Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Similar documents
USE CASES. See how Polygon s Biometrid can be used in different usage settings

Put Identity at the Heart of Security

Authentication Technology for a Smart eid Infrastructure.

Authentication Methods

Identity & Access Management

Applying biometric authentication to physical access control systems

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Identity & security CLOUDCARD+ When security meets convenience

Keep the Door Open for Users and Closed to Hackers

Keys to a more secure data environment

Face recognition for enhanced security.

NEW MAYBANK APP FAQ GENERAL

DESIGNING A BIOMETRIC STRATEGY (FINGERPRINT) MEASURE FOR ENHANCING ATM SECURITY IN INDIAN E-BANKING SYSTEM

Moser Baer Group 25 years of excellence

How. Biometrics. Expand the Reach of Mobile Banking ENTER

Integrated Access Management Solutions. Access Televentures

Using Biometric Authentication to Elevate Enterprise Security

mhealth SECURITY: STATS AND SOLUTIONS

New Paradigms of Digital Identity:

PCI DSS Compliance. White Paper Parallels Remote Application Server

Biometrics problem or solution?

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Octopus Online Service Safety Guide

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Gaining Business Value from IoT

Information Security Policy

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Fujitsu World Tour 2016

6 Vulnerabilities of the Retail Payment Ecosystem

DreamFactory Security Guide

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

Solution. Imagine... a New World of Authentication.

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Mobile Banking Guide-Web Enabled Devices

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Security Specification

DeliverySlip for Business Buyers

Whitepaper on AuthShield Two Factor Authentication with SAP

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Frequently Asked Questions (FAQ)

THE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

GUIDE. MetaDefender Kiosk Deployment Guide

A company built on security

Teradata and Protegrity High-Value Protection for High-Value Data

Identity Management as a Service

The security challenge in a mobile world

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Cloud Security Whitepaper

THE EUROPEAN PAYMENTS LANDSCAPE IN THE DIGITAL ERA

A quick guide to iris recognition. Click on blue squares to navigate

Cloud Security Standards Supplier Survey. Version 1

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Compliant. Secure. Dependable.

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

FINGER VEIN SERVER FOR RETAIL BANKS

The Dropbox Problem: It s Worse than You Think

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

Internet of Things Toolkit for Small and Medium Businesses

QuickBooks Online Security White Paper July 2017

Total Threat Protection. Whitepaper

Session 2: Understanding the payment ecosystem and the issues Visa Europe

PCI Compliance. What is it? Who uses it? Why is it important?

Hybrid Cloud for Business Communications

Airport Security & Safety Thales, Your Trusted Hub Partner

UltraMatch. Standalone Iris Recognition System

What is a security measure? Types of security measures. What is a security measure? Name types of security measures

Security Principles for Stratos. Part no. 667/UE/31701/004

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

PBX Fraud Information

SECURE DATA EXCHANGE

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

SE420 Software Quality Assurance

SECURE OFFICE OF THE FUTURE

Innovative Authentication method for boosting Mobile Connect global roll-out

HOLISTIC COMMUNICATIONS SECURITY

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Combating Cyber Risk in the Supply Chain

Xerox Audio Documents App

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

FFIEC CONSUMER GUIDANCE

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Define information security Define security as process, not point product.

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Product Brief. Circles of Trust.

HELPFUL TIPS: MOBILE DEVICE SECURITY

HP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

Transcription:

Hassle-free banking in the DIGITAL AGE through NEXT-GEN Technologies W H I T E PA P E R

Experience smooth transactions with the new generation of banking and payments using facial recognition. Financial fraud is a critical problem for banks and online payments, and the current security systems are vulnerable to theft and loss. By using the face recognition tool for user authentication in ATMs and online payments, banks are ensuring that only the recognised and authenticated users can use the bank card. Why Facial Recognition is fast becoming a preferred mode of Biometric Identi cation The human face is the most prominent way through which we can comprehend someone's identity. Being able to detect individual faces or read someone's emotional reaction is often crucial for a business operation. Recognition must be quick and accurate, regardless of whether it is to prevent unauthorized users from entering a restricted area or to determine customer feelings about the services. Innovative banks and nancial institutions are now using face recognition as an integral part of their payments and transactions to ensure security, speed and fantastic customer experience. Accurate and rapid user identi cation is gaining momentum within the nance sector. Modern ATMs represent a critically important channel of interaction with customers, which produces extensive self-service opportunities and reduces their dependence on banks. In many situations, facial recognition has signi cant advantages over other biometric solutions. 01

