AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

Size: px
Start display at page:

Download "AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS"

Transcription

1 AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily reflect the positions or policies of the Federal Reserve Bank of Atlanta or the Federal Reserve System.

2 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing. We have members from Banks, ISOs, Card Associations and others related to the risk management side of the industry. MAC s mission is to strengthen the payment ecosystem through ongoing education, communication and cooperation among acquirers, card brands and enforcement agencies.

3 RETAIL PAYMENTS RISK FORUM We serve as a catalyst for collaboration in the consumer and commercial payments risk management arena. We: Conduct research and provide analysis Convene and share with interested parties Promote actions to mitigate risk 3 Take On Payments weekly blog Retail Payments Risk Forum webpage

4 AUTHENTICATION STAGES Pre-transaction Authenticating the customer During transaction Ensuring the transaction is not modified / altered Post-transaction Ensuring the transaction is securely stored to prevent alternation or erasure. 4

5 PROVING WHOM YOU ARE Authentication: A process that ensures and confirms a user s identity. - Techopedia Are you who you say you are? Authorization: The act of granting authority to undertake certain functions. - The Free Dictionary Are you allowed to do what you are asking? 5

6 IDENTITY AUTHENTICATION A Need As Old as Time 6

7 NEW CHALLENGES Passwords aren't dead, though maybe yours should be Despite all those "death to passwords" chants, some say it's still a solid form of authentication -- when users aren't being stupid about theirs. -CSO Online, By Taylor Armerding January 09,

8 AUTHENTICATION FACTOR OPTIONS Something you know Passwords; PINs; images; KBA Something you have Card; tokens; phone Something you are Finger; voice; facial; gesture; keystroke Where you are Geo-location Multi-factor versus Multi-layered 8

9 REGULATORY GUIDANCE - FFIEC Since virtually every authentication technique can be compromised, financial institutions should not rely solely on any single control for authorizing high risk transactions, but rather institute a system of layered security - Supplement to Authentication in an Internet Banking Environment, 6/2011 Customer authentication should follow a risk based approach No single security solution covers all applications/transactions 9

10 FINDING THE RIGHT BALANCE Security/risk versus customer experience Financial liability protection for consumers in the U.S. provides disincentive for consumers to adopt strong security practices 10

11 PAYMENT TRANSACTIONS Checks and PIN-based transactions are the only ones where the authentication is embedded in the transaction For other transactions, process was designed to place liability on party in the best position to perform the authentication ACH: Originating FI Signature credit / POS: Issuer CNP: Merchant Wire: Originating FI 11

12 ENROLLMENT CRITICAL PHASE The enrollment process where the customer s account credentials are initially validated is absolutely critical Enroll a crook and you will only get unauthorized activity The high rates of fraud (10X) experienced by some of the early Apple Pay banks were due to a lack of a strong authentication process of the customer s payment credentials during enrollment Issue has largely been addressed although some FIs are experiencing higher than normal fraud levels 12

13 AUTHENTICATION METHODS Person-to-Person Visual Documents Challenge-Response- Countersign Electronic Passwords KBA Security tokens Online PIN Biometrics 13

14 ELECTRONIC AUTHORIZATION Passwords Outside the commercial environment, strong passwords and change frequency are almost impossible to enforce Easiest to implement although costs for password change and retrieval can easily add up Knowledge Based Answers Dynamic process is more secure but more expensive and likely to have higher rejection rate 14

15 ELECTRONIC AUTHORIZATION 3-D Secure / Randomized PIN Data consistently shows that PIN-based transactions have a significantly lower fraud rate Revised 3-DS process should be more effective Security Tokens Hardware/software used as part of a multi-factor authentication environment 15

16 BIOMETRICS Finger / Palm Print Iris Recognition / Retinal Scan Facial Recognition Signature / Handwriting 16 Voice Recognition Thermogram DNA

