How Reusable KYC Transforms Identity Verification

This is the second article in a series of five.

Know Your Customer (KYC) processes have become a critical component for institutions to verify the identities of their clients, especially within the digital finance and online services spheres. Traditional KYC methods, however, often involve repetitive, time-consuming, and costly procedures for both businesses and customers. Enter reusable KYC—a transformative approach that streamlines and enhances the identity verification process.

Reusable KYC represents a significant shift from traditional KYC practices. Instead of each institution performing its own separate verification for every new customer, reusable KYC allows verified identity data to be securely shared across institutions with the user’s consent. This not only reduces data redundancy but also enhances efficiency and security.

The technologies underpinning reusable KYC include decentralised identifiers (DIDs), Verifiable Credentials (VCs) and a digital wallet. These innovations ensure the integrity and confidentiality of user data while providing a robust and tamper-proof mechanism for identity verification. With reusable KYC, once a user’s identity is verified and stored in a digital wallet, it can be reused across various platforms and services without the need for repeated submissions and checks.

How Reusable KYC Works

Reusable KYC revolutionises the traditional identity verification process by leveraging digital technology to create a more efficient, secure, and user-centric system. This innovative approach enables users to control their verified identity information, allowing for seamless, secure sharing and updates. Here’s how it works:

Reusable KYC Workflow
  1.  Initial KYC Verification: The process begins with the traditional KYC verification. During this step, the user’s identity is thoroughly checked and validated by a trusted institution, such as a bank or a financial service provider. This verification typically involves submitting various forms of identification and undergoing rigorous checks to ensure authenticity and compliance with regulatory standards.
  2. Creation of a Digital Identity in a User-Controlled Wallet: Once the initial verification is complete, a digital identity is created for the user. This digital identity is issued to the user and stored in a user-controlled wallet, often referred to as a digital wallet or identity wallet. The wallet is a secure, encrypted application that allows users to manage and control their personal information directly from their devices.
  3. Secure Data Storage: The verified KYC data is stored securely within the user-controlled wallet. Advanced encryption methods are used to protect this data, ensuring that it remains confidential and tamper-proof. Users have full control over their data, deciding who can access it and under what conditions.
  4. Data Sharing Mechanism: When the user needs to undergo KYC verification with a new institution, they can share their verified digital identity from their wallet. This sharing mechanism is secure and user-consent driven, meaning that the user explicitly authorises each data-sharing request. The data is transmitted in a way that ensures privacy and security, typically using a protocol such as DIDComm or OpenID for Verifiable Credentials. .
  5. Verification by Receiving Institutions: Upon receiving the shared KYC data, the new institution can quickly verify the user’s identity without needing to repeat the entire KYC process. The institution trusts the initial verification conducted by the trusted entity and the integrity of the data stored in the user-controlled wallet. This significantly reduces the time and resources required for identity verification.
  6. Updates and Re-verification: Over time, users might need to update their KYC information, such as changes in address or contact details. The user can update their information in their digital wallet, and the updated data can be re-verified by a trusted institution. Once re-verified, the updated information is securely stored in the wallet and can be shared with other institutions as needed, ensuring the data remains current and accurate.

By streamlining the KYC process, reusable KYC enhances user experience by reducing repetitive submissions of information while improving security and compliance for institutions. This innovative approach fosters greater trust and efficiency in identity verification, transforming the way personal data is managed and shared.

Major Features of Reusable KYC

Reusable KYC offers a transformative approach to identity verification, addressing the inefficiencies and limitations of traditional KYC processes. Here are the key features that make reusable KYC a superior alternative:

  1. Cost Efficiency:
    • Reduction in Repeated Verification Processes: Traditional KYC requires customers to submit the same information repeatedly for different services, leading to redundancy and inefficiency. Reusable KYC eliminates this by allowing verified data to be used across multiple institutions, thus significantly reducing repetitive documentation and verification tasks.
      Address Traditional KYC Challenge 2 and 3 – Repetitive Use of Customer Data and Redundant Documentation
    • Lower Operational Costs for Businesses: By streamlining the KYC process, businesses can save on the resources and time typically spent on conducting multiple verifications. This reduction in operational workload translates into lower overall costs, making reusable KYC a cost-effective solution for businesses of all sizes.
      Address Traditional KYC Challenge 1 – High Costs of KYC Checks

