October 20 th,

Size: px
Start display at page:

Download "October 20 th,"

Transcription

1 Introduction to Private Identity as a Service (PIDaaS): Secure authentication system, based on biometric recognition technologies through mobile devices. October 20 th, 2015 contacts@pidaas.eu

2 Contents 1 Introduction Goals of the project State of the art Issues to solve PIDaaS solution The benefits Pilots E-commerce E-health E-citizen... 5

3 1 Introduction PIDaaS aims to create and to field-test a secure authentication system, based on biometric recognition technologies (speaker and face recognition) through mobile devices. PIDaaS is a project co-founded under the ICT Policy Support Programme by the following partners: CSI Piemonte, Bantec, Eurecat, Ricoh, University of Kent, E-bros, TicSalut and Hogskolen I Gjovik. 2 Goals of the project The goals of PIDaaS are: 1. To develop a robust, flexible, scalable and easy to integrate service for identity assurance of user s with the help of bio-identities features in mobile devices. 2. To share with internet application providers, the possibility of an easy integration of biometric authentication of their customers into their remote identification processes. 3 State of the art The identification and verification of individuals using biometric identifiers based on personal traits have been widely used in different contexts, governmental, forensic (police investigations) and for commercial uses. Mobile devices and the explosion of social media increase the use of biometrics for daily activities which require authentication, such as payments, and for the substitution of passwords and PINs. However, some issues must be well addressed, like user acceptance or resistance to fraud. The current biometric authentication technologies are: Voice scan Finger scan Facial scan Iris scan Hand scan Vein recognition DNA matching Signature scan In-Air signature Keystroke scan Gait 4 Issues to solve It has been done an analysis of the existing solutions and its authentication process. This section describes the problems encountered of the studied solutions: Biometric algorithms must be tailored in order to fit the specific sensors characteristics of mobile devices. 1

4 Required security preservation of biometric data in the authentication process: o User s biometric samples are strongly linked with user s identity. o The multiple enrolment processes for every service provider increases the user s feelings about getting out of control of her/his data. o Lack of user control and potential privacy. Non-renewability of personal biometrics traits: Renewability and revocability are essential functionalities required in identity management. The protection of biometric data and its sharing across different legal entities is very difficult to achieve because of non-uniform National/European personal data regulations. Difficulty of the integration process of biometric authentication for mobile/web services and application developers. 5 PIDaaS solution PIDaaS aims to create a secure authentication system, based on biometric recognition technologies (speaker and face recognition) through mobile devices. It is the result of the integration of the following three technologies: BTPS, IdForMe and LMP. The platform consists on the following components: 1. PIDaaS Mobile application: It allows the users to manage their identity, personal data and biometric templates (digital reference of characteristics that have been extracted from a biometric sample) and to be authenticated through speaker and face recognition. The management of data allows the users to authorize which action is performed in their name on any website and decide what information they allow to access to Website, Mobile apps, online purchasing, etc. The authentication process is based on the IdForMe platform, which allows people to do the authentication process using the speaker and face recognition verification technology. 2. PIDaaS Backend: It provides to the Mobile Application and Service Providers a gateway to access to the PIDaaS platform services. Through this gateway, service providers can ask for login authentication services, and users can manage their stored data. 3. PIDaaS Life Management Platform (LMP): It is responsible for storing the information about PIDaaS users, service providers and for monitoring the users activities within the PIDaaS platform. It is a mechanism for sharing personal data between the user and the services in a secure way. Its objectives in PIDaaS are: Manage the authentication process. Store the biometric templates (verification data). Provide control to users over those templates and their personal data. 4. PIDaaS Biometric Template Protection Scheme (BTPS): It is responsible for creating and verifying the biometrics templates of the users (so called Pseudo Identities). This technology enables the creation of multiple pseudo-bio-identities from the same biometric trait, with the possibility of revoking, renewing and reissuing them. It assures the privacy 2

5 by allowing the use of biometric traits while avoiding the inherited risk of classic biometric solutions. The integration of these technologies will be tested and validated in three different pilots: E-commerce, E-health and E-citizen. The pilots will be used for the analysis of the usage of the service. PIDaaS Platform BTPS Encoder BTPS Verifier Push Notification Service Mobile Application Life Management Platform Backend Service Provider Other Device Figure 1: PIDaaS architecture 6 The benefits PIDaaS provides an innovative approach to e-services (e-commerce, e-citizen, and e-health) in a way giving users strong advantages and market competitiveness in the following aspects: 1. Convenience: PIN or password is omitted or expressed by voice/face; 2. Security: users are verified by their biometrics; 3. Privacy protection: biometric information used for verification is protected by BTPS. These merits makes PIDaaS solution promising in the current and future markets because none of existing identity authentication solutions including those biometrics-enabled can perform well in all the three above aspects in the same time, which makes a good market perspective for the PIDaaS solution. Each technology also enriches the solution with its specific benefits: BTPS technologies have been proved to be useful for voice/face biometric modality. 3