17 OTHER BIOMETRICS Behavioral biometrics Measureable behavioral patterns of various muscular and skill-based functions Signature/handwriting, typing, walking, gesture patterns Not as reliable as physical biometrics Soft biometrics Various physical elements that are not by themselves distinctive enough or with the permanence to distinguish an individual Gender, ethnicity, age, scars / tattoos, eye and hair color, etc. Useful in 1:Many systems to quickly narrow down the database 17

18 BIOMETRICS SYSTEM ACCURACY Key difference with biometrics against other electronic authentication methods - the presence of the gray area Password/KBA match is either Yes or No Since biometrics uses an algorithm to derive a calculated value there is rarely a complete match between the value of the original template and the live template value False positives; false negatives All a matter of level of risk one is willing to take 18

19 BIOMETRIC SYSTEM CHARACTERISTICS Characteristic Description Quantitative Measurement Robustness Distinctiveness Accessibility Availability Lack of change over time Large variation over the population Ease in taking measurements Entire population should be measurable Submitted sample does not match the enrolled template (false non-match) Submitted sample matches the enrolled template of another individual (false match) Number of individuals who can be enrolled in a given time period (throughput) Number of individuals who cannot be enrolled due to an inability to supply a readable measurement (failure to capture/enroll) Acceptability Financial Population does not object to having the measurements taken Cost of implementing and operating Attitudinal research Acquisition, implementation, and operating costs 19

20 BANKING SUITABILITY Biometric methods most suited for banking applications: Voice recognition Facial recognition Fingerprint Fingerprint Resolution on phone is 1:45,000 Sufficient for 1:1 matching False rejection rate can be an issue 20

21 BANKING SUITABILITY (CONT.) Voice recognition Various methods for capturing initial template Can be done overt or covertly More expensive to implement/operate but can be used for Call Center and other channels Facial recognition The acceptance of selfies has reduced feeling of invasiveness 1:1 matching provides acceptable results but camera limitations and external environment can impact 21

22 BIOMETRICS WITH PROMISE Iris recognition Near-infrared light scans vein pattern around the iris on the surface of the eyeball One of the fastest due to small byte size of template Provides up to 240 measurement points False acceptance rates of 1:1.2 million Currently used extensively in military and commercial applications Used in other countries for healthcare and national identification programs Biggest issue: requires separate device 22

23 PRIVACY CONCERNS While the use of templates should minimize privacy concerns, a significant level of consumer education will be required for any biometric authentication program System element questions: Overt vs. covert capture? Optional vs. mandatory? Template vs. image? Fixed vs. indefinite duration? User vs. institutional data ownership? Closed vs. open/shared? 23

24 BIOMETRIC PAYMENTS SUITABILITY Biometric Method Availability Distinctiveness Accessibility Robustness Acceptability Financial Fingerprint High High High High Moderate Moderate Facial Recognition Iris Recognition Hand Geometry Voice Recognition Signature Scan High Moderate Moderate Moderate Low Low High High Moderate High Moderate Low Moderate High High Moderate High Moderate Moderate High Moderate High Moderate Moderate High Moderate High Low Moderate High Moderate High Moderate 24

25 MOBILE AS STARTING POINT? Voice, facial recognition and fingerprint biometrics are being tested by a number of FIs Iris recognition is thought to be the best biometric in terms of capture ease and minimal false acceptance rates, but phones not currently equipped with the near-infrared light source required to support the methodology Voice and facial reliability are subject to environment issues of lighting, noise, etc. 25

26 QUESTIONS & DISCUSSIONS Dave Lott Working paper: Improving Customer Authentication 26

27 MAC Mission Statement Strengthen the payment ecosystem through ongoing education, communication and cooperation among acquirers, card brands and enforcement agencies. Who we serve: Acquiring Bank Acquiring Savings & Loan Acquiring Credit Union Gateway Provider Internet Service Provider ISO/MSP Merchant Acquirer Processor Risk Management Professional Your membership in MAC is an investment that should not be overlooked. If you are not a member of MAC JOIN TODAY! 27