Face Recognition Use Cases for Banking and Payments Customer as VIP All customers who go to their respective banks are given a customer management ID card, and it must be presented whenever they visit the bank. However, this card has a few disadvantages: Customers forget or lose their cards Card magnetic elds are easy to malfunction Face recognition does not require an ID card. Customers and attendants are recorded within the system through their faces. Mobile Banking Secure Access from any mobile device carrying a camera The client can make secure banking transactions anywhere, anytim Secure API and encrypted data for linking with existing banking applications Contact less Banking Staff login through Face Recognition Employees at the bank have to login into ATM and Self-Service Kiosks By using face recognition as a tool for authenticating users in ATMs, banks are assuring them that only they will be able to use the bank card. Some of the bene ts include: Avoids fraud through identity theft and card cloning User-friendly (non-intrusive) authentication and banking transaction authorisations Alarm on forceful entry or customer threat Online Banking the application to access their computers at work. The system identi es the person in front of the webcam and decides whether the person can access the PC or not Secure access to the bank's vault room after face recognition, which secures the entrances & sends an alarm if there is an attempt to enter, or if there is an employee who must not be there Aged Customer Recognition and Special Treatment There are times when some elderly customers are unable to sign in or use all the features of online banking and are often assisted by an attendant. For these customers, face recognition is a must. The authentication becomes as easy as just looking at the camera. Online banking is currently exposed to direct attack from hackers. With FaceIT Facial Recognition System, only authorised users will be able to access their bank account through the web service of the bank. The user has to come in front of the webcam, and the system will verify the identity, granting them secure access.ot be there. 02

Hitachi's FaceIT Facial Recognition Platform for Banking Automated Teller Machines (ATMs) are soon to be replaced with new multi-function biometric face recognition enabled machines, which will improve the overall security. These machines will enhance the customer experience, usability, and convenience of transactions at ATMs. Hitachi's FaceIT Facial Recognition and Customer Authentication platform can be integrated into the bank's self-service kiosks, providing a smooth biometric check-in for customers and the banking staff. The FaceIT Facial Recognition application needs to know how you look. You introduce yourself to FaceIT by using the software to take a few pictures of your face (called biometric enrollment). This is as easy as taking a few sel es. Strong Multi-Factor Authentication, as easy as taking a Sel e. Auto Shutter to take picture as soon as the customer's face comes in front. Periocular eye recognition for partially visible faces. After enrollment, FaceIT is ready to recognise you (Veri cation). To see if FaceIT identi es you, simply press 'Verify' and take a sel e, just like enrollment. The patented Fake Defender prevents hackers pretending to be you - this is a signi cant advantage over other face recognition software that can easily be faked with a photo. Optional challenge-response to protect against video attacks can also be enabled in your FaceIT account. Features like face recognition and One-Time Password (OTP) are used for the enhancement of security of accounts and privacy of users. Face recognition technology helps the machine to identify each user uniquely, thus making your face an essential element. This eliminates the chances of fraud due to theft and duplicity of the ATM cards. Liveness Detection Engine prevents Photo and Video attacks. Human presence ensured by analysing movements and environment. Auto-corrects for pose, and optimises images with a low-light environment. No need to re-capture the image each additional time the face shows up. Algorithmically learns about a user's face and adapts to the unique features and expressions. Picture Visibility Enhancement from various angles for face recognition 03

Taking Care of Security and Speed Concerns Sharing personally identi able information with a third party Tokenisation and encryption used in our algorithms ensure that we only store a mathematical representation of the user's unique features, which cannot be exported, re-engineered or reverseengineered to its original format. This enables high levels of privacy protection through full anonymity. When carrying out our services, we keep the biometric data anonymous, with no personal identi cation information stored. Using the On-Premise / Cloud Infrastructure Hitachi's FaceIT is built and hosted on Amazon Web Services (AWS), and undergoes regular SOC audits. With SSL Encryption, our endpoint ensures that all data passed between the web server and browsers remain private and integral. Processing Large Volumes of Images or Videos We can process a million images each month, and experience no crashes due to traf c volume. At times, we process tens of thousands of images per hour with no disruption to service. Get the peace of mind with SLAs, 24/7 technical support, dedicated integration services, with our strategic of ces covering critical time zones/geographies. Anti-Spoo ng and Liveness Detection Engines FaceIT Anti-Spoo ng and Liveness Detection Engines are powerful security mechanisms that prevent any data from being compromised. Our AI algorithms and security architecture considers not only the system's anonymous data handling and the cloud's security requirements but also ensures safety against attacks. 04

Summary of Bene ts for Healthcare Facial Biometric Customer Identi cation Systems are increasingly being adopted by banks, given the obvious bene ts. As more banking systems seek to cut administrative costs to cope up with the evolving demographic changes, many more banks will likely turn to solutions like these. This will allow them to enjoy the following bene ts: Ability to discriminate among millions of people Does not require customers to remember several surrogate identi ers Safeguards against intentional misidenti cation It cannot be customized or impersonated, and will remain with the customer for years Facial recognition is widely preferred over other biometric technologies Voice Recognition, Iris Recognition, and Fingerprint Scanning due to its non-contact process and easy deployment. Find faces Analyze faces Understand faces Identify, recognize or verify people Identify facial features and demographics Identify how people feel and behave. 05

Get in Touch: E-44/2, Okhla Industrial Area, Phase-II, New Delhi - 110020 ( ( +91 11 49250700 / 49250723 For Sales: 0124-2729201 7 +91 11 49250731 ( 1800-301-01-855 (Toll Free) * marketing.mc@hitachi-systems.com