USE CASES. See how Polygon s Biometrid can be used in different usage settings

Similar documents
Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

How. Biometrics. Expand the Reach of Mobile Banking ENTER

Identity & security CLOUDCARD+ When security meets convenience

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions

Using Biometric Authentication to Elevate Enterprise Security

Voice, Face and Behavioural Biometrics

New Paradigms of Digital Identity:

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Gradiant to showcase Valida forensic analysis tool to prevent fraud and digital onboarding at CES 2019

Using biometrics for password reset.

Authentication (Strong Customer Authentication)

Put Identity at the Heart of Security

Gaining Business Value from IoT

Guide to Speaker Verification & Voice Biometrics

FIDO Alliance Response to the European Banking Authority (EBA)

Charter Pacific Biometrics Acquisition

Digital Identity Trends in Banking

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Voice and Speech Recognition

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

About Training Centre/CSC center

THE EUROPEAN PAYMENTS LANDSCAPE IN THE DIGITAL ERA

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

FIDO & PSD2. Providing for a satisfactory customer journey. April, Copyright 2018 FIDO Alliance All Rights Reserved.

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Innovative Authentication method for boosting Mobile Connect global roll-out

Smart Mobile Identity. Revolutionizing biometric identity verification

Face recognition for enhanced security.

The Future of Authentication

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

NEW MAYBANK APP FAQ GENERAL

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,

EMERGING PAYMENTS. Breakout and Workshop

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Prof. Christos Xenakis

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Prof. Christos Xenakis

Web based click-to-call button v3.0

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Role of Biometrics in Cybersecurity. Sam Youness

The European Union approach to Biometrics

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Biometric Authentication. Bringing End users and Enterprise on the same page

Applying biometric authentication to physical access control systems

Twilio cloud communications SECURITY

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Privacy Policy. About Us

Lecture 41 Blockchain in Government III (Digital Identity)

Kickstart. Overview. Oct 2017

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

Opinion 02/2012 on facial recognition in online and mobile services

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Singapore s National Digital Identity (NDI):

Authentication Technology for a Smart eid Infrastructure.

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Biometrics. Overview of Authentication

EMERGING TRENDS AROUND AUTHENTICATION

ThinkVantage Fingerprint Software

ThinkVantage Fingerprint Software

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

Mobile: Purely a Powerful Platform; Or Panacea?

Fingerprint Authentication Guide

Uploading your ID Documents for your National Criminal History Police Check

Mobile Identity as key enabler for the Digital Consumer

Hitachi ID Password Manager Telephony Integration

MobilePASS for BlackBerry OS 10

What is AI Face Search? Benefits over facial recognition systems

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

User Manual HPCSA Registration Renewal

ID

How to Invest in the Gizer Token Sale. A guide for contributing to the Initial Offering of GZR Tokens

Privacy Policy GENERAL

ETSY.COM - PRIVACY POLICY

Signup for Multi-Factor Authentication

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Verify your customers quickly and easily wherever they are in the world

Biometrics problem or solution?

Safelayer's Adaptive Authentication: Increased security through context information

Fingerprint Authentication for SIS-based Healthcare Systems

Step by Step Procedure for First Time registration for Retail user.

Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview

Mobile Identity Management

BOCHK Mobile Token FAQ

Consumer Banking User Guide. Getting Started

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

DROPBOX.COM - PRIVACY POLICY

/Join LineMoney Now. Before Reading This Guide. Copyright

FIDO TECHNICAL OVERVIEW. All Rights Reserved FIDO Alliance Copyright 2018

e-sign and TimeStamping

Quick Start Guide (External Preview Version)

DESIGNING A BIOMETRIC STRATEGY (FINGERPRINT) MEASURE FOR ENHANCING ATM SECURITY IN INDIAN E-BANKING SYSTEM

Transcription:

USE CASES See how Polygon s Biometrid can be used in different usage settings

Web/Mobile Authentication Digital user authentication using biometrics Password management is increasingly harder for the user. We all tend to forget our passwords with each site requiring their own security rules. Statistically, we forget more than 70% of our passwords and even worse, it s a type of authentication highly subject to phishing attacks and high levels of fraud. Our solution combines awareness and physical properties such as voice, fingerprint and facial features to enable verification of user s identities, allowing security and performance depending on the context of our client needs. We are also able to estimate a user age, gender and emotions whilst guaranteeing his/her full anonymization. Business: Guarantee that the digital relation with a customer is being done with a specific living customer on real time; Increase the business confidence on decision making; Reduces frauds; Prevents phishing attacks; The increased security is perceived by the customer; Very high levels of accuracy. Statistically superior to human operating solutions; Privacy guaranteed. Technological: Secure Cloud Infrastructure: Scalable and flexible, logical and physical separation; Quick Startup: API Integration to service, integration with no biometric data; Flexible Design: Open to new modalities and adaptive to the use case specific needs; Out of the box biometric engines: Keep a wide range of a biometric engines to offer the best solution for each scenario. Biometrid Use Cases 2

Markets Banking Insurance Retail Healthcare Utilities Government Service providers Biometrid Use Cases 3

Onboarding Remote contracting of products or services for new or existing customers We facilitate the process of creating and validating a digital identity of a new (or existing) customer, allowing for remote user identification. By using a camera from a smartphone or computer, the customer only needs his European Union National ID card (or passport) and a selfie to open an account. From this point onwards, the customer will be able to authenticate and verify his identity using the enrolled biometric data (face and/or voice). This technology include document validation and OCR, face matching and liveness detection, document uploading, video conferencing and OTP for explicit consent. Decrease fraud levels (KYC); Biometrics data secure collection for future use in authentication; Low validation time and costs with our Backoffice; Positive and pleasant customer journey; Convenience for both parts. Markets Banking & Fintechs Insurance Retail Healthcare Utilities Government Service providers Biometrid Use Cases 4

Call Centre Customer strong authentication in call centres Using voice recognition biometrics, the IVR (or operator) will prompt the customer for a password. The customer answers and his/her voice are recognised by the IVR that welcomes using his/her name. For the contact centre: Allows administrative attending time of 0 (zero) seconds; The operator is more motivated (lower routine tasks); Immediate access to client s info whilst he is being called by the name through the IVR; Contact time between client and operator is more productive; Client positive referrals; Higher potential for First Contact-resolutio Higher security levels. Absolute certainty of caller ID; For the customer: Immediate and personalised treatment (after authentication); Better call experience; Lower answering wait time perceived (after hearing his/her name he is more loyal to the caller); Gets immediate attention to his/her problem and with a higher potential for resolution; Innovation and ease of use; The Voice is non-transferable and unforgettable. Confidence that only he/she uses is close to absolute. Markets Call centres Biometrid Use Cases 5