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

FSN-PalmSecureID-for ATM Machines

FSN-PalmSecureID-for ATM Machines T he application of biometric solutions in ATMs and electronic point-of-sale solutions provide a high- security environment. By using a smartcard, on which the client's unique palm vein pattern is stored,

More information

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 10 - Identity Management and Access Control MIS5206 Week 10 Identity Management and Access Control Presentation Schedule Test Taking Tip Quiz Identity Management and

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Signer Authentication

Signer Authentication Signer Authentication WHITE PAPER A common question arises as people migrate to electronic signature and electronic contract execution from paper and ink signatures. How do I know my intended signer is

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

2017 NACHA Third-Party Sender Initiatives

2017 NACHA Third-Party Sender Initiatives 2017 NACHA Third-Party Sender Initiatives Jordan Bennett Senior Director, Network Risk NACHA 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing.

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

User Authentication and Human Factors

User Authentication and Human Factors CSE 484 / CSE M 584 (Autumn 2011) User Authentication and Human Factors Daniel Halperin Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual

More information

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

EMERGING PAYMENTS. Breakout and Workshop

EMERGING PAYMENTS. Breakout and Workshop EMERGING PAYMENTS Breakout and Workshop Agenda Why do you need a digital payments strategy? Today - Your members are paying using digital and mobile wallets. If your cards are not enabled in these wallets,

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

Now there is: Asignio web-based signature authentication.

Now there is: Asignio web-based signature authentication. THE COST OF KYC AND AML Know Your Customer (KYC) technology and Anti-Money Laundering (AML) compliance are crucial elements of modern banking. Financial institutions are trusted to verify and authenticate

More information

Face ID Security. November 2017

Face ID Security. November 2017 Face ID Security November 2017 Face ID Security Overview With a simple glance, Face ID securely unlocks iphone X. It provides intuitive and secure authentication enabled by the TrueDepth camera system,

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Table of Contents 01 Introduction 01 The Ongoing Debate 02 Server-Centric Architecture 02 Device-Centric Architecture 02 Advantages

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

2013 NATIONAL ONLINE SAFETY STUDY

2013 NATIONAL ONLINE SAFETY STUDY 2013 NATIONAL ONLINE SAFETY STUDY Methodology and Sample Characteristics The National Cyber Security Alliance has conducted a new study with PayPal to analyze the cyber security behaviors and perceptions

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Lecture 11: Human Authentication CS /12/2018

Lecture 11: Human Authentication CS /12/2018 Lecture 11: Human Authentication CS 5430 3/12/2018 Classes of Countermeasures Authentication: mechanisms that bind principals to actions Authorization: mechanisms that govern whether actions are permitted

More information

Behavioral Biometrics. Improve Security and the Customer Experience

Behavioral Biometrics. Improve Security and the Customer Experience Behavioral Biometrics Improve Security and the Customer Experience Table of Contents Reader ROI & Introduction 1 The challenges of authenticating mobile customers 2 The need for transparent customer authentication

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

INTUS 1600PS Palm Vein Authentication

INTUS 1600PS Palm Vein Authentication INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Gold finger: Fingerprints lead biometric authentication

Gold finger: Fingerprints lead biometric authentication Gold finger: Fingerprints lead biometric authentication The use of fingerprint authentication on smartphones has surged. As of mid-2017, 28 per cent of all smartphone owners aged 16-75 used fingerprint

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social

More information

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT Seungjae Shin, Mississippi State University, 1000 HWY 19N Meridian MS 39307, sshin@meridian.msstate.edu, (601)484-0160 Jerry Cunningham,

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Welcome to Numerica Credit Union s Amazon Alexa * Skill

Welcome to Numerica Credit Union s Amazon Alexa * Skill Welcome to Numerica Credit Union s Amazon Alexa * Skill The Numerica Skill can provide financial information and process transactions from your Amazon Echo device. Using the Numerica Skill, you can do

More information

USE CASES. See how Polygon s Biometrid can be used in different usage settings

USE CASES. See how Polygon s Biometrid can be used in different usage settings USE CASES See how Polygon s Biometrid can be used in different usage settings Web/Mobile Authentication Digital user authentication using biometrics Password management is increasingly harder for the user.

