Step 3: Use IDV Method

🎯 Purpose

Executes the selected Identity Verification method to confirm the user's identity before allowing them to proceed to credential re-establishment.


🔄 IDV Method Execution Process

🎯 Method-Specific Processing

Based on the method selected in Step 2, the system guides users through the appropriate identity verification process.


📊 IDV Method Implementations

1️⃣ Access Code Validation Execution

  • Process: Send OTP to registered email or SMS, user enters code
  • User Interface: Code entry screen with resend capability
  • Validation: Code verified against generated value and time window
  • Retry: Multiple attempts allowed within security limits

2️⃣ Mobile Push Verification Execution

  • Process: Send push notification to REL-ID mobile app
  • User Action: User approves or denies verification request on mobile device
  • Response: Mobile app sends cryptographic response to server
  • Validation: Response verified for authenticity and user approval

3️⃣ Security Q&A Execution

  • Process: Present user's pre-configured security questions
  • User Interface: Question and answer interface
  • Validation: Answers compared against stored responses
  • Security: Case-insensitive matching with multiple attempt limits

4️⃣ Server-Side Biometric Authentication

  • Process: Capture biometric sample from user
  • Comparison: Compare against server-stored biometric template
  • Validation: Biometric matching algorithm confirms identity
  • Security: High-security biometric verification process

5️⃣ Web IDV Execution

  • Process: Full document-based identity verification
  • Integration: Redirect to REL-ID IDV Web Server
  • Verification: Document capture, analysis, and comparison
  • Validation: KYC API compares provided data against stored information

🖥️ Method-Specific User Interfaces

📱 Security Q&A Interface Example

🔔 Mobile Push Verification Interface


🔄 Execution Flow Logic

✅ Successful Verification Flow

❌ Failed Verification Flow


🔄 Retry and Alternative Logic

🔄 Retry Capabilities

  • Same Method Retry: Users can retry the same IDV method if it fails
  • Attempt Limits: Each method has configurable retry limits
  • Alternative Selection: Users can return to method selection if multiple methods available
  • Support Escalation: Clear path to support when all methods fail

📊 Retry Scenarios

IDV MethodRetry CapabilityAlternative Action
Access CodeMultiple code entriesResend code option
Mobile PushRe-send push notificationTry different method
Security Q&ARe-answer questionsAdministrative reset
BiometricRe-capture biometricAlternative method
Web IDVRe-submit documentsManual verification

🛡️ Security Validation

🔒 Verification Security

  • Method Integrity: Each method properly validated according to its security model
  • Attempt Limiting: Prevents brute force attacks on verification methods
  • Time Constraints: Appropriate time limits for each verification type
  • Audit Logging: All verification attempts properly logged

📊 Security Measures by Method

MethodSecurity MeasuresAttack Prevention
Access CodeTime limits, attempt limits, single useCode guessing, replay attacks
Mobile PushCryptographic validation, device bindingDevice spoofing, man-in-middle
Security Q&ACase-insensitive matching, attempt limitsBrute force, social engineering
BiometricTemplate matching, liveness detectionSpoofing, replay attacks
Web IDVDocument validation, data comparisonDocument fraud, identity theft

🎯 User Experience Features

📱 User-Friendly Elements

  • Clear Instructions: Each method includes clear step-by-step guidance
  • Progress Indication: Users understand where they are in the process
  • Error Messages: Helpful error messages with guidance for resolution
  • Support Options: Contact information available for assistance

🔄 Flexible Recovery

  • Method Switching: Users can change methods if current method fails
  • Multiple Attempts: Reasonable retry capabilities for transient failures
  • Alternative Paths: Various routes to successful identity verification
  • Support Integration: Clear escalation to human assistance

⚠️ Important Execution Notes

🔧 Technical Requirements

  • Service Dependencies: Some methods depend on external services (SMS, email, KYC)
  • Device Requirements: Biometric and mobile methods require specific device capabilities
  • Configuration Dependencies: All methods require proper system configuration
  • Network Requirements: Some methods require reliable network connectivity

🎯 Success Criteria

  • Identity Confirmed: User identity successfully verified through chosen method
  • Security Standards: Verification meets organisational security requirements
  • Audit Trail: Complete record of verification process maintained
  • User Satisfaction: Process completed with minimal user friction