  2. Enhanced Security:
    • Blockchain-Based Identifier: One of the primary security enhancements in reusable KYC is the use of DIDs. These blockchain-based identifiers ensure the integrity of the KYC provider without storing sensitive records on the blockchain. This approach mitigates the risk of centralised databases becoming attractive targets for cyberattacks.
    • Cryptographic Security: The use of advanced cryptographic techniques secures user data, ensuring that only authorised parties can access and verify the information. This robust layer of security addresses the vulnerabilities associated with traditional centralised KYC databases, which are often susceptible to breaches and data theft.
      Address Traditional KYC Challenge 4 – Centralised Databases and Honeypots in Traditional KYC

  3. Compliance and Standardization:
    • Adherence to Regulatory Standards: Reusable KYC solutions are designed to comply with various regulatory requirements, ensuring that institutions meet their legal obligations without additional complexity. This compliance is built into the system, reducing the regulatory burden on businesses.
    • Uniformity in Verification Procedures: By standardising the KYC process, Reusable KYC ensures that verification procedures are consistent across different institutions. This uniformity not only simplifies compliance but also enhances the reliability and accuracy of identity verification across the board.
      Address Traditional KYC Challenge 5 – Regulatory Burdens and Counterparty Risk

  4. User Control:
    • Data Access Control: Users have greater control over their personal data with reusable KYC. They can decide who has access to their KYC information, granting or revoking permissions as needed. This control enhances privacy and empowers users in the management of their identity information.
    • Easy Consent Management: Managing consent for data sharing is straightforward and user-friendly in reusable KYC systems. Users can effortlessly provide consent to different institutions, making the process of sharing and updating KYC data seamless and transparent.

  5. Speed and Convenience:
    • Faster Onboarding Process: The reuse of verified KYC data accelerates the onboarding process for users, allowing them to access services more quickly compared to traditional methods that require repeated verifications.
    • Instant Verification for Businesses: Businesses benefit from the ability to instantly verify user identities, reducing wait times and enhancing the customer experience. This immediacy not only improves operational efficiency but also increases user satisfaction.

In short, reusable KYC resolves the shortcomings of traditional KYC, setting a new standard for identity verification in the digital age.

Tangible Benefits of Reusable KYC in Action

For Businesses:

  • Streamlined Operations: Reusable KYC allows businesses to optimise their operations by eliminating redundant verification tasks. For example, a financial institution can onboard new customers more efficiently, reducing the time and resources spent on repeated identity checks, thereby allowing staff to focus on providing better customer service and developing new financial products.
  • Reduced Risk of Fraud: By employing advanced detection technologies, businesses can significantly lower the incidence of fraud. For instance, an online marketplace can utilise reusable KYC to verify sellers’ identities in real-time, preventing fraudulent accounts and ensuring a safer environment for buyers and sellers alike.
  • Improved Customer Satisfaction: A quicker and smoother verification process enhances the customer experience. For example, a telecommunications company that uses reusable KYC can activate new phone services instantly, delighting customers with the speed and efficiency of service activation.
  • Increased Revenue Due to Cost Reduction: Businesses save on the costs associated with traditional KYC processes. For example, a bank that adopts reusable KYC can reduce the expenses related to manual identity verification, allowing it to lower fees for customers or invest in new services, thereby boosting overall revenue.

For Customers:

  • Simplified Verification Process: Customers enjoy a more straightforward verification process with reusable KYC. For example, an individual opening accounts with multiple financial service providers can verify their identity once and use that verification across different institutions, saving time and avoiding repetitive paperwork.
  • Enhanced Privacy and Control Over Personal Data: Customers have greater control over their personal information. For instance, a user of a health insurance platform can decide which medical service providers can access their KYC data, ensuring their privacy is maintained while still receiving necessary services.
  • Quick and Seamless Access to Services: The efficiency of reusable KYC allows customers to access services swiftly. For example, a user signing up for a new digital wallet can complete the KYC process instantly, enabling immediate use of the wallet for transactions without waiting for lengthy verification processes.

By transforming traditional KYC processes, reusable KYC offers real-life advantages that enhance operational efficiency, reduce fraud, and improve user experiences, ultimately benefiting both businesses and customers.

