October 20 th,
|
|
- Marlene Singleton
- 6 years ago
- Views:
Transcription
1 Introduction to Private Identity as a Service (PIDaaS): Secure authentication system, based on biometric recognition technologies through mobile devices. October 20 th, 2015 contacts@pidaas.eu
2 Contents 1 Introduction Goals of the project State of the art Issues to solve PIDaaS solution The benefits Pilots E-commerce E-health E-citizen... 5
3 1 Introduction PIDaaS aims to create and to field-test a secure authentication system, based on biometric recognition technologies (speaker and face recognition) through mobile devices. PIDaaS is a project co-founded under the ICT Policy Support Programme by the following partners: CSI Piemonte, Bantec, Eurecat, Ricoh, University of Kent, E-bros, TicSalut and Hogskolen I Gjovik. 2 Goals of the project The goals of PIDaaS are: 1. To develop a robust, flexible, scalable and easy to integrate service for identity assurance of user s with the help of bio-identities features in mobile devices. 2. To share with internet application providers, the possibility of an easy integration of biometric authentication of their customers into their remote identification processes. 3 State of the art The identification and verification of individuals using biometric identifiers based on personal traits have been widely used in different contexts, governmental, forensic (police investigations) and for commercial uses. Mobile devices and the explosion of social media increase the use of biometrics for daily activities which require authentication, such as payments, and for the substitution of passwords and PINs. However, some issues must be well addressed, like user acceptance or resistance to fraud. The current biometric authentication technologies are: Voice scan Finger scan Facial scan Iris scan Hand scan Vein recognition DNA matching Signature scan In-Air signature Keystroke scan Gait 4 Issues to solve It has been done an analysis of the existing solutions and its authentication process. This section describes the problems encountered of the studied solutions: Biometric algorithms must be tailored in order to fit the specific sensors characteristics of mobile devices. 1
4 Required security preservation of biometric data in the authentication process: o User s biometric samples are strongly linked with user s identity. o The multiple enrolment processes for every service provider increases the user s feelings about getting out of control of her/his data. o Lack of user control and potential privacy. Non-renewability of personal biometrics traits: Renewability and revocability are essential functionalities required in identity management. The protection of biometric data and its sharing across different legal entities is very difficult to achieve because of non-uniform National/European personal data regulations. Difficulty of the integration process of biometric authentication for mobile/web services and application developers. 5 PIDaaS solution PIDaaS aims to create a secure authentication system, based on biometric recognition technologies (speaker and face recognition) through mobile devices. It is the result of the integration of the following three technologies: BTPS, IdForMe and LMP. The platform consists on the following components: 1. PIDaaS Mobile application: It allows the users to manage their identity, personal data and biometric templates (digital reference of characteristics that have been extracted from a biometric sample) and to be authenticated through speaker and face recognition. The management of data allows the users to authorize which action is performed in their name on any website and decide what information they allow to access to Website, Mobile apps, online purchasing, etc. The authentication process is based on the IdForMe platform, which allows people to do the authentication process using the speaker and face recognition verification technology. 2. PIDaaS Backend: It provides to the Mobile Application and Service Providers a gateway to access to the PIDaaS platform services. Through this gateway, service providers can ask for login authentication services, and users can manage their stored data. 3. PIDaaS Life Management Platform (LMP): It is responsible for storing the information about PIDaaS users, service providers and for monitoring the users activities within the PIDaaS platform. It is a mechanism for sharing personal data between the user and the services in a secure way. Its objectives in PIDaaS are: Manage the authentication process. Store the biometric templates (verification data). Provide control to users over those templates and their personal data. 4. PIDaaS Biometric Template Protection Scheme (BTPS): It is responsible for creating and verifying the biometrics templates of the users (so called Pseudo Identities). This technology enables the creation of multiple pseudo-bio-identities from the same biometric trait, with the possibility of revoking, renewing and reissuing them. It assures the privacy 2
