Reliance authentication uses multi-step inputs to ensure that the user is not a fraud. Some examples include:
The introduction of strong customer authentication2 for online payment transactions within the European Union now links a verified person to an account, where such person has been identified in accordance with statutory requirements prior to the account being opened. Reliance authentication makes use of pre-existing accounts, to piggyback further services upon those accounts, providing that the original source is 'reliable'.
The concept of reliability is a legal one derived from various anti money laundering (AML) / counter-terrorism funding (CTF) legislation in the USA,3 EU28,4 Australia,5 Singapore and New Zealand6 where second parties may place reliance on the customer due diligence process of the first party, where the first party is say a financial institution.
In the Australian legislation, 'reliance' is based upon section 38 of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth).
In the European Commission's Proposal for a Directive of the European Parliament and of the Council on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing, reliance is based upon Article 11(1)(a).
Reliance in the UK has a very specific meaning and relates to the process under Regulation 17 of the Money Laundering Regulations 2007. "Reliance" for the purpose of AML and "reliance authentication" are not the same, although both use similar concepts.
The Federal Financial Institutions Examination Council of the United States of America (FFIEC) issued "Authentication in an Internet Banking Environment", dated October 2005. Reliance authentication is outlined per the final paragraph of page 14.
Advantages of reliance authentication methods are:
Disadvantages of reliance authentication methods are:
"The U.S. Adoption of Computer Chip Payment Cards: Implications for Payment Fraud" (PDF). www.kansascityfed.org. https://www.kansascityfed.org/publicat/econrev/pdf/13q1Sullivan.pdf ↩
"ECB releases final Recommendations for the security of internet payments and starts public consultation on payment account access services". 31 January 2013. http://www.ecb.europa.eu/press/pr/date/2013/html/pr130131_1.en.html ↩
"Bank Secrecy Act/Anti-Money Laundering Examination Manual" (PDF). Federal Financial Institutions Examination Council. 2006. Retrieved 2022-02-18. https://www.ffiec.gov/pdf/bsa_aml_examination_manual2006.pdf ↩
"EUR-Lex - 52013PC0045 - EN - EUR-Lex". http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52013PC0045:EN:NOT ↩
"Anti-Money Laundering and Counter-Terrorism Financing Act 2006". Comlaw.gov.au. Retrieved 2022-02-18. http://www.comlaw.gov.au/Details/C2013C00371 ↩
"AML/CFT Act and Regulations - dia.govt.nz". Archived from the original on 2013-10-04. Retrieved 2013-10-01. https://web.archive.org/web/20131004212749/http://www.dia.govt.nz/diawebsite.nsf/wpg_URL/Services-Anti-Money-Laundering-AMLCFT-Act-and-Regulations ↩
Holm, Eric (23 March 2014). "Social networking and identity theft in the digital society". https://www.academia.edu/34026412 ↩
"Two-Factor Authentication for Beginners". 24 June 2021. https://medium.com/@mshelton/two-factor-authentication-for-beginners-b29b0eec07d7 ↩