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Authentication: Beyond Passwords

Authentication: Beyond Passwords HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint

More information

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances A Quick Guide to EPCS What You Need to Know to Implement Electronic Prescriptions for Controlled Substances Many healthcare providers have delayed implementing electronic prescriptions for controlled substances

More information

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

Corporate Mobile Banking: A Treasury Perspective

Corporate Mobile Banking: A Treasury Perspective Corporate Mobile Banking: A Treasury Perspective AFPA Education Day August 20, 2014 Howard N. Forman Senior Vice President Head of Online Treasury Solutions Session Outline Mobile Landscape Data Points

More information

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli Introduction Research questions: What are most common and accepted authentication methods for mobile services? What are differences, opportunities

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia Creating and Protecting Your Online Identity for Job Search Contents 1. Creating a Positive Online Presence... 2 2. Your Digital Tattoo... 3 3. Your Professional Identity... 5 4. Social Media Advice...

More information

NIST Tests Supporting Biometric Identification Applications

NIST Tests Supporting Biometric Identification Applications NIST Tests Supporting Biometric Identification Applications Patrick Grother Information Technology Laboratory National Institute of Standards and Technology (US), United States Department of Commerce National

More information

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA) Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

POPA MOBILE BANKING USER GUIDE

POPA MOBILE BANKING USER GUIDE POPA MOBILE BANKING USER GUIDE 2 P OPA Federal Credit Union Safely Access your POPA Accounts At Your Fingertips. POPA Mobile Banking (MB) gives you the power to manage your accounts right from the palm

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

KuppingerCole Whitepaper. by Dave Kearns February 2013

KuppingerCole Whitepaper. by Dave Kearns February 2013 KuppingerCole Whitepaper by Dave Kearns February 2013 KuppingerCole Whitepaper Using Information Stewardship within by Dave Kearns dk@kuppingercole.com February 2013 Content 1. Summary... 3 2. Good information

More information

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits

More information

Face Fingerprint Handprint Iris Retina Signature Voice Watermarking

Face Fingerprint Handprint Iris Retina Signature Voice Watermarking Biometrics IN THE REALM OF computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified. In

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms DigitalPersona Logon for Windows Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond two-factor

More information

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 09. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2017 April 17, 2017 CS 419 2017 Paul Krzyzanowski 1 Biometrics Identify a person based on physical or behavioral

More information

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication Award-winning Contactless Authentication Technology Verifies An Individual s Identity by Recognizing Palm Vein Patterns enabling dynamic

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Washington State Emergency Management Association (WSEMA) Olympia, WA

Washington State Emergency Management Association (WSEMA) Olympia, WA Washington State Emergency Management Association (WSEMA) Olympia, WA Request for Proposals Website Redesign and Content Management and Maintenance System Proposal Submittal Deadline: I. Introduction and

More information

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Business Mobile Banking

Business Mobile Banking Business Mobile Banking User Guide MEMBER FDIC MKT4171/0318 Table of Contents Downloading the App... 3 Requirements... 3 Log In... 3 User ID and Password... 3 Security Token... 4 Apple Touch ID... 5 Viewing

More information

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

User Authentication. Tadayoshi Kohno

User Authentication. Tadayoshi Kohno CSE 484 / CSE M 584 (Spring 2012) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Paying. on the go: Mobile payments slowly catch on in the United States

Paying. on the go: Mobile payments slowly catch on in the United States Paying on the go: Mobile payments slowly catch on in the United States apan adopted a mobile payment system for mass transit as a way to move millions of commuters through congested stations. Some African

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons

More information