Capitalise on the Benefits of Reusable KYC with cheqd

cheqd, together with FinClusive and Verida, introduced a verifiable KYC/KYB solution driven by digital credentials, aimed at revolutionising client onboarding and monitoring in both traditional and decentralised financial services worldwide.

This solution streamlines the client onboarding process and related compliance activities, cutting down onboarding costs, enhancing operational efficiency, and guaranteeing compliance with existing and evolving regulatory requirements in traditional as well as emerging alternative and decentralised financial sectors.

Interested organisations looking to harness the benefits of reusable KYC/KYB credentials are invited to contact [email protected] for more information on how to integrate this transformative solution into your operations.

The Downsides of Traditional KYC & Innovative Solutions

This is the first article in a series of five.

In the banking and finance sector, Know Your Customer (KYC) processes are critical to ensure compliance with global regulations and to prevent fraud. 

These processes require banks to verify the identity of their customers and assess their risk levels before establishing a business relationship. 

However, traditional KYC methods often involve manual, time-consuming tasks that can lead to inefficiencies, security breaches, and customer dissatisfaction. 

As a result, there is a growing recognition of the need for innovative technological solutions to streamline these processes, improve security and the customer experience. 

To provide clarity on real-world use cases and the need for these innovative solutions, we will outline the top five challenges faced in traditional KYC and their corresponding solutions.

Understanding Customer Verification

Customer verification is the process through which businesses confirm the identity of their clients to ensure transactions are lawful and to mitigate risks associated with fraud, money laundering, and other illegal activities. 

Traditionally, customer verification has involved collecting, analysing, and in some cases retaining physical identity documents, which consumes considerable time and raises concerns about data privacy and security.

Top 5 Challenges in Traditional KYC

1. High Costs of KYC Checks

KYC processes are notably costly, with expenses ranging from £10 to £100+ per check, posing significant challenges for industries operating on thinner margins like e-commerce, online gambling, and adult content.

These sectors often resort to less secure age verification methods due to the prohibitive costs of KYC processes, adversely affecting their security and compliance.

Amit Sharma, Founder and CEO of FinClusive, highlights the impact of these challenges:

“The rising cost of inefficient compliance in the client onboarding, KYC/KYB, and verification process is both crippling for service providers and detrimental to customers’ experience and privacy.”

As an answer to that call, FinClusive’s collaboration with the cheqd network seeks to address these issues.

By integrating the cheqd network with the Verida Wallet, it allows users to securely store and share their FinClusive credentials.

Sharma emphasises the significance of this integration:

“Integrating the cheqd network into the Verida Wallet sets an industry benchmark for a regulatory-compliant digital credential application and introduces a more efficient model for the traditional finance sector.”

For these reasons, organisations should seek solutions that:

  1. Reduce operational costs
  2. Enhance customer experience
  3. Ensure regulatory compliance

2. Repetitive Use of Customer Data in Traditional KYC

In the UK, approximately 25% of financial applications are abandoned, with a significant cause being the friction associated with repetitive KYC processes.

Each time a customer interacts with a new company, they are subjected to the full KYC procedure from the beginning, leading to frustration and lost opportunities for businesses.

This redundancy not only deteriorates the customer experience but also escalates operational expenses as companies independently conduct extensive KYC assessments.

Consequently, the absence of data interoperability between different entities exacerbates these challenges, highlighting a critical area for improvement in KYC practices.

Because of this, organisations must adopt solutions that:

  1. Facilitate data sharing and privacy
  2. Leverage advanced technologies
  3. Enhance data security

3. Redundant Documentation in Traditional KYC

Traditional KYC procedures frequently rely on utility bills and similar documents for identity verification, inadvertently compelling customers to disclose more personal information than what may be required.

This oversharing raises significant privacy concerns and places the appropriateness and security of utilising these documents for financial verification purposes in question.

This practice underscores the need for a more nuanced approach to identity verification that prioritises customer privacy while ensuring security.

It also highlights the growing demand for innovative solutions that can streamline the KYC process, reducing reliance on potentially sensitive documents.