6 Biometric mobile verification systems because many manufacturers have adapted their existing technology to be ready for deployment. LMP technology meets the need for the necessary trust frameworks and the need for greater dialogue between regulators and private sector. LMP offers a service where the user is the centre of decision. Figure 2: Functioning of PIDaaS pilots 7 Pilots 7.1 E-commerce This pilot takes place in an environment of e-commerce (B2B). PIDaaS solution will be integrated on the platform of one of the biggest e-shops in Finland, the company F9 Distribution OY. PIDaaS will be used by real customers. Objectives Test and prove technical and functional quality of offered solution. Test and get feedback on usability of PIDaaS solution. Get feedback about market acceptance and commercial attractiveness of PIDaaS solution. Easiness of PIDaaS integration into e-commerce solution, provided by E-Bros. 7.2 E-health TICSalut will carry the pilot in Catalonia (Spain). It will be useful to test integration of PIDaaS with the platform of the Catalan health system. This platform enables people to interact online through computer or other mobile devices with the health department, its agencies and providers (hospitals, health centers, etc.). 4

7 Objectives Accessibility of the patients on their data in the Catalan health system by authenticating themselves through the PIDaaS platform. Testing its performance and usability. 7.3 E-citizen There will be a pilot performed in Italy, in which PIDaaS will be integrated in the service of visualization of the personal data within the human resources procedures. The employees belonging to an administration or company will be able to access to their personals records (such as payroll, holidays, time off work, etc.) and visualize them. Objectives To confirm that PIDaaS authentication grants users safe access to data and with adequate performance and usability degrees. Testing its performance and usability degrees. 5

Biometrics: Advantages for Employee Attendance Verification

Biometrics: Advantages for Employee Attendance Verification Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

Trending: How does PSD2 trigger innovation?

Trending: How does PSD2 trigger innovation? Trending: How does PSD2 trigger innovation? Speakers: Nils Jung, Managing Partner, Innopay Germany Hakan Eroglu, Senior Manager Digitization in Payments & Banking, Accenture Trending: How does PSD2 trigger

More information

Electronic Banking (E-Banking)

Electronic Banking (E-Banking) Electronic Banking (E-Banking) E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels.

More information

X Infotech Government

X Infotech Government X Infotech Government Software solutions for identity documents WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for issuance, management and verification of electronic identity

More information

X Infotech Banking. Software solutions for smart card issuance

X Infotech Banking. Software solutions for smart card issuance X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial

More information

An Integrated National ID System Final.docx

An Integrated National ID System Final.docx From the SelectedWorks of Nicholas Mungo Winter September 1, 2015 An Integrated National ID System Final.docx Nicholas Mungo Available at: https://works.bepress.com/nicholas-mungo/1/ WHAT IF Series An

More information

BEST PRACTICES: 2015 Credit Card Mobile Sites and Apps

BEST PRACTICES: 2015 Credit Card Mobile Sites and Apps BEST PRACTICES: 2015 Credit Card Mobile Sites and Apps Who is KLI? KEY LIME INTERACTIVE (KLI) is a user research firm that conducts both qualitative and quantitative research for Fortune 2000 companies,

More information

WWW.FINGERPRINTS.COM Internet Scale Adoption of Biometrics Ubiquity First Era Adoption at Scale Single Platform & Use Case 2014-2016 Second Era Use Case Expansion High Trust Use Cases on Single Platform

More information

eid Meets Credit Cards and Biometrics: The Next Stage of Convergence Adam Ross Sales Manager eid Solutions EMEA, cv cryptovision GmbH

eid Meets Credit Cards and Biometrics: The Next Stage of Convergence Adam Ross Sales Manager eid Solutions EMEA, cv cryptovision GmbH eid Meets Credit Cards and Biometrics: The Next Stage of Convergence Adam Ross Sales Manager eid Solutions EMEA, cv cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24

More information

Mobile Authentication Application for a Security Solutions Provider ATTENTION. ALWAYS.

