Interoperable Digital Identity and Patient Matching
1.0.0-ballot - STU Ballot 1 US

This page is part of the Interoperable Digital Identity and Patient Matching (v1.0.0-ballot: STU 1 Ballot 1) based on FHIR R4. . For a full list of available versions, see the Directory of published versions

Guidance on Identity Assurance

Overview

This section provides guidance that goes beyond NIST 800-63A for its practical application in healthcare settings. The following example procedures can be used to achieve IAL2 and other identity assurance levels between IAL1 and IAL2 in typical healthcare workflows and considering the identity evidence generally available across all patient populations. With a desire to address this guidance in a way that is mindful of health equity considerations, the group has spent a substantial amount of time contemplating sensitive populations such as pediatric patients and unhoused persons, and this guidance therefore reflects an understanding of the prevalence of shared home addresses (when shelters and last known hospitalization are used for this) and other cases where identity evidence typically needed for IAL2 remote may not be available. The levels articulated below and the systems of Identity Providers following this guidance SHALL be consistent with NIST 800-63 except as specified otherwise in this guide. Specifically, IAL1.6 and IAL1.8 requirements are intended to be consistent with NIST 800-63A identity verification procedures for IAL2 identity assurance, however with different required identity evidence as indicated.

Best Practices for Identity Verification

The intermediate identity assurance levels (IAL1.2-1.8) described below have NOT been endorsed by NIST in any capacity, though feedback has been invited.

To verify an individual’s identity at one of the levels below, the following information about the individual SHALL be collected:

  • Full legal name (the name that the person was officially known by at the time of issuance of the supporting evidence; not permitted are pseudonyms, aliases, an initial for surname, or initials for all given names)
  • home address
  • date of birth
  • email address
  • mobile number (preferred, and consider that there are free services to create one since having one facilitates matching and credential management; if a mobile number is not available, collect an alternative number for the individual)

Unless explicitly required in certain levels, control of the email address SHOULD be verified at every level of assurance.

The Identity Provider then validates this information using appropriate evidence from the list below, verifying any required evidence submitted, corresponding to the desired level of identity assurance:

  • IAL1 requirements:
    • Declaration of identity assertion by the individual indicates that submitted information represents their own identity

  • IAL1.2 requirements:
    • An unspecified ID was used to verify name and birth date.
    • Declaration of identity assertion by the individual indicates that submitted information represents their own identity

  • IAL1.4 requirements:
    • A US state-issued photo ID or nationally-issued photo ID was used to verify name and birth date.
    • Declaration of identity assertion by the individual indicates that submitted information represents their own identity

  • IAL1.5 requirements:
    • Two of the following were used to verify name, birth date, and home address: 1) US state-issued photo ID, nationally-issued photo ID, or unique Digital Identifier; 2) insurance card; 3) medical record; PLUS if claimed address cannot be verified using those two pieces of evidence along with credit bureau type records,

      ​ verify the individual’s control of an email address OR Fair or stronger evidence confirms the email address belongs to the individual

      OR

      ​ verify the individual’s control of a mobile number OR Fair or stronger evidence confirms the mobile number belongs to the individual

      OR

      ​ verify an Individual Profile Photo

    • Declaration of identity assertion by the individual indicates that all submitted information including name, birth date, and home address represents their own identity

IAL 1.5 identity verification is the lowest level of identity assurance that can be used to establish a unique identity that exists in the real world. It is expected to map to many existing systems’ procedures for enabling patient electronic access to data at a single health system.(5)

NOTE: Although this level of identity verification may be relevant to prevent duplicates in medical record systems, the lack of in person or virtual match of an individual to a photo in evidence or control of an authenticator associated with evidence generally does not provide high confidence in the identity of the individual.

NOTE: Social Security Number (on its own without presenting the card itself) does not have a role as evidence in identity assurance levels beyond IAL 1.5 except as may be needed for identity resolution above and beyond other requried evidence.

  • IAL1.6 requirements:

    • Gov’t issued photo ID confirmed by comparison to individual PLUS

      ​ mail notice to address of record

      OR

      ​ send equivalent notice via email address or phone number associated with the person in records

    • Declaration of identity assertion by the individual indicates that all submitted information including name, birth date, and home address represents their own identity
    • Knowledge Based Verification (KBV) is a process that involves questions related to financial transactions tied to a Social Security Number (SSN). KBV SHALL NOT be used as a substitute for the in-person or remote unsupervised match of the individual to the government issued photo ID at this level or higher, and MAY only be used if necessary as an addition to a photo ID comparison process, when required to resolve to a unique identity

The absence of multiple pieces of identity evidence in IAL 1.6 is mitigated by sending a notice of identity verification, including an email or telephone contact information for the Identity Provider, to the verified Address of Record, or to an email address or mobile number that had already been registered to the person in the Identity Provider’s system OR is billed to their name.

