Smart-ID: five invisible connection steps

Author: Smart-ID


This is the first step that needs to be performed. In it, the user introduces himself, e.g. by entering his username.


The user is verified. The system verifies that the identity of the person, whom the user pertains to be, corresponds to the user’s identity. For example, the system can verify whether the identity and photograph that is at its disposal match the face of the person trying to access the system. Many services make no effort in this process, simply substituting it with the creation of an account.


Authentication is performed every time the user connects to the system. Usually, this action includes the entry of a PIN code or password. In most cases, authentication entails verification of three elements – what the user knows, who he is, and which he possesses. This process can be replaced with facial recognition.


Verified validation is performed, which checks electronic identity. In the process, the system verified that the electronic identity is valid.


The last step, which activates the rights awarded to the user on the system, and determines what actions he can perform there.