Mobile Authentication Application for a Security Solutions Provider ATTENTION. ALWAYS. Mobile Authentication Application for a Security Solutions Provider ATTENTION. ALWAYS. THE CUSTOMER Our Customer is a security solutions provider, specializing in identity management solutions, for businesses

More information

Accelerating Identity Programs with Mobile Biometric Enrollment Bringing scalability, efficiency, and cost savings to developing nations with Tascent

Accelerating Identity Programs with Mobile Biometric Enrollment Bringing scalability, efficiency, and cost savings to developing nations with Tascent Bringing scalability, efficiency, and cost savings to developing nations with Tascent M6 Tascent White Paper Tascent.com The Need for Efficient Identity Enrollment in Developing Nations Throughout the

More information

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Case Study How Gemalto s Trust Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Traditional know-your-customer (KYC) processes are costly, complex

More information

IDENTITY SOLUTIONS FOR A BETTER WORLD

IDENTITY SOLUTIONS FOR A BETTER WORLD IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS INDEPENDENT VALUE-DRIVEN EXPERTISE From industry-leading development of biometric products and

More information

DESIGN AND ENHANCED ADHAAR SECURED AUTOMATIC RATION SYSTEM FOR PUBLIC WELFARE USING LABVIEW

DESIGN AND ENHANCED ADHAAR SECURED AUTOMATIC RATION SYSTEM FOR PUBLIC WELFARE USING LABVIEW DESIGN AND ENHANCED ADHAAR SECURED AUTOMATIC RATION SYSTEM FOR PUBLIC WELFARE USING LABVIEW P Suresh kumar *, A Muthukumar, R Monik Chandru, R Maniselvan, Vishal Gupta, * Professor, Dept of Electrical

More information

(a) (i) Define the term real-time. [2 marks]

(a) (i) Define the term real-time. [2 marks] 1. Walrus radio-tracking in the southern Chukchi Sea 2008 During the 2008 migration, researchers attached satellite radio-tags to 28 walruses in the southern Chukchi Sea region. Tracking data from this

More information

timeware 2018 biometrics

timeware 2018 biometrics timeware 2018 INTERESTED? Give us a call on +44 (0)1706 659368 Document t2-0451: revision 1.0 Copyright NMD 3 Ltd www.timeware.org +44 (0)1706 659368 For more information about timeware products, version

More information

Warwick PalmReader Proposal. Proposal of. Warwick PalmReader. Version Version: 1.03 Page 1

Warwick PalmReader Proposal. Proposal of. Warwick PalmReader. Version Version: 1.03 Page 1 Proposal of Warwick PalmReader Version 1.03 Version: 1.03 Page 1 Table of Contents 1. Technology Overview...3 2. Cost Saving Automated Time Attendance...4 3. Biometrics Comparison...5 4. Applications...6

More information

Overcoming Barriers in the field of Authentication and Identification

Overcoming Barriers in the field of Authentication and Identification Overcoming Barriers in the field of Authentication and Identification Dr. Sjaak Nouwt TILT Tilburg Institute for Law, Technology, and Society Tilburg University, the Netherlands j.nouwt@uvt.nl Roadmap

More information

The Transformation of the Iris Recognition Market

The Transformation of the Iris Recognition Market presents The Transformation of the Iris Recognition Market 2007 2020 april 11, 2007 washington DC ipira biometric series c. maxine most acuity market intelligence cmaxmost@acuitymi.com Acuity Market Intelligence

More information

Biometrics. Ending Time Theft and Controlling Security Access. Summary

Biometrics. Ending Time Theft and Controlling Security Access. Summary Biometrics Ending Time Theft and Controlling Security Access Summary Once the domain of science fiction, today s biometric technology offers advanced identification and verification for employees in every

More information

THE BEST PRACTICES IN IMPLEMENTATION OF MOBILE IDENTIFICATION (mid) OUR VISION ABOUT mid. Kārlis Siliņš

THE BEST PRACTICES IN IMPLEMENTATION OF MOBILE IDENTIFICATION (mid) OUR VISION ABOUT mid. Kārlis Siliņš THE BEST PRACTICES IN IMPLEMENTATION OF MOBILE IDENTIFICATION (mid) OUR VISION ABOUT mid Kārlis Siliņš Session 1 Introduction on mid: Trends, Challenges and Opportunities Couple of words about mid in Latvia:

More information

Artificial Intelligence. Big Data Analytics

Artificial Intelligence. Big Data Analytics ENHANCING CUSTOMER EXPERIENCE WITH SECURE DIGITAL IDENTITY In the past decade, digitalization has had a profound impact on the financial services sector, supported by developments in major technology areas

More information

CHALLENGES (BARRIERS) IN ADOPTING THE ELECTRONIC COMMERCE SYSTEM IN LIC OF INDIA

CHALLENGES (BARRIERS) IN ADOPTING THE ELECTRONIC COMMERCE SYSTEM IN LIC OF INDIA CHAPTER-6 CHALLENGES (BARRIERS) IN ADOPTING THE ELECTRONIC COMMERCE SYSTEM IN LIC OF INDIA 6.1 Introduction : e-insurance is the application of Internet and related technologies to the production and distribution

More information

Government solutions. Enterprise & Government Solutions

Government solutions. Enterprise & Government Solutions Government solutions Enterprise & Government Solutions Introduction Enabling trusted connections and improved access to government services As digitisation continues to change how citizens live and work