For these reasons, it’s important for businesses to leverage solutions that:

  1. Offer secure and efficient identity verification
  2. Implement real-time document verification
  3. Reduce the need for manual checks

4. Centralised Databases and Honeypots in Traditional KYC

Centralised databases, a common element in traditional KYC processes, present significant security challenges due to their vulnerability to data breaches and cyber attacks.

This structure not only limits the potential for scalability but also necessitates continuous verification callbacks to KYC providers, further highlighting the inefficiency and vulnerability inherent in the system.

The reliance on such centralised systems underscores the urgent need for more decentralised and secure alternatives in identity verification processes.

This is why it’s important for businesses to explore solutions that:

  1. Utilise blockchain technology for decentralised trust infrastructure
  2. Implement self-sovereign identity solutions
  3. Leverage biometric verification methods

5. Regulatory Burdens and Counterparty Risk

The rise of sophisticated fraud techniques, including deepfakes and AI-generated identities, has significantly compounded the complexity of ensuring the authenticity of KYC data.

Banks are increasingly undertaking redundant checks due to counterparty risks, where the reliance on third-party verifications is considered too risky.

This heightened scrutiny is in response to regulatory expectations that require firms to continuously manage and verify the integrity of their AML/KYC processes.

The advent of deepfakes and advances in artificial intelligence exacerbate these challenges, making it more difficult to guarantee that KYC documentation actually pertains to the person in question rather than a fabricated AI-generated identity.

This is why it’s more important than ever for organisations to find and leverage solutions that:

  1. Employ innovative tech detect and prevent fraudulent activities
  2. Incorporate real-time data analysis
  3. Enable greater transparency and traceability of transactions

The Lack of Incentive for KYC Innovation

In addressing these multifaceted challenges, it becomes evident that the banking and finance sector is not proactively seeking solutions to the cumbersome nature of traditional KYC processes. 

This hesitation is understandable, given the lack of incentive for individual institutions to innovate in identity verification and customer onboarding. 

Regulatory Roadblocks

The prevailing regulatory environment imposes heavy compliance burdens on these institutions, absorbing significant resources and financial investment. 

With such a considerable portion of their budgets dedicated to meeting these regulatory requirements, there is little motivation to allocate additional resources towards developing new identity solutions. 

Lack of Accountability

Furthermore, the responsibility for overcoming these systemic issues is often perceived to be outside the purview of individual banks or financial entities, leading to a situation where the burden of innovation falls to regulators or third parties. 

This perspective not only hampers the advancement of more efficient and secure verification methods but also sets the stage for a broader discussion on the necessity of incentivisation within the sector. 

Finding the Right Incentives

As we explore the potential of self-sovereign identity and reusable KYC as transformative solutions, the upcoming narrative will delve into the trust triangle of issuer, holder, and verifier, highlighting how the right incentives can catalyse significant improvements in customer verification processes.

The Future of Customer Verification Innovation

The outlined challenges underscore the growing necessity for financial institutions to reimagine their customer verification processes. 

Traditional KYC approaches, fraught with inefficient verification methods, repetitive documentation, and fraud risks, have created a cumbersome customer experience while exposing institutions to security vulnerabilities. 

Furthermore, heavy regulatory burdens and operational inefficiencies highlight the need for more innovative, secure, and user-friendly solutions.

Self-sovereign identity (SSI) and reusable KYC emerge as promising approaches. 

They address these challenges by empowering individuals with control over their identity data and streamlining the verification process across services. 

The finance sector’s growing interest in and adoption of decentralised identity technologies showcases their potential to revolutionise customer verification, promising enhanced security, efficiency, and user experience.

cheqd - reusable KYC/KYB Digital Credential Solution

cheqd, in collaboration with FinClusive and Verida, launched a verifiable KYC/KYB solution powered by digital credentials to modernise client onboarding and monitoring across traditional and decentralised financial services on a global scale.

This solution optimises the process of client onboarding and associated compliance tasks, reducing onboarding expenses, boosting operational effectiveness, and ensuring adherence to current and evolving regulatory standards across conventional as well as expanding alternative and decentralised financial sectors.

Interested organisations please contact [email protected] to capitalise on the benefits of reusable KYC/KYB credentials.