5 by allowing the use of biometric traits while avoiding the inherited risk of classic biometric solutions. The integration of these technologies will be tested and validated in three different pilots: E-commerce, E-health and E-citizen. The pilots will be used for the analysis of the usage of the service. PIDaaS Platform BTPS Encoder BTPS Verifier Push Notification Service Mobile Application Life Management Platform Backend Service Provider Other Device Figure 1: PIDaaS architecture 6 The benefits PIDaaS provides an innovative approach to e-services (e-commerce, e-citizen, and e-health) in a way giving users strong advantages and market competitiveness in the following aspects: 1. Convenience: PIN or password is omitted or expressed by voice/face; 2. Security: users are verified by their biometrics; 3. Privacy protection: biometric information used for verification is protected by BTPS. These merits makes PIDaaS solution promising in the current and future markets because none of existing identity authentication solutions including those biometrics-enabled can perform well in all the three above aspects in the same time, which makes a good market perspective for the PIDaaS solution. Each technology also enriches the solution with its specific benefits: BTPS technologies have been proved to be useful for voice/face biometric modality. 3
6 Biometric mobile verification systems because many manufacturers have adapted their existing technology to be ready for deployment. LMP technology meets the need for the necessary trust frameworks and the need for greater dialogue between regulators and private sector. LMP offers a service where the user is the centre of decision. Figure 2: Functioning of PIDaaS pilots 7 Pilots 7.1 E-commerce This pilot takes place in an environment of e-commerce (B2B). PIDaaS solution will be integrated on the platform of one of the biggest e-shops in Finland, the company F9 Distribution OY. PIDaaS will be used by real customers. Objectives Test and prove technical and functional quality of offered solution. Test and get feedback on usability of PIDaaS solution. Get feedback about market acceptance and commercial attractiveness of PIDaaS solution. Easiness of PIDaaS integration into e-commerce solution, provided by E-Bros. 7.2 E-health TICSalut will carry the pilot in Catalonia (Spain). It will be useful to test integration of PIDaaS with the platform of the Catalan health system. This platform enables people to interact online through computer or other mobile devices with the health department, its agencies and providers (hospitals, health centers, etc.). 4
7 Objectives Accessibility of the patients on their data in the Catalan health system by authenticating themselves through the PIDaaS platform. Testing its performance and usability. 7.3 E-citizen There will be a pilot performed in Italy, in which PIDaaS will be integrated in the service of visualization of the personal data within the human resources procedures. The employees belonging to an administration or company will be able to access to their personals records (such as payroll, holidays, time off work, etc.) and visualize them. Objectives To confirm that PIDaaS authentication grants users safe access to data and with adequate performance and usability degrees. Testing its performance and usability degrees. 5
Biometrics: Advantages for Employee Attendance Verification
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
More informationTrending: How does PSD2 trigger innovation?
Trending: How does PSD2 trigger innovation? Speakers: Nils Jung, Managing Partner, Innopay Germany Hakan Eroglu, Senior Manager Digitization in Payments & Banking, Accenture Trending: How does PSD2 trigger
More informationElectronic Banking (E-Banking)
Electronic Banking (E-Banking) E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels.
More informationX Infotech Government
X Infotech Government Software solutions for identity documents WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for issuance, management and verification of electronic identity
More informationX Infotech Banking. Software solutions for smart card issuance
X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial
More informationAn Integrated National ID System Final.docx
From the SelectedWorks of Nicholas Mungo Winter September 1, 2015 An Integrated National ID System Final.docx Nicholas Mungo Available at: https://works.bepress.com/nicholas-mungo/1/ WHAT IF Series An
More informationBEST PRACTICES: 2015 Credit Card Mobile Sites and Apps
BEST PRACTICES: 2015 Credit Card Mobile Sites and Apps Who is KLI? KEY LIME INTERACTIVE (KLI) is a user research firm that conducts both qualitative and quantitative research for Fortune 2000 companies,
More informationWWW.FINGERPRINTS.COM Internet Scale Adoption of Biometrics Ubiquity First Era Adoption at Scale Single Platform & Use Case 2014-2016 Second Era Use Case Expansion High Trust Use Cases on Single Platform
More informationeid Meets Credit Cards and Biometrics: The Next Stage of Convergence Adam Ross Sales Manager eid Solutions EMEA, cv cryptovision GmbH
eid Meets Credit Cards and Biometrics: The Next Stage of Convergence Adam Ross Sales Manager eid Solutions EMEA, cv cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24
More informationMobile Authentication Application for a Security Solutions Provider ATTENTION. ALWAYS.
