Identity and Cable Strategy

Establishing confidence in a person’s identity is a critical starting point for delivering cable services. Identity proofing has traditionally been conducted in ‘face to face’ settings. Our growing digital economy, in which more and more people are looking to transact online at times most convenient to them, creates a range of challenges to these traditional approaches. However it also presents a range of potential opportunities through the use of new and emerging technologies.

Subscribers rely heavily on documents produced by a range of government agencies to help verify their identities. Identity crime is amongst the most prevalent of all types of crime. Identity proofing is an important part of efforts to prevent identity crime. It is also critical to promote the trust and confidence in identities, particularly online, which will be a key enabler of cable experience providers into the future.

The purpose of Xidentix is to strengthen identity proofing processes and increase trust through a standardized and transparent process. To achieve this, Xidentix provides a set of recommended requirements for identity proofing-the process by which organizations seek to verify a person’s identity by collecting information about the person and confirming it with relevant authoritative sources (Information would generally be collected directly from the individual concerned, but may be from another person who is authorized to act on their behalf, such as a legal guardian). Identity proofing is rarely done in absolute terms–rather to a specified or understood level of assurance.


Xidentix encourages greater transparency within our identity ecosystem. We do this by supporting the Kantara Identity Assurance Framework, which provides a common set of standards for categorizing and understanding various identity proofing processes. This framework is suitable for the identification of both people and organizations.
Identity proofing can occur where a person or organization is unknown to a cable provider or where the cable provider wishes to re-assess the person’s claimed identity. These guidelines have been designed to align with United States Electronic Authentication Guidelines NIST Special Publication 800-63-2 (2013).

A person’s identity is not a fixed concept; it is highly dependent on context. It is some combination of characteristics or attributes that allow a person to be uniquely distinguished from others within a specific context. A person’s identity is generally considered to be established naturally at birth or by naturalization through the immigration process. The veracity of claims about a person’s identity is established through evidence provided to meet some or all of the following 5 identity proofing objectives (depending on confidence in the claimed identity required):

1. Confirm uniqueness of the identity in the intended context to ensure that individuals can be distinguished from one another and that the right service is delivered to the right individual. This would include a check that another person has not previously claimed ownership of the identity (i.e. there is a sole claimant), for example by checking the


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s