Current Business Models of Identity or Data

Co-authored by Fraser Edwards and Teresa Chan

This is the start of a new series of blogs about self-sovereign identity or decentralised identity companies should start embracing a Fintech mindset. The explanation and arguments will be discussed in the subsequent blogs to validate that the core value of Credential-as-a-Service lies in the credentials and proofs, facilitating market creation and  the onboarding of issuers, verifiers, and users.

In today’s digital age, our online interactions fuel a vast ecosystem of data, shaping the business landscape in unprecedented ways. The buzzwords of identity and data are at the heart of modern business models, impacting various industries and applications. From finance to marketing and beyond, our commercial world thrives on the effective use of data and identity. This blog dives into the prevailing commercial models centred around identity and data. We will examine how data is processed in the context of ad placement and telecommunications. Along the way, we will investigate the challenges that come with these models, emphasising the balance of power needed between identity/data subjects and issuing/verifying organisations.

Commercial Models on Identity or Data

Number of Parties Involved

To better understand the full spectrum of commercial models, we can start by categorising them based on the number of parties engaged and the flow of information.

  1. Uni-lateral

    In a unilateral model, the exchange of information is a one-way flow, typically initiated by an authoritative entity. A prime example is the issuance of an International Certificate of Vaccination by a healthcare professional to a patient. The healthcare professional, acting as the issuer, generates and provides details based on the patient’s health records. The patient, as the data subject, receives the certificate without active participation in the information generation process. This model is straightforward, with a single party taking the lead in providing information to the data subject.

  2. Bi-lateral

    The bi-lateral model introduces a two-way flow of information between the data subject and a verifying entity. Take the example of a Passport Office processing passport applications. The data subject, an applicant, provides personal information, and while some details may be pre-existing or known to the Passport Office, there is a need for the applicant to actively participate in the exchange. The Passport Office verifies the information provided, and details for the passport are generated. This model reflects a mutual interaction where both parties contribute to the flow of information, creating a dynamic and collaborative process in identity verification.

  3. Multi-lateral

    In a multilateral model, the exchange involves multiple validating entities collaborating on identity-related processes. BankID in Sweden exemplifies this approach, where Know Your Customer (KYC), verification, and authentication are shared among various banks. In this scenario, the data subject engages with multiple validators (banks) during the identity verification process. The complexity increases as different entities mutually contribute to the verification and authentication procedures, creating a networked approach. This model is characterised by a shared responsibility among several parties, often facilitated by a centralised system, ensuring a robust and comprehensive verification process that goes beyond the capabilities of a single entity. Already, this model is extending beyond the banking sector, involving diverse industries in collaborative identity ecosystems.

Another Lens: B2C, B2B & B2B2C

LogTo, a third party identity management cheqd has adopted to hand user authentication and login for both cheqd Studio and Creds, wrote an excellent blog explaining business model’s identity systems, focusing on the nature of the parties involved beyond pure numbers. The following is an excerpt:

  1. B2C (A Simple Consumer App)
    In a consumer-oriented app, such as a music streaming service, the identity model oversees numerous levels of user access and permissions according to their subscription plans. 
    1. Free Plan User:
      1. Access to a limited selection of free music.
    2. Pro Plan User:
      1. Access to the free music library.
      2. Ability to create and save personalised playlists.
    3. Advanced Plan User:
      1. Access to the complete music library, including HiFi quality tracks.
      2. Ability to create and save custom playlists.

         

  2. B2B (Software as a Service)
    In this setup, services are provided to many clients using a multi-tenant architecture, where each client maintains their own dedicated resources, yet identities are managed collectively through a single system. The key distinction between SaaS and consumer apps is the incorporation of an “organisation” layer with specific access control policies in SaaS apps. This layer represents a group of users who require a structured approach to resource access.

     

  3. B2B2C (Multi Sided Business)
    The multisided platform business model facilitates connections between distinct groups of users, serving as an intermediary. This approach spans both consumer (B2C) and business (B2B) markets. In the case of a ride-sharing taxi app, the platform connects passengers with available drivers, enabling convenient transportation options while providing drivers with a steady flow of customers.

     

  4. Advanced Identity and User Management Models
    1. Agencies
      If you are an agency managing user identity systems for different clients, each client’s app will have its own distinct identity system. In this scenario, establishing separate tenants for each client is the most effective approach.
    2. Integrate with other partnered applications
      You are developing a consumer app called App A, complemented by App B and App C to enhance its features. They should be made available to your end users as part of a bundled package.
    3. Platform and marketplace product
      You develop an app for third-party companies to create their own services using your app’s API. These apps are maintained by third parties rather than by you, except for the management of user identities. They will request specific permissions from users to operate their services.