Identity verification at this level and higher always includes verifiation of the individual’s physical residential Address of Record.

  • IAL1.8 requirements:

    2 Fair pieces of evidence were used to verify name, birth date, and home address–for example:

    • Two of: 1) US state-issued driver’s license or other Fair photo ID confirmed by comparison to individual; 2) medical record; or 3) insurance card

      OR

    • Gov’t issued photo ID confirmed by comparison to individual + mobile number billed to the individual;

    Plus declaration of identity assertion by the individual indicates that all submitted information including name, birth date, and home address represents their own identity

  • IAL2 requirements:

    1 Strong plus 2 Fair pieces of evidence OR 1 Superior/Very Strong piece of evidence–for example:

    • State driver’s license confirmed by comparison to individiual plus two of: another Fair photo ID confirmed by comparison to individual plus one other piece of Fair evidence verified

      OR

    • Gov’t-issued passport, REAL ID, Enhanced ID, or US Military ID; this photo ID is confirmed by comparison to the individual

    Plus declaration of identity assertion by the individual indicates that all submitted information including name, birth date, and home address represents their own identity and notice, including an email or telephone contact information for the Identity Provider, is either mailed to the home Address of Record or sent via SMS to the mobile number verified as billed to the individual.

In healthcare settings, additional demographics may also be collected and used in matching (for example, ethnicity, administrative gender and birth sex). Refer to the Patient Matching section for any additional verification steps or assertions that may be required before including such attributes in a match request, or using them to process such a request on the responder’s side.

An Individual Profile Photo to be associated with an identity SHALL be verified during identity verification or a subsequent, authenticated event that confirms the match between the photo and the individual, i.e., as in 800-63 where the photo taken during a proofing event is confirmed as matching with the photo on the individual’s identity evidence for IAL2 remote unsupervised or is confirmed to match the individual when identity verification is performed in person. The photo can be used to prevent errors in matching or in identity resolution.

NOTE: The workgroup has considered whether it may be necessary to perform a Risk Analysis or have a similar discussion providing guidance on the Identity Level of Assurance that is appropriate for various use cases, for example a patient’s access to their own data or to make an interoperable consent, covered entity access to health data for Treatment/Payment/Operations, verification of demographic attributes to flag as verified in the overall record/FHIR Patient resource or with Encounter context as is done in the SMART Health Cards spec.

Additional Examples of Strong Evidence: (1) US State- or territory-issued regular (not REAL ID or Enhanced ID) driver’s license or ID card including a photograph

Additional Examples of Fair Evidence: (1) Other ID card including a photograph and issued by a federal, state, or local government agency or entity (2) A copy of a utility bill (gas, electric, water, cable TV or internet, etc.) indicating the individual’s name and home address (3) A mobile phone number billed to individual (4) An individual NPI in individual’s name (if they are a provider) (5) A bank or credit card statement from a US-based financial institution indicating the individual’s name and home address (6) A state medical license (if they are a provider) (7) Original or certified copy of birth certificate (8) US Social Security Card

References:
    UDAP Levels of Assurance
    NIST 800-63-3A
    SMART candidate Code System for existing NIST levels plus IAL1.2 and IAL1.4

Use of Knowledge-based verification (KBV)

From 800-63-3:

  • KBV SHALL NOT be used for in-person (physical or supervised remote) identity verification.

  • KBV (sometimes referred to as knowledge-based authentication) has historically been used to verify a claimed identity by testing the knowledge of the applicant against information obtained from public databases. The CSP MAY use KBV to resolve to a unique, claimed identity.

  • KBV can be used to verify one Fair piece of evidence

  • NIST 800-63-3A contains additional restrictions on the use of KBV for identity verification at IAL2 in section 5.3.2 Knowledge-Based Verification Requirements.

(5) See also: Patient Records Electronic Access Playbook, Patient IAL2 as in TEFCA and Kantara “IAL2 Light” proposal to NIST (1 STRONG or 3 FAIR).