Mobile Authentication Application for a Security Solutions Provider ATTENTION. ALWAYS. THE CUSTOMER Our Customer is a security solutions provider, specializing in identity management solutions, for businesses
More informationAccelerating Identity Programs with Mobile Biometric Enrollment Bringing scalability, efficiency, and cost savings to developing nations with Tascent
Bringing scalability, efficiency, and cost savings to developing nations with Tascent M6 Tascent White Paper Tascent.com The Need for Efficient Identity Enrollment in Developing Nations Throughout the
More informationCase Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform
Case Study How Gemalto s Trust Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Traditional know-your-customer (KYC) processes are costly, complex
More informationIDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS INDEPENDENT VALUE-DRIVEN EXPERTISE From industry-leading development of biometric products and
More informationDESIGN AND ENHANCED ADHAAR SECURED AUTOMATIC RATION SYSTEM FOR PUBLIC WELFARE USING LABVIEW
DESIGN AND ENHANCED ADHAAR SECURED AUTOMATIC RATION SYSTEM FOR PUBLIC WELFARE USING LABVIEW P Suresh kumar *, A Muthukumar, R Monik Chandru, R Maniselvan, Vishal Gupta, * Professor, Dept of Electrical
More information(a) (i) Define the term real-time. [2 marks]
1. Walrus radio-tracking in the southern Chukchi Sea 2008 During the 2008 migration, researchers attached satellite radio-tags to 28 walruses in the southern Chukchi Sea region. Tracking data from this
More informationtimeware 2018 biometrics
timeware 2018 INTERESTED? Give us a call on +44 (0)1706 659368 Document t2-0451: revision 1.0 Copyright NMD 3 Ltd www.timeware.org +44 (0)1706 659368 For more information about timeware products, version
More informationWarwick PalmReader Proposal. Proposal of. Warwick PalmReader. Version Version: 1.03 Page 1
Proposal of Warwick PalmReader Version 1.03 Version: 1.03 Page 1 Table of Contents 1. Technology Overview...3 2. Cost Saving Automated Time Attendance...4 3. Biometrics Comparison...5 4. Applications...6
More informationOvercoming Barriers in the field of Authentication and Identification
Overcoming Barriers in the field of Authentication and Identification Dr. Sjaak Nouwt TILT Tilburg Institute for Law, Technology, and Society Tilburg University, the Netherlands j.nouwt@uvt.nl Roadmap
More informationThe Transformation of the Iris Recognition Market
presents The Transformation of the Iris Recognition Market 2007 2020 april 11, 2007 washington DC ipira biometric series c. maxine most acuity market intelligence cmaxmost@acuitymi.com Acuity Market Intelligence
More informationBiometrics. Ending Time Theft and Controlling Security Access. Summary
Biometrics Ending Time Theft and Controlling Security Access Summary Once the domain of science fiction, today s biometric technology offers advanced identification and verification for employees in every
More informationTHE BEST PRACTICES IN IMPLEMENTATION OF MOBILE IDENTIFICATION (mid) OUR VISION ABOUT mid. Kārlis Siliņš
THE BEST PRACTICES IN IMPLEMENTATION OF MOBILE IDENTIFICATION (mid) OUR VISION ABOUT mid Kārlis Siliņš Session 1 Introduction on mid: Trends, Challenges and Opportunities Couple of words about mid in Latvia:
More informationArtificial Intelligence. Big Data Analytics
ENHANCING CUSTOMER EXPERIENCE WITH SECURE DIGITAL IDENTITY In the past decade, digitalization has had a profound impact on the financial services sector, supported by developments in major technology areas
More informationCHALLENGES (BARRIERS) IN ADOPTING THE ELECTRONIC COMMERCE SYSTEM IN LIC OF INDIA
CHAPTER-6 CHALLENGES (BARRIERS) IN ADOPTING THE ELECTRONIC COMMERCE SYSTEM IN LIC OF INDIA 6.1 Introduction : e-insurance is the application of Internet and related technologies to the production and distribution
More informationGovernment solutions. Enterprise & Government Solutions
Government solutions Enterprise & Government Solutions Introduction Enabling trusted connections and improved access to government services As digitisation continues to change how citizens live and work
More informationB. Executive Summary. Category: Digital Government: Government to Citizen Page 2 of 6
B. Executive Summary Through MyDMV it is now possible in New York State for there to be a citizen single logon for a multitude of programs, services, and applications across state agencies. MyDMV is the
More informationTECHNOLOGY FOR FOOD STORE EFFICIENCY
U.S. Department of Agriculture Agricultural Outlook Forum 2003 February 20 & 21, 2003 TECHNOLOGY FOR FOOD STORE EFFICIENCY Alan Couch Director Food Industry Marketing Technology for Food Store Efficiency