Payment Dynamics in Identity Flows

While the number of parties engaged in an exchange is essential, commercial models for digital identity can be distinguished by the pricing structures applied between the parties involved in digital identity exchange.

Paid for by the individual/company (or the “identity subject”)

  1. Free
    Within the digital identity landscape, the free model represents a scenario where certain credentials are bestowed upon individuals or companies without any monetary exchange. This implies that obtaining a specific identifier, such as a tax registration number or Social Security Number, does not incur any direct cost. Such fundamental identification elements are provided as a public service or a basic right, allowing individuals and businesses to access essential services without financial constraints. This model emphasises the foundational nature of certain identity components, positioning them as freely accessible tools for participation in various aspects of societal and economic structures.

    Credentials of this type are often referred to as anchor credentials, as they are typically high-assurance and issued from a root of authority, i.e. a nation state government.

  2. Freemium
    Under the freemium model, the emphasis lies on a dual-tiered approach where a significant portion of interactions remains complimentary, but specific features or services incur a charge. To illustrate, consider the issuance of a university degree. The core degree, representing the culmination of an individual’s academic efforts, is typically provided at no additional cost beyond tuition fees. However, the freemium aspect comes into play when individuals seek extra copies of their degree, necessitating a separate payment. This model strikes a balance between providing essential services at no cost while allowing for monetisation of supplementary, non-essential components.

  3. Transactional
    The transactional model involves a direct financial transaction for each instance of issuance or verification. In the context of digital identity, this is exemplified in processes like passport applications. Here, the applicant incurs a one-time fee payable to the passport office to obtain the latest valid document. This model emphasises a straightforward economic exchange where the cost is directly tied to the specific identity-related transaction, creating a clear financial relationship between the individual and the issuing or verifying entity.

  4. Data mining
    The data mining model introduces a more nuanced approach to digital identity, focusing on the meticulous recording of interactions between individuals or companies and organisations. In this scenario, the metadata and behavioural data generated during these interactions are harnessed to construct identity profiles. While the initial interactions may appear free to the individual or company, the true monetisation occurs through the sale of inferred insights and data to other entities. Programmatic targeted advertising serves as a prominent example, where the individual becomes the product as their identity-related information is leveraged for targeted marketing. This model raises questions about the balance between individual privacy and the commercial value derived from data-driven identity profiling.

Paid by verifying organisation(s), free for individual/company

  1. Direct relationship with one organisation

    In this model, an individual or company willingly provides identity attributes to an organisation requiring verification. The responsibility of the verification process lies with the organisation, which covers the associated costs or outsources the task to third-party verification providers. A classic example is the KYC process for opening a bank account. While the individual or company is not charged for identity verification checks, the bank, acting as the verifying organisation, may engage third-party identity verification providers like FinClusive, Onfido or Alloy, or corporate identity verification providers such as Dun & Bradstreet. These third-party providers often derive information from diverse sources, including government records. The pricing structure for this model can vary, including:

