Draft CIP/KYC Use Case Criteria#
Through discussion with our project collaborators, the project team has developed a set of functional and non-functional technical criteria as the basis for our demonstration. These criteria have been gathered from sources including best practices, banking regulatory requirements, and other guidance. We are publishing these criteria for early feedback from our community of interest.
The demonstration criteria in the table below can be filtered in a few ways:
Grouped by the notional architecture component the criteria applies to,
Grouped by the criteria source where the criteria was derived from, or
Grouped by usability criteria, which is a focus area for the demonstration that spans web and mobile interfaces.
By default, all criteria are displayed with their applicable labels in the third column.
ID |
Description |
Labels |
---|---|---|
85 |
Usability evaluations of wallets with target populations should be conducted to identify user burdens and pain points associated with using the Wallets for identity proofing and to ensure that users can accomplish their tasks with effectiveness, efficiency, and satisfaction. |
|
84 |
Provide users with clear and usable ways (such as prominent visual cues and information) to understand and determine the authenticity of the transactions between the Wallets and the demonstration financial institution. |
|
83 |
Wallets should provide an easy and clear way for users to add, update, and delete their mobile drivers’ licenses. |
|
82 |
If users encounter exceptions, such as rejecting the requested attributes or being notified of unsuccessful transactions, the Wallets and/or FIs shall provide clear instructions on resolving the exceptions. |
|
81 |
The consent process and notice should be optimized by minimizing the number of times a user is required to consent to attribute sharing. The consent notice should be presented in concise, easy-to-understand wordings using plain language without legal and technical jargon. |
|
80 |
Wallets shall present communications, such as on-screen instructions for setting up the wallet, labels for identifying different functions, system feedback for successful or unsuccessful transactions (and how to recover), and notifications for important information that are clear, meaningful, and concise. |
|
79 |
Wallets shall provide usable and easy-to-understand user interfaces so that end users can make informed decisions about approving or rejecting the requested attributes to be transferred to the demonstration financial institution. Minimize user steps and navigation. |
|
77 |
Wallets shall use only NIST approved cryptograhy for protecting communications between the wallet and the verifier. |
|
76 |
The demonstration financial institution verifier shall use only NIST approved cryptography to protection communications between the wallet and the verifier. |
|
75 |
The demonstration financial institution verifier shall only use published public key information provided by the TSP and shall not request verification directly from the issuing source (i.e., shall not phone home). |
|
74 |
The issuing source shall generate, provision, and sign mdoc and mdoc MSOs consistent with 18013-5 and AAMVA guidance. Only NIST approved algorithms shall be used. |
|
73 |
The financial mobile applications shall support all requirements of the demonstration financial institution except where requirements are specific to cross device flows. |
|
72 |
The demonstration financial institution shall notify the user of all the attributes they intend to request from the user prior to initiating the request to the wallet. The demonstration financial institution shall gain consent/approval before passing the credential request to the user’s wallet. |
|
71 |
Wallets shall collect, store, and convey user consent after notice and authentication of the end users and before presentation of the requested attributes to the demonstration financial institution. |
|
70 |
Wallets shall present users with a plain language notice of the information being requested by the Financial Institution as well as a plain language description of the reason for its collection. |
|
47 |
The TSP signing public key shall be provided to the use case verifier components. |
|
46 |
The TSP shall provide a documented API to programmatically retrieve the trust list. |
|
45 |
The TSP shall provide a machine-readable, documented format list of public keys that correspond to the Issuers participating in the use case. |
|
44 |
The Issuing Authority shall support provisioning credentials to OEM or 3rd Party Wallets. |
|
43 |
The Issuing Authority shall provide test identities that can be provisioned to and removed from compatible wallets to facilitate use case development. |
|
42 |
The Issuing Authority shall provide a public key to validate issued digital credentials to the Trust Service Provider. |
|
41 |
The demonstration financial institution mobile application shall support an on-device presentment as described in OpenID4VP to support verification events. |
|
40 |
The demonstration financial institution mobile application shall support iOS and Android platforms. |
|
39 |
Wallets shall support a transaction history capability, wherein the record the time of the transaction, claims requested and presented, verifier details, success status are captured. These are only available to the holder, on device and can be deleted by the holder at will. This information shall have a defined retention period and the holder shall be notified of said retention period. |
|
38 |
Cryptographic keys that support the generation of proofs shall be securely stored (i.e., mechanisms provided by the operating system ). |
|
37 |
Wallets shall strongly bind the holder to the credential using an authenticator such as a biometric or PIN. Prior to presentation of any attributes the wallet shall authenticate the user using this mechanism. |