More informationModule: Introducing E-democracy
Module: Introducing E-democracy Introduction Low voting figures have led to claims that people have lost trust in politicians and have become disenfranchised from politics. While technology alone will
More informationfingermetrica Built-In-Fingerprint Biometric Solutions Biometric Recognition Embedded Algorithm Library
iometric Recognition Embedded Algorithm Library Reliable flexibility in embedded biometric fingerprint solutions. Manfred öswald GmbH Security for home, office and networks 2005 GmbH 04.2005 General Informations
More informationCase Study: Quintiles Transnational Corporation
: Quintiles Transnational Corporation Project Overview The Project covers the development and implementation of the custom application allowing for biometric identification by fingerprints of medical workers
More informationTascent Enterprise Suite Multimodal Biometric Identity Platform
TM Tascent Enterprise Suite Multimodal Biometric Identity Platform tascent.com Multimodal Biometric Identity System Secure, scalable, and easy-to-use, the Tascent Enterprise Suite represents a thoroughly
More informationExpanding to New Verticals
Expanding to New Verticals Mobile Card Product and Feature Suite Dave Abouchar, Director New Mobile Products Krishna Rajamani, Mobile Product Manager April 12, 2017 Agenda 1. Introduction 2. Credit Card
More informationsecunet Security Networks AG Biometric System Enabler The BioAPI Middleware
secunet Security Networks AG Biometric System Enabler The BioAPI Middleware EAB Scandinavian Applications, Oslo, 2012-04-12 Michael Schwaiger Questions planned to be answered What is the BioAPI middleware?
More informationBank Leumi transforms authentication.
Bank Leumi transforms authentication. Cost-effective, multi-factor authentication used at one of Israel s largest contact centers. Challenge 20-30 second AHT for authentication Manual authentication was
More informationUBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR
UBISECURE CUSTOMER SURVEY ORGANISATIONAL VIEWS ON: STRONG CUSTOMER AUTHENTICATION, CUSTOMER EXPERIENCE & GDPR 2017-2018 SURVEY REPORT Connecting Identity. Transforming Digital Business. INTRODUCTION Online
More informationThe communication between Third Party Providers and Banks. PSD2 in a nutshell
www.pwc.com/psd2 The communication between Third Party Providers and Banks. What will the impact of technology be? PSD2 in a nutshell Summary The banking system is at a turning point, under the pressure
More informationOnline Approval System
Online Approval System Loan Origination Platform for financial institutions automating the entire lending process Klustr Platform IS an advanced Loan Origination Platform, built on state-ofthe-art internet
More informationMultiple Sites. Tomorrow s Technology
Multiple Sites Tomorrow s Technology Multiple Technologies mix to achieve cost effective security. Perfect Access Control and Visitor Management. Biometric Systems are used to keep a check on incidences
More informationMobile Money mobilem Payment Module for Odoo 8.0 & 9.0. Installation & Configuration User guide
Mobile Money mobilem Payment Module for Odoo 8.0 & 9.0 Installation & Configuration User guide Table of Contents 1.Installation...2 (1)Prerequisites...2 (2)Downloading...2 (3)Installation procedure...2
More informationBiometrics for Financial Institutions and the new Gemalto Biometric Sensor Payment card
Biometrics for Financial Institutions and the new Gemalto Biometric Sensor Payment card White paper October 2017 1- Financial Services go digital: Smartphones set the new user experiences with biometrics
More informationNCR Passport for Commercial. Part of NCR s enterprise hub for remote deposit capture
NCR Passport for Commercial Part of NCR s enterprise hub for remote deposit capture For more information on RDC, speak to your sales contact or go to ncr.com. Easy and secure deposits from where their
More informationWHERE DO YOU WANT TO GROW. Solutions for Community Financial Institutions
WHERE DO YOU WANT TO GROW TODAY? Solutions for Community Financial Institutions 2 Today s users demand more from their financial institution. They expect their banking experiences to be digital, easy,
More informationSelf-Sovereign for Web
Self-Sovereign for Web is? itrue is modular Blockchain and Biometric solution focused on giving users control of their own data back from big technology firms. We secure access to the system with facial
More informationGemalto Consulting Services. Take control of your smart card implementation