More information

B. Executive Summary. Category: Digital Government: Government to Citizen Page 2 of 6

B. Executive Summary. Category: Digital Government: Government to Citizen Page 2 of 6 B. Executive Summary Through MyDMV it is now possible in New York State for there to be a citizen single logon for a multitude of programs, services, and applications across state agencies. MyDMV is the

More information

TECHNOLOGY FOR FOOD STORE EFFICIENCY

TECHNOLOGY FOR FOOD STORE EFFICIENCY U.S. Department of Agriculture Agricultural Outlook Forum 2003 February 20 & 21, 2003 TECHNOLOGY FOR FOOD STORE EFFICIENCY Alan Couch Director Food Industry Marketing Technology for Food Store Efficiency

More information

Module: Introducing E-democracy

Module: Introducing E-democracy Module: Introducing E-democracy Introduction Low voting figures have led to claims that people have lost trust in politicians and have become disenfranchised from politics. While technology alone will

More information

fingermetrica Built-In-Fingerprint Biometric Solutions Biometric Recognition Embedded Algorithm Library

fingermetrica Built-In-Fingerprint Biometric Solutions Biometric Recognition Embedded Algorithm Library iometric Recognition Embedded Algorithm Library Reliable flexibility in embedded biometric fingerprint solutions. Manfred öswald GmbH Security for home, office and networks 2005 GmbH 04.2005 General Informations

More information

Case Study: Quintiles Transnational Corporation

Case Study: Quintiles Transnational Corporation : Quintiles Transnational Corporation Project Overview The Project covers the development and implementation of the custom application allowing for biometric identification by fingerprints of medical workers

More information

Tascent Enterprise Suite Multimodal Biometric Identity Platform

Tascent Enterprise Suite Multimodal Biometric Identity Platform TM Tascent Enterprise Suite Multimodal Biometric Identity Platform tascent.com Multimodal Biometric Identity System Secure, scalable, and easy-to-use, the Tascent Enterprise Suite represents a thoroughly

More information

Expanding to New Verticals

Expanding to New Verticals Expanding to New Verticals Mobile Card Product and Feature Suite Dave Abouchar, Director New Mobile Products Krishna Rajamani, Mobile Product Manager April 12, 2017 Agenda 1. Introduction 2. Credit Card

More information

secunet Security Networks AG Biometric System Enabler The BioAPI Middleware

secunet Security Networks AG Biometric System Enabler The BioAPI Middleware secunet Security Networks AG Biometric System Enabler The BioAPI Middleware EAB Scandinavian Applications, Oslo, 2012-04-12 Michael Schwaiger Questions planned to be answered What is the BioAPI middleware?

More information

Bank Leumi transforms authentication.

Bank Leumi transforms authentication. Bank Leumi transforms authentication. Cost-effective, multi-factor authentication used at one of Israel s largest contact centers. Challenge 20-30 second AHT for authentication Manual authentication was

More information

UBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR

UBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR UBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR 2017-2018 SURVEY REPORT Connecting Identity. Transforming Digital Business. INTRODUCTION Online

More information

The communication between Third Party Providers and Banks. PSD2 in a nutshell

The communication between Third Party Providers and Banks. PSD2 in a nutshell www.pwc.com/psd2 The communication between Third Party Providers and Banks. What will the impact of technology be? PSD2 in a nutshell Summary The banking system is at a turning point, under the pressure

More information

Online Approval System

Online Approval System Online Approval System Loan Origination Platform for financial institutions automating the entire lending process Klustr Platform IS an advanced Loan Origination Platform, built on state-ofthe-art internet

More information

Multiple Sites. Tomorrow s Technology

Multiple Sites. Tomorrow s Technology Multiple Sites Tomorrow s Technology Multiple Technologies mix to achieve cost effective security. Perfect Access Control and Visitor Management. Biometric Systems are used to keep a check on incidences

More information

Mobile Money mobilem Payment Module for Odoo 8.0 & 9.0. Installation & Configuration User guide

Mobile Money mobilem Payment Module for Odoo 8.0 & 9.0. Installation & Configuration User guide Mobile Money mobilem Payment Module for Odoo 8.0 & 9.0 Installation & Configuration User guide Table of Contents 1.Installation...2 (1)Prerequisites...2 (2)Downloading...2 (3)Installation procedure...2

More information

Biometrics for Financial Institutions and the new Gemalto Biometric Sensor Payment card

Biometrics for Financial Institutions and the new Gemalto Biometric Sensor Payment card Biometrics for Financial Institutions and the new Gemalto Biometric Sensor Payment card White paper October 2017 1- Financial Services go digital: Smartphones set the new user experiences with biometrics

More information

NCR Passport for Commercial. Part of NCR s enterprise hub for remote deposit capture