|
36 |
Wallets shall support ISO/IEC 18013-7 (Annex B) OpenID for Verifiable Presentations (OpenID4VP) profile or OpenID4VP over the Digital Credentials API to support tamper evidence presentations of the requested claims (proof) to the Financial Institution |
|
35 |
Wallets shall support privacy preserving capabilities to include selective disclosure of credential data elements and holder consent mechanisms. |
|
34 |
Wallets that support 18013-7 shall support OpenID4VP 2nd Implementer’s Draft as specified in Annex B or OpenID4VP over the Digital Credentials API to retrieve the holder’s mdoc. |
|
33 |
Wallets shall support presentation of the credential in a cross device and on-device scenario as defined by OpenID4VP. |
|
32 |
Wallets shall support the mDoc (ISO 18013-5) standardized credential format to support the FI use case. Other formats may also be supported. |
|
31 |
3rd party wallets shall support iOS and Android platforms. |
|
30 |
The new account creation process shall notify the customer that the bank is requesting information to verify their identities. |
|
29 |
The IDMS shall support binding of an AAL2 equivalent (WebauthN) authenticator during initial customer account enrollment. |
|
28 |
The IDMS shall support a risk or threshold based reauthentication event (i.e., exceeding transaction threshold of 15K) in which the credential holder is prompted to confirm their presence using previously registered or newly registered mDL. |
|
27 |
The IDMS shall support a post-enrollment binding of a phishing resistant AAL-2 or better authenticator, acceptable to the FI, to the customer account. |
|
26 |
The IDMS shall support the binding of an 18013-5 mDoc or W3C Verifiable Credential to the subscriber (test) account during the banking account identity verification process. |
|
25 |
The demonstration financial institution shall cryptographically verify presented holder credentials against a trusted list of public keys that are published by credential issuers. |
|
24 |
The demonstration financial institution shall support a general capability to reauthenticate the customer with an mDL or other authenticator where policy dictates (i.e. high-value transactions). |
|
23 |
The demonstration financial institution shall use a cloud-based or on-premises Identity Management System (IDMS) to manage customer (test) lifecycle activities. |
|
22 |
The demonstration financial institution shall support a capability to retain a description of the document (mDL) the was relied on to verify the customers identity, noting the type of document (mDL), any identification number contained in the document, the place of issuance, and, if any, the date of issuance and expiration date for five years after the record was made. |
|
21 |
The demonstration financial institution shall store digital documents and associated data elements in a discrete repository in alignment with CIP retention requirements (five years after the account has closed). For the purposes of demonstration, a database compliant with CSF 2.0 ID.AM-08.03 and ID.AM-08.05. |
|
10 |
After a positive determination of the customer’s identity proofing, the demonstration financial institution shall store the identifying documents used to derive the customers identity to satisfy CIP retention requirements. For the purposes of this demonstration, the demonstration financial institution shall collect the cryptographically protected proof generated by the mobile device that holds the digital credential as the “document” and the associated data elements. |
|
9 |
The demonstration financial institution shall determine whether the customer appears on any list of known or suspected terrorists or terrorist organizations. For the purposes of this demonstration this will be a demonstration API call to a stubbed service or recorded as a step that is not actively demonstrated. |
|
8 |
The demonstration financial institution shall support a fraud service to ensure that the bank has a reasonable belief in the customer’s identity. The customer’s identification number and identity proofed attributes shall be submitted, and a risk score is returned. |
|
7 |
The new account creation identity proofing process shall collect an identification number[1] in alignment with Customer Identification Program (CIP). For the purposes of this demonstration, the identification number shall be in the format of an unused Social Security Number. |
|
6 |
The new account creation process shall have a mechanism to determine the integrity of the mobile device that holds the digital credential. |
|
5 |
The new account creation identity proofing process shall collect the identification number, place of issuance, date of issuance, and expiration date from the customer’s mobile device that holds the digital identity credential, if available. |
|
4 |
The new account creation identity proofing process shall collect Name, Date of birth, and Address from the customer’s mobile device that holds the digital identity credential using a standards-based method in alignment with Customer Identification Program (CIP). |
|
3 |
The demonstration financial institution shall support an account creation process to support remote identity validation that cryptographically verifies a standards-based digital credential. The verification may occur locally or offloaded to a remote, cloud service. |
|
2 |
The banking services will be accessible by a REST API to support native iOS and Android mobile device applications. The API will also support access from web browsers. |
|
1 |
The demonstration financial institution shall support customer new account creation, account balance viewing, and funds transfer between accounts to support online use cases (mobile apps and web). |
|