    • Pay-as-you-go
      • Description: Under the pay-as-you-go pricing model, the verifying organisation is charged for each individual interaction involved in the identity verification process. This could encompass manual verifications or API calls, depending on the chosen method.
      • Example Scenario: A startup company offering a mobile-based financial service decides to integrate identity verification for user onboarding. Since the startup is in its early stages, the number of new user registrations varies each month. Instead of committing to a fixed subscription, the startup opts for a pay-as-you-go model with a third-party identity verification provider. In a month with a high influx of new users, the startup pays for the exact number of verifications performed. Conversely, during slower months, the costs decrease proportionally, ensuring the company only pays for the services it actively utilises. This flexibility is particularly advantageous for businesses experiencing fluctuating user acquisition patterns.
    • Tiered subscriptions
      • Description: The tiered subscriptions model involves verifying organisations paying fees in predefined blocks or tiers based on their anticipated or actual usage. This structure provides a graduated approach to pricing, with costs increasing as the volume of identity verification checks rises.
      • Example Scenario: Consider a large financial institution that anticipates a substantial number of KYC checks each month. In a tiered subscription model, the institution would subscribe to a specific tier that aligns with its projected usage. The pricing would be structured in blocks, ensuring that the organisation pays a set fee for a defined level of verifications. This model is advantageous for organisations with varying levels of verification needs, offering a cost-effective solution compared to pay-as-you-go for high-volume users.
    • All-you-can-eat
      • Description: In the all-you-can-eat pricing model, the verifying organisation pays a single, fixed fee regardless of the volume of identity verification checks conducted. This offers a straightforward and predictable cost structure, irrespective of usage.
      • Example Scenario: Imagine a smaller business with a consistent but moderate need for identity verification services. Opting for an all-you-can-eat model, the organisation pays a single fee, providing unlimited access to the verification service. This is particularly beneficial for organisations with steady, predictable verification needs, as it ensures cost stability without the need to monitor usage closely.
    • The choice between pay-as-you-go, tiered subscriptions, and all-you-can-eat models depends on the specific requirements, usage patterns, and budget considerations of the verifying organisation.
  1. Mutualised costs across multiple organisations The practice of dividing identity verification expenses among multiple organisations involves a fair allocation of costs, either evenly or based on proportional usage. This approach often extends from the direct relationship model. An illustrative example is observed in initiatives like the BankID consortium in Sweden. Here, the entity managing BankID is jointly owned by Swedish banks, showcasing a collaborative approach to running the system while distributing costs among the participating entities as each bank bears its own KYC costs independently. Outside of banking, thousands of organisations from the mobile payments, public, and private sectors use BankID. They all need to collectively share the costs as well. In essence, the mutualised cost-sharing model represents a cooperative and cost-effective strategy, ensuring that the expenses tied to identity verification are distributed among multiple organisations while providing a valuable service to the individual or company without imposing direct costs on them.

Case Studies on Personalisation-inclined Sectors

There is a notable surge in the prevalence of bilateral and data mining commercial models in the last decade. This trend is particularly pronounced in sectors such as ad placement and telecommunications, where the common thread lies in their inclination towards targeted and personalised services.

Programmatic Targeted Advertising

Advertisers leverage various aspects of an identity subject’s (individual’s or company’s) digital identity to deliver targeted and personalised advertisements. The largest advertising platforms are run by Google, Facebook, Amazon, and Apple. Here’s an overview of how the process typically works:

Data Collection

  • Browsing Behaviour: Advertising platforms track users’ online behaviour, including the websites they visit, the products they view, and the searches they perform. This data helps create a comprehensive profile of the user’s interests and preferences.
  • Demographic Information: Digital identity attributes such as age, gender, location, and device type are collected to build a more accurate user profile.
  • Social Media Engagement: Information from users’ social media activities, including likes, shares, and comments, is often integrated to enhance the understanding of their preferences.

User Profiling

  • Advertising platforms use sophisticated algorithms and machine learning models to analyse the collected data and create detailed user profiles. These profiles include insights into users’ interests, behaviours, and potential purchasing intent.

Targeting and Segmentation

  • Based on the user profiles, advertising platforms segment the audience into specific groups. This segmentation allows for more precise targeting of ads to audiences with similar characteristics or behaviours.
  • Advertising platforms may categorise users into segments like “young professionals interested in tech gadgets” or “parents looking for family vacation options.”

Real-Time Bidding and Auctions

  • Ad space on websites and apps is often sold through real-time bidding auctions. Advertisers bid for the opportunity to display their ads to users in specific segments.
  • The bidding process occurs in milliseconds as a user loads a webpage or app, allowing for nearly instantaneous ad placements.

Ad Delivery

  • The winning bidder’s ad is dynamically delivered to the user’s device in real-time. This could be in the form of display ads, video ads, sponsored content, or other formats.
  • The goal is to present users with ads that align with their interests and preferences, increasing the likelihood of engagement.

Performance Measurement

  • Advertisers monitor the performance of their campaigns by analysing metrics such as click-through rates, conversion rates, and user interactions.
  • These metrics provide insights into the effectiveness of the ad placements and help advertisers refine their targeting strategies.

