eligibility Resources for State Workforce Agencies
    • (English) Retroactive PUA – Claimant Communications
    • (Spanish) Retroactive PUA – Claimant Communications
    • (English) Retroactive PUA – Fact-finding content
    • (Spanish) Retroactive PUA – Fact-finding content
    • Retroactive PUA – Fact-finding form design
  • Unemployment Insurance Fraud Reporting
    • Unemployment Insurance Fraud Reporting Tool Kit
  • Identity proofing for UI agencies
    • Identity proofing introduction
    • Race and inequity in identity proofing methods
      • Background
      • Recommendation 1: Find and mitigate inequitable impact of identity fraud detection flags
      • Recommendation 2: Increase accountability for ensuring rightful claimants make it through the system
      • References and thanks
    • What is identity proofing?
    • Commercial uses of identity proofing
    • Process of identity proofing
      • Identity resolution
      • Identity validation
      • Identity verification
    • User experience of identity proofing
    • Identity proofing vendor comparison
      • Vendor analysis
      • Summary of vendor offerings
      • Deep dive: pricing
      • Deep dive: platform “bundling”
      • Deep dive: handling Social Security numbers
      • Deep dive: document verification
      • What’s next?
    • Appendix I: Vendor evaluation of key considerations
    • Appendix II: Vendor Evaluation of Supplemental Considerations
  • Additional Deep Dives
    • Effective Communication with UI Claimants Through a Standalone Case Management System
    • Sample Communications
    • Customer support mechanisms for UI agencies
      • Improved UX reduces inequity
      • Online appointment scheduling
        • Agency’s current solution
        • Other states’ solutions
        • Solution space
        • Deep dive: vendor “types”
        • Deep dive: pricing
        • Recommendations by category
      • Chatbots
        • Methodology
        • Types of online chat
        • Live chat
        • Free-text chat
        • Prompted chat
        • Support chat
        • Requirements
        • Best practices
        • Known results
    • Employer Interactions with Unemployment Insurance Systems
      • Landscape of the Employer Experience: User Interviews
        • Methodology
        • Key Takeaways
      • Employer Experience: Digital Interactions
        • Methodology & Note on Language
        • Key Takeaways
  • UI Journey Map & Recommendations
    • Introduction
      • The Journey Map
      • Methods & Acknowledgements
    • The Claimant Journey
      • Know what I'm eligible for
      • Submit my information
      • Certify Weekly
      • Receive Payment
      • Know my claim status
      • Receive Help
    • The Agency Journey
      • Validate Identity
      • Validate Monetary Eligibility
      • Interacting with Employers
      • Fact Finding
      • Update systems for new programs
      • Relationship with US DOL
    • The Employer Journey
  • Getting started with data
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Identity proofing for UI agencies
  2. Process of identity proofing

Identity resolution

To start with, identity proofing requires that the “self-asserted,” personally identifiable information (PII) provided by the user confirms that it belongs to a single, real person. It resolves this data by comparing it to public databases (e.g., checking the address provided by the user against a voter registration file).

A step-up in certainty would be to use knowledge-based verification (aka “KBV,” aka “Knowledge-based authentication”) to confirm the resolved identity by asking a question based on information others are unlikely to have (e.g., the system asks the user to provide the amount of their last utility bill). Depending on the specific KBV used, this technique can be a good opportunity to identify those using stolen identities.

Beyond that, more in-depth resolution techniques do not contribute toward an IAL2 designation, but they can be an important part of a solution for detecting fraud via the use of stolen or manufactured identities.

The more sophisticated forms of identity resolution are referred to as synthetic identity detection. With synthetic identity detection, machine learning (aka “artificial intelligence”) is used to combine the self-asserted data with other information you may have about a user (e.g., IP address, phone’s IMEI) and compare it with additional databases (e.g., telco records, credit header files, utility bills). It is through synthetic identity detection that criminals using stolen identities are typically found.

Some synthetic identity detection systems go even further and perform “network level” detection, e.g.:

  • How old is the domain name of the email address provided?

  • How many applications have there been from this IP address?

  • Have accounts on other sites been created with this combination of name + phone?

Note: a Social Security Number can be “resolved” to a person through synthetic identity detection, but it is not considered “validated” with any certainty until the Social Security Administration weighs in.

PreviousProcess of identity proofingNextIdentity validation

Last updated 4 years ago

Was this helpful?