The simple act of connecting to your internet bank includes several steps. While they may seem identical, each encompasses its own process. The user simply enters their information, however a lot more goes on behind the scenes. This explanation will allow you to better understand these unseen operations!


The first step. The user signifies who they are, for example, by entering a user name.


The user is tested. The system confirms that the identity of the user claiming to be the user matches with the real identity of the user. For example, the system can check whether the ID and photo they have on file matches the face of the user who is trying to connect to the system. Many service operators don’t put a lot of effort into this process, simply replacing it with the creation of an account.


Carried out every time the user connects to the system. Usually this operation involves a PIN code or password entry. In most cases authentication encompasses a combination of three elements – what the user knows, who they are and what they have. This process can be replaced by facial recognition.


Verified validation checks the electronic identity. During the process the system makes sure that the electronic identity is valid.


The last step. Activates the rights granted to users within the system and defines which actions they can take.

Sanita Meijere, SK ID Solutions Director in Latvia

More in category

More about us

Become a member

Recently searched


Results for

Load more

Documents - 0
Pages - 0

Load more