Monetisation of User Data

  • In some cases, user data itself becomes a commodity. Ad networks or data brokers may aggregate and anonymize user data, selling these insights to other businesses for various purposes, including market research and trend analysis.
  • “You’re not the customer, you’re the product”.

     

Telecommunications

Telecommunication companies (Telcos) play a significant role in the digital identity landscape. Some engage in selling user attributes in the same way some advertising platforms do, whilst others utilise digital identity for various other purposes, including service provision, personalisation, and potentially, targeted offerings. Here’s an overview of how these companies incorporate digital identity within their commercial models:

User Registration and Account Creation

  • When users subscribe to services offered by Telcos, they typically go through a registration process. During this process, users provide essential information that contributes to their digital identity, such as names, addresses, contact details, and account credentials.

Service Usage Data

  • Telcos collect data related to users’ usage of their services. This includes call records, text message logs, internet usage patterns, and location data if users have opted into location-based services.

Customer Profiles

  • The collected data contributes to the creation of customer profiles. These profiles include details about users’ communication preferences, device usage, network habits, and potentially even preferences related to content consumption.

Personalisation and Targeted Offers

  • Leveraging the gathered data, they can personalise the user experience. This may involve recommending specific service plans, suggesting relevant add-ons or features, and tailoring promotions based on user behaviour.
  • For example, if a user consistently uses a large amount of mobile data, the companies might offer personalised data plans or promotions related to high-speed internet services.

Cross-Selling and Partnerships

  • The Telcos may collaborate with third-party partners for cross-selling opportunities. With user consent, certain attributes of the digital identity may be shared with partners to offer complimentary services or products.
  • For instance, if a user subscribes to a broadband plan, there might be collaborations with streaming services or technology providers, and personalised offers related to these collaborations could be presented to the user.

Data Monetisation

  • While they primarily use customer data for service improvement and personalisation, there may be instances where anonymised and aggregated data is used for broader market insights or collaborations with advertisers. This involves extracting trends and patterns from the data without directly selling individual attributes.

Challenges on Existing Business Models on Identity or Data

Despite the widespread adoption of the aforementioned business model of identity or data, they come with several challenges that warrant attention and thoughtful solutions, shaping the discourse surrounding privacy, security, fairness, and ethical data practices.

  1. Opaque Data Monetization Practices
    The acquisition and selling of identity subjects’ data on digital platforms often lacks transparency. Users may be unaware of how their data is being monetised, and this lack of transparency means they often do not receive any tangible benefits from the process.

  2. Imbalance in Incentives
    Current identity solutions, especially in the last decade, prioritise the interests of issuing/verifying organisations over the identity subject, i.e. individual/company. The identity subject at best has to directly pay (sometimes prohibitive) fees to acquire documents; and at worst often have no real control over their own data (as often in targeted advertising.)

  3. Data Misuse and Limited Autonomy
    The collection and utilisation of identity subjects’ data for commercial purposes raise concerns about potential misuse. Unauthorised access or improper handling of sensitive information can lead to breaches of privacy. Additionally, individuals often have limited control over how their data is collected, used, and shared.

  4. Vulnerability to Cybersecurity Threats
    With the continuous evolution of cyber threats, safeguarding digital identities and sensitive data becomes increasingly challenging. Data breaches and cyber-attacks pose significant risks to both businesses and individuals. As more personal information is stored and shared online, the risk of identity theft and fraud grows, leading to financial losses and reputational damage.

  5. Geographical Disparities in Identity Costs
    The costs associated with acquiring and verifying identity vary significantly based on geographical and industry contexts. What may be deemed affordable in one country can be exorbitant in another. Even within a country, affordability and access to verified identity may be prohibitive for disadvantaged demographics. The unfortunate consequence is exclusion due to a lack of verified identity that impacts large parts of society.

What’s Next?

In wrapping up our exploration of today’s identity and data business models, it’s clear we need to improve the foundations on which the identity subjects’ data is owned, shared, and monetised. In essence, we shall put individuals and entities back in control of their digital identities. Here’s a ray of hope — enter Self-Sovereign Identity (SSI), a decentralised identity model that empowers identity subjects to decide who accesses their data, the extent of data access, and under what circumstances. By embracing SSI, we embark on a journey towards transparency, user-centric control, and heightened security.

Stay tuned to the next blog.