NCR Passport for Commercial. Part of NCR s enterprise hub for remote deposit capture NCR Passport for Commercial Part of NCR s enterprise hub for remote deposit capture For more information on RDC, speak to your sales contact or go to ncr.com. Easy and secure deposits from where their

More information

WHERE DO YOU WANT TO GROW. Solutions for Community Financial Institutions

WHERE DO YOU WANT TO GROW. Solutions for Community Financial Institutions WHERE DO YOU WANT TO GROW TODAY? Solutions for Community Financial Institutions 2 Today s users demand more from their financial institution. They expect their banking experiences to be digital, easy,

More information

Self-Sovereign for Web

Self-Sovereign for Web Self-Sovereign for Web is? itrue is modular Blockchain and Biometric solution focused on giving users control of their own data back from big technology firms. We secure access to the system with facial

More information

Gemalto Consulting Services. Take control of your smart card implementation

Gemalto Consulting Services. Take control of your smart card implementation Gemalto Consulting Services Take control of your smart card implementation FINANCIAL SERVICES & RETAIL > SERVICE ENTERPRISE INTERNET CONTENT PROVIDERS PUBLIC SECTOR TELECOMMUNICATIONS TRANSPORT Gemalto

More information

THE PAYMENT SERVICES DIRECTIVE II (PSD II) Liberalisation of electronic payment transactions

THE PAYMENT SERVICES DIRECTIVE II (PSD II) Liberalisation of electronic payment transactions April 2017 THE PAYMENT SERVICES DIRECTIVE II (PSD II) Liberalisation of electronic payment transactions Hurry up! Only a few more months until January 2018, when payment service providers are obliged to

More information

The PwC KYC Centre of Excellence

The PwC KYC Centre of Excellence www.pwc.com/jg/en/verification-services The PwC KYC Centre of Excellence Transforming your client onboarding process Greater insight, Better decisions Transform your customer onboarding with PwC PwC s

More information

TIME & ATTENDANCE DATA COLLECTION OPTIONS

TIME & ATTENDANCE DATA COLLECTION OPTIONS TIME & ATTENDANCE DATA COLLECTION OPTIONS Third-Party Hardware Options for Collecting Data www.saashr.com 1.866.722.9952 Contents Kronos InTouch 1 ZK T4 2 ZK S300 2 HandPunch 1000 3 HandPunch 3000 3 HandPunch

More information

IMAGO. Management System for Citizen Registration and Identity Documents

IMAGO. Management System for Citizen Registration and Identity Documents IMAGO Management System for Citizen Registration and Identity Documents IMAGO EFFECTIVELY MANAGES EACH STEP ON THE PATH TO PRODUCING AN IDENTITY DOCUMENT AND BEYOND Efficient capturing of personal and

More information

SecuRe Pay recommendations for the security of mobile payments

SecuRe Pay recommendations for the security of mobile payments ECB-PUBLIC FINAL SecuRe Pay recommendations for the security of mobile payments Stephanie Czák Senior Market Infrastructure Expert European Central Bank ETSI/EC Collaborative Ecosystem for M-Payments Workshop

More information

Feasibility study on an electronic identification, authentication and signature policy (IAS)

Feasibility study on an electronic identification, authentication and signature policy (IAS) Feasibility study on an electronic identification, authentication and signature policy (IAS) SMART 2010/0008 Final Study Report 18 January 2013 D4.2 (Version 1b-Final) This study was commissioned by the

More information

Recent Developments in Retail Payments

Recent Developments in Retail Payments Recent Developments in Retail Payments Global Trends in Retail Payments Harish Natarajan Payment Systems Development Group Global Payments Week 2014, September 23-25, New York, NY Developing a comprehensive

More information

MODELS OF MOBILE PAYMENTS

MODELS OF MOBILE PAYMENTS MODELS OF MOBILE PAYMENTS MARJAN GUSEV, LJUPCO ANTOVSKI, GOCE ARMENSKI Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss. Cyril and Methodius University Arhimedova b.b., PO Box 162,

More information

Supporting the transformation of government services

Supporting the transformation of government services Supporting the transformation of government services Helping to ensure better access to everyday services for consumers. And reduced cost, risk and time to deploy for government. The challenge Our egov

More information

Deploying Voice Biometrics: A How-To-Guide. Bryan Chaney Vice President, Sales North America

Deploying Voice Biometrics: A How-To-Guide. Bryan Chaney Vice President, Sales North America Deploying Voice Biometrics: A How-To-Guide Bryan Chaney Vice President, Sales North America Baby Alisa Khitrova! Voice Biometrics Conference 2014 2 SpeechPro is the US subsidiary of the Speech Technology

More information

Michigan Department of Transportation Market Scan for a Digital Signature Solution