Gemalto Consulting Services Take control of your smart card implementation FINANCIAL SERVICES & RETAIL > SERVICE ENTERPRISE INTERNET CONTENT PROVIDERS PUBLIC SECTOR TELECOMMUNICATIONS TRANSPORT Gemalto
More informationTHE PAYMENT SERVICES DIRECTIVE II (PSD II) Liberalisation of electronic payment transactions
April 2017 THE PAYMENT SERVICES DIRECTIVE II (PSD II) Liberalisation of electronic payment transactions Hurry up! Only a few more months until January 2018, when payment service providers are obliged to
More informationThe PwC KYC Centre of Excellence
www.pwc.com/jg/en/verification-services The PwC KYC Centre of Excellence Transforming your client onboarding process Greater insight, Better decisions Transform your customer onboarding with PwC PwC s
More informationTIME & ATTENDANCE DATA COLLECTION OPTIONS
TIME & ATTENDANCE DATA COLLECTION OPTIONS Third-Party Hardware Options for Collecting Data www.saashr.com 1.866.722.9952 Contents Kronos InTouch 1 ZK T4 2 ZK S300 2 HandPunch 1000 3 HandPunch 3000 3 HandPunch
More informationIMAGO. Management System for Citizen Registration and Identity Documents
IMAGO Management System for Citizen Registration and Identity Documents IMAGO EFFECTIVELY MANAGES EACH STEP ON THE PATH TO PRODUCING AN IDENTITY DOCUMENT AND BEYOND Efficient capturing of personal and
More informationSecuRe Pay recommendations for the security of mobile payments
ECB-PUBLIC FINAL SecuRe Pay recommendations for the security of mobile payments Stephanie Czák Senior Market Infrastructure Expert European Central Bank ETSI/EC Collaborative Ecosystem for M-Payments Workshop
More informationFeasibility study on an electronic identification, authentication and signature policy (IAS)
Feasibility study on an electronic identification, authentication and signature policy (IAS) SMART 2010/0008 Final Study Report 18 January 2013 D4.2 (Version 1b-Final) This study was commissioned by the
More informationRecent Developments in Retail Payments
Recent Developments in Retail Payments Global Trends in Retail Payments Harish Natarajan Payment Systems Development Group Global Payments Week 2014, September 23-25, New York, NY Developing a comprehensive
More informationMODELS OF MOBILE PAYMENTS
MODELS OF MOBILE PAYMENTS MARJAN GUSEV, LJUPCO ANTOVSKI, GOCE ARMENSKI Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss. Cyril and Methodius University Arhimedova b.b., PO Box 162,
More informationSupporting the transformation of government services
Supporting the transformation of government services Helping to ensure better access to everyday services for consumers. And reduced cost, risk and time to deploy for government. The challenge Our egov
More informationDeploying Voice Biometrics: A How-To-Guide. Bryan Chaney Vice President, Sales North America
Deploying Voice Biometrics: A How-To-Guide Bryan Chaney Vice President, Sales North America Baby Alisa Khitrova! Voice Biometrics Conference 2014 2 SpeechPro is the US subsidiary of the Speech Technology
More informationMichigan Department of Transportation Market Scan for a Digital Signature Solution
Michigan Department of Transportation Market Scan for a Digital Signature Solution Contact: E-Mail: David Hatch hatchd@michigan.gov Table of Contents Privacy Information... 1 Market Scan Description and
More informationCatalan Health System
Catalan System Building bridges between professional and patient data: merging PHR and EHR e Week, Amsterdam, 9 th June, 2016 Summary 1 TicSalut Foundation 2 Catalan care System 3 Catalan Shared Medical
More informationDAVA. Drugs Authentication and Verification Application. A portal for Indian Drugs authentication, track and trace
DAVA Drugs Authentication and Verification Application A portal for Indian Drugs authentication, track and trace Avinash Pedgaonkar 15-12-2015 Objectives To ensure the genuineness and authenticity of the
More informationGemalto's trusted digital ID technology for Mobile Network Operators
Gemalto's trusted digital ID technology for Mobile Network Operators Table of Contents 1. Capture devices & solutions...4 2. Document verification solutions...7 3. Biometric solutions...10 4. Digitalization
More informationDICTATION & TRANSCRIPTION
DICTATION & TRANSCRIPTION www.dolbey.com INFO@DOLBEY.com 800 878 7828 Fusion Voice Digital Dictation The quality of a patient s chart relies upon the clinician s ability to effectively communicate findings,
More informationDictation & Transcription Solutions
Dictation, Transcription, Speech Recognition, Computer-Assisted Coding & CDI Solutions Dictation & Transcription Solutions Highly customizable and completely integrated, crucial components essential for
More informationSamsung SDS Nexledger. A Blockchain Platform and Solution