Michigan Department of Transportation Market Scan for a Digital Signature Solution Michigan Department of Transportation Market Scan for a Digital Signature Solution Contact: E-Mail: David Hatch hatchd@michigan.gov Table of Contents Privacy Information... 1 Market Scan Description and

More information

Catalan Health System

Catalan Health System Catalan System Building bridges between professional and patient data: merging PHR and EHR e Week, Amsterdam, 9 th June, 2016 Summary 1 TicSalut Foundation 2 Catalan care System 3 Catalan Shared Medical

More information

DAVA. Drugs Authentication and Verification Application. A portal for Indian Drugs authentication, track and trace

DAVA. Drugs Authentication and Verification Application. A portal for Indian Drugs authentication, track and trace DAVA Drugs Authentication and Verification Application A portal for Indian Drugs authentication, track and trace Avinash Pedgaonkar 15-12-2015 Objectives To ensure the genuineness and authenticity of the

More information

Gemalto's trusted digital ID technology for Mobile Network Operators

Gemalto's trusted digital ID technology for Mobile Network Operators Gemalto's trusted digital ID technology for Mobile Network Operators Table of Contents 1. Capture devices & solutions...4 2. Document verification solutions...7 3. Biometric solutions...10 4. Digitalization

More information

DICTATION & TRANSCRIPTION

DICTATION & TRANSCRIPTION DICTATION & TRANSCRIPTION www.dolbey.com INFO@DOLBEY.com 800 878 7828 Fusion Voice Digital Dictation The quality of a patient s chart relies upon the clinician s ability to effectively communicate findings,

More information

Dictation & Transcription Solutions

Dictation & Transcription Solutions Dictation, Transcription, Speech Recognition, Computer-Assisted Coding & CDI Solutions Dictation & Transcription Solutions Highly customizable and completely integrated, crucial components essential for

More information

Samsung SDS Nexledger. A Blockchain Platform and Solution

Samsung SDS Nexledger. A Blockchain Platform and Solution Samsung SDS Nexledger A Blockchain Platform and Solution Blockchain is a trustworthy record or ledger of all transactions that have taken place. It uses the Consensus Protocol for validating processes

More information

Mobile & Online Banking

Mobile & Online Banking Mobile & Online Banking Digital banking - no longer a matter of nice to have In today s world, online and mobile banking are no longer nice to have on the consumer s mind. Consumer s daily lives are seamlessly

More information

Army Initiatives. Colonel Ted Jennings Project Manager DoD Biometrics Feb 2008

Army Initiatives. Colonel Ted Jennings Project Manager DoD Biometrics Feb 2008 Army Initiatives Colonel Ted Jennings Project Manager DoD Biometrics theodore.jennings@us.army.mil 703-806-0538 1 AGENDA Mission Program Organization DoD Biometric Enterprise Concept BECC BFCFSO BECC Capability

More information

DAVA. Drugs Authentication and Verification Application. System for Authentication, Track and Trace of Pharmaceutical Products manufactured in India

DAVA. Drugs Authentication and Verification Application. System for Authentication, Track and Trace of Pharmaceutical Products manufactured in India DAVA Drugs Authentication and Verification Application System for Authentication, Track and Trace of Pharmaceutical Products manufactured in India Objectives To ensure the genuineness and authenticity

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

Summary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012

Summary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012 Summary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012 Federal Reserve Bank of Boston Payment Strategies Group June 24, 2013 The views

More information

why Business Partner Because you can use it to liberate your company from paper and manage your processes faster.

why Business Partner Because you can use it to liberate your company from paper and manage your processes faster. ENTERPRISE INFORMATION MANAGEMENT EIM R DOCUMENT ERP INTEGRATION & PROCESS MANAGEMENT WORKFLOW ENTERPRISE CONTENT SPOOL RECOGNITION MANAGEMENT FAX SERVER BUSINESS PROCESS MANAGEMENT MAIL WEB & CLIENT/SERVER

More information

Fighting Fraud On The Small Screen Comprehensive Fraud-mitigation Solutions Support Consumer-friendly Mobile Device Account Origination

Fighting Fraud On The Small Screen Comprehensive Fraud-mitigation Solutions Support Consumer-friendly Mobile Device Account Origination Comprehensive Fraud-mitigation Solutions Support Consumer-friendly Mobile Device Account Origination Account access via mobile devices is exploding. For example, in the banking industry the number of people

More information

Project Financing Models

Project Financing Models Project Financing Models Implementation of an e-passport or eid card can cost $ millions. There are 3 ways for a Government to allocate the budget: Direct Payment BOT (Build-Operate-Transfer) PPP (Public-Private

More information

ANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European

ANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European ANNEX: EU future electronic identification, authentication and signature (eias) policy (Summary of a Workshop hosted by the European Commission, Sept 5 th 2012, Brussels, based on the presentations used

More information

F R E N C H R E TA I L

F R E N C H R E TA I L TRANSFORM F R E N C H R E TA I L B E R N A R D O S A N C H E Z I N C E R A 2 8. 1 1. 2 0 1 7 KEY MESSAGES 1 A CLEAR VISION A client centric, expert and efficient bank driven to satisfy our customers 2

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market ehealth Governance Initiative eid Workshop Brussels, 11-12th February 2013 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Gábor

More information

Review of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings

Review of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings Review of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings The revised Payment Service Directive (PDS2) is a directive focused on better integration of an internal

More information

Fighting Fraud in the e-commerce Channel: A Merchant Study. June 2018

Fighting Fraud in the e-commerce Channel: A Merchant Study. June 2018 Fighting Fraud in the e-commerce Channel: A Merchant Study June 2018 1 Contents Executive Summary Section I: Identifying Threats Section II: Fraud Mitigation Tools Section III: Information Sharing Partnerships

More information

TECHED USER CONFERENCE MAY 3-4, 2016

TECHED USER CONFERENCE MAY 3-4, 2016 TECHED USER CONFERENCE MAY 3-4, 2016 Guido Falkenberg Software AG From Application Modernization to Digital Enterprise Transformation THE VALUE OF CORE APPLICATIONS IMPORTANCE AND CRITICALITY Tailored

More information

Visa s Future of Security Roadmap: Australia

Visa s Future of Security Roadmap: Australia Visa s Future of Security : Australia Contents Executive Summary 3-Domain Secure 2.0 Biometrics Tokenisation EMV Chip Technology Expanding Mobile Acceptance Mobile Geo-location Transaction Controls and

More information

Collaborative Creation with Customers of Smart Branch Solution for Banks

Collaborative Creation with Customers of Smart Branch Solution for Banks 878 Review Vol. 65 (2016), No. 2 Featured Articles Collaborative Creation with s of Smart Branch Solution for Banks Ke Jiang Yan Wang Keisuke Ichinose Ting He OVERVIEW: Along with the growth of Internet

More information

When the hard-to-reach become your preferred customers. Finc / the offering which addresses financial inclusion challenges

When the hard-to-reach become your preferred customers. Finc / the offering which addresses financial inclusion challenges When the hard-to-reach become your preferred customers Finc / the offering which addresses financial inclusion challenges Powering the Financial Inclusion revolution Today, 75% of the world s population

More information

Aadhaar, Direct Benefit Transfers and their impact

Aadhaar, Direct Benefit Transfers and their impact Aadhaar, Direct Benefit Transfers and their impact 11 th March 2013 UIDAI www.uidai.gov.in 1 Structure of the presentation Overall mandate of the Aadhaar Project Aadhaar and it s potential Direct Benefit

More information

IDENTIFICATION SOLUTIONS

IDENTIFICATION SOLUTIONS IDENTIFICATION SOLUTIONS IDENTIFICATION SOLUTIONS 01 INKRIPT Security at heart. Inkript delivers bespoke solutions in the fields of security printing, smartcards and trusted identification. Established

More information

INVESTOR PRESENTATION DNB TMT CONFERENCE

INVESTOR PRESENTATION DNB TMT CONFERENCE INVESTOR PRESENTATION DNB TMT CONFERENCE 29 August 2018 CFO, Henrik Knudtzon DISCLAIMER This presentation includes and is based, inter alia, on forward-looking information and statements that are subject

More information

The Digital Financial Services Ecosystem

The Digital Financial Services Ecosystem Digital Financial Services Focus Group The Digital Financial Services Ecosystem Presentation to the ITU Regional Economic and Financial Forum of Telecommunications/ICTs for Asia and Pacific, Kuala Lumpur,

More information

Connectivity key to efficient, safe, and convenient mobility

Connectivity key to efficient, safe, and convenient mobility Connectivity key to efficient, safe, and convenient mobility Dr. Markus Heyn Member of the board of management, Robert Bosch GmbH 1 Invented for life means connected for life Combining cross-domain know-how

More information

A Crossmatch Identity Management Product

A Crossmatch Identity Management Product A Crossmatch Identity Management Product 1 Imagine a World Where Identity proofing is simple to implement Biometric-based anti-fraud systems are comprehensive and omni-channel Analytics aid in preventing

More information

Emerging Payments: The Next Step in Providing Member Convenience via Channel Expansion. Presented by CO-OP Financial Services

Emerging Payments: The Next Step in Providing Member Convenience via Channel Expansion. Presented by CO-OP Financial Services Emerging Payments: The Next Step in Providing Member Convenience via Channel Expansion Presented by CO-OP Financial Services Today s Presenters DR.KATHYHERZIGER-SNIDER Vice President, Product Development

More information

The Universal Postal Union (The real THE Post Office) global Postal Trust Services

The Universal Postal Union (The real THE Post Office) global Postal Trust Services The Universal Postal Union (The real THE Post Office) global Postal Trust Services Universal Postal Union, Electronic Services Martin Roe roem@postoffice.co.uk Presentation Objective To provide an understanding

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 19:51:29 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

Shared Services between Government Agencies using BizTalk

Shared Services between Government Agencies using BizTalk Shared Services between Government Agencies using BizTalk with BizTalk Server 2006 R2 Christine Axton Application Platform Specialist Federal and State Public Sector UK Online Agenda - 2000 We're asking

More information

My new Apple device will have a payment feature. How do I set it up?

My new Apple device will have a payment feature. How do I set it up? F S HOW IT WORKS: PPLE PY ND DIGITL CCOUNT NUMBERS My new pple device will have a payment feature. How do I set it up? Before making payment with your new pple Device you will need to follow a few simple

More information

Bridgegate, customers. Continuum247 is features users. The. to be able. build this system. procedures. the system. The

Bridgegate, customers. Continuum247 is features users. The. to be able. build this system. procedures. the system. The Continuum247 is a leading online workforce management solution that has been catering to some of the prominent security providers like Bridgegate, Level One, Secur it and many more across UK. It has helped

More information

Public Procur ement. Global competition era has dawned. Renewed recognition on the role of procurement

Public Procur ement. Global competition era has dawned. Renewed recognition on the role of procurement February 2011 Public Procurement Service Function Introduction to PPS Background of KONEPS Rationale Development Characteristics of KONEPS Single Window (One stop / Integration) Market share KONEPS Architecture

More information

Biometric Attendance System

Biometric Attendance System Biometric Attendance System Dr. Sunita Narang, Dr. Surinder Kaur, Dr. Shalu Mahajan Acharya Narendra Dev College (University of Delhi) Email: sunitanarang@andc.du.ac.in, surinderkaur@andc.du.ac.in shalumahajan@andc.du.ac.in

More information

Smart credentials. Enabling today s and tomorrow s digital identities.

Smart credentials. Enabling today s and tomorrow s digital identities. Smart credentials Enabling today s and tomorrow s digital identities www.infineon.com/govid Opportunities Strengthen national security Increase administrative efficiency and deliver new government services

More information

16th International Conference on Security and Cryptography

16th International Conference on Security and Cryptography 16th International Conference on Security and Cryptography SECRYPT is part of ICETE, the 16th International Joint Conference on e-business and Telecommunications. Registration to SECRYPT allows free access

More information

AWS Life Sciences Competency Consulting Partner Validation Checklist

AWS Life Sciences Competency Consulting Partner Validation Checklist AWS Life Sciences Competency February 2018 Version 2.2 Table of Contents Introduction... 3 Competency Application and Audit Process... 3 Program Policies... 3 AWS Life Sciences Competency Program Prerequisites...

More information

Can drones & AI-enabled document analysis support audits in the future?

Can drones & AI-enabled document analysis support audits in the future? Can drones & AI-enabled document analysis support audits in the future? Showcases on new internal audit methodologies IAS 2018 Conference Brussels, 6 November 2018 The better the question. The better the

More information

FINGERPRINTS BIOMETRICS THE MISSING PIECE OF THE PAYMENT CARD PUZZLE?

FINGERPRINTS BIOMETRICS THE MISSING PIECE OF THE PAYMENT CARD PUZZLE? FINGERPRINTS BIOMETRICS THE MISSING PIECE OF THE PAYMENT CARD PUZZLE? 2018 On-card biometrics is the final piece of the puzzle to bring trust and security to contactless payments, without compromising

More information

WHO S GOT IT? WHO GETS IT?

WHO S GOT IT? WHO GETS IT? 3D SECURE 2.0: WHO S GOT IT? WHO GETS IT? An Outlook on Merchant Adoption BUSINESS-DRIVEN SECURITY SOLUTIONS 3D SECURE AUTHENTICATION 2.0: MERCHANTS WHO GOT IT ARE GETTING IT Online merchants whose experience

More information

The 2015 State of Consumer Privacy & Personalization

The 2015 State of Consumer Privacy & Personalization The 2015 State of Consumer Privacy & Personalization The 2015 State of Consumer Privacy & Personalization Last year, Gigya s privacy and personalization survey revealed that, when it came to their data

More information

Religare & Mantra Labs. Digitizing Insurance. -A Case Studywww.mantralabs.tech

Religare & Mantra Labs. Digitizing Insurance. -A Case Studywww.mantralabs.tech Religare & Mantra Labs Digitizing Insurance +91 991-163-7969 hello@mantralabs.tech -A Case Studywww.mantralabs.tech 01 Mantra Labs Introduction We are boutique digital InsurTech focused company with an

More information