Samsung SDS Nexledger A Blockchain Platform and Solution Blockchain is a trustworthy record or ledger of all transactions that have taken place. It uses the Consensus Protocol for validating processes
More informationMobile & Online Banking
Mobile & Online Banking Digital banking - no longer a matter of nice to have In today s world, online and mobile banking are no longer nice to have on the consumer s mind. Consumer s daily lives are seamlessly
More informationArmy Initiatives. Colonel Ted Jennings Project Manager DoD Biometrics Feb 2008
Army Initiatives Colonel Ted Jennings Project Manager DoD Biometrics theodore.jennings@us.army.mil 703-806-0538 1 AGENDA Mission Program Organization DoD Biometric Enterprise Concept BECC BFCFSO BECC Capability
More informationDAVA. Drugs Authentication and Verification Application. System for Authentication, Track and Trace of Pharmaceutical Products manufactured in India
DAVA Drugs Authentication and Verification Application System for Authentication, Track and Trace of Pharmaceutical Products manufactured in India Objectives To ensure the genuineness and authenticity
More informationOpenBank - banking platform for e-money management based on blockchain technology (version 0.2)
OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple
More informationSummary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012
Summary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012 Federal Reserve Bank of Boston Payment Strategies Group June 24, 2013 The views
More informationwhy Business Partner Because you can use it to liberate your company from paper and manage your processes faster.
ENTERPRISE INFORMATION MANAGEMENT EIM R DOCUMENT ERP INTEGRATION & PROCESS MANAGEMENT WORKFLOW ENTERPRISE CONTENT SPOOL RECOGNITION MANAGEMENT FAX SERVER BUSINESS PROCESS MANAGEMENT MAIL WEB & CLIENT/SERVER
More informationFighting Fraud On The Small Screen Comprehensive Fraud-mitigation Solutions Support Consumer-friendly Mobile Device Account Origination
Comprehensive Fraud-mitigation Solutions Support Consumer-friendly Mobile Device Account Origination Account access via mobile devices is exploding. For example, in the banking industry the number of people
More informationProject Financing Models
Project Financing Models Implementation of an e-passport or eid card can cost $ millions. There are 3 ways for a Government to allocate the budget: Direct Payment BOT (Build-Operate-Transfer) PPP (Public-Private
More informationANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European
ANNEX: EU future electronic identification, authentication and signature (eias) policy (Summary of a Workshop hosted by the European Commission, Sept 5 th 2012, Brussels, based on the presentations used
More informationF R E N C H R E TA I L
TRANSFORM F R E N C H R E TA I L B E R N A R D O S A N C H E Z I N C E R A 2 8. 1 1. 2 0 1 7 KEY MESSAGES 1 A CLEAR VISION A client centric, expert and efficient bank driven to satisfy our customers 2
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
ehealth Governance Initiative eid Workshop Brussels, 11-12th February 2013 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Gábor
More informationReview of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings
Review of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings The revised Payment Service Directive (PDS2) is a directive focused on better integration of an internal
More informationFighting Fraud in the e-commerce Channel: A Merchant Study. June 2018
Fighting Fraud in the e-commerce Channel: A Merchant Study June 2018 1 Contents Executive Summary Section I: Identifying Threats Section II: Fraud Mitigation Tools Section III: Information Sharing Partnerships
More informationTECHED USER CONFERENCE MAY 3-4, 2016
TECHED USER CONFERENCE MAY 3-4, 2016 Guido Falkenberg Software AG From Application Modernization to Digital Enterprise Transformation THE VALUE OF CORE APPLICATIONS IMPORTANCE AND CRITICALITY Tailored
More informationVisa s Future of Security Roadmap: Australia
Visa s Future of Security : Australia Contents Executive Summary 3-Domain Secure 2.0 Biometrics Tokenisation EMV Chip Technology Expanding Mobile Acceptance Mobile Geo-location Transaction Controls and
More informationCollaborative Creation with Customers of Smart Branch Solution for Banks
878 Review Vol. 65 (2016), No. 2 Featured Articles Collaborative Creation with s of Smart Branch Solution for Banks Ke Jiang Yan Wang Keisuke Ichinose Ting He OVERVIEW: Along with the growth of Internet
More informationWhen the hard-to-reach become your preferred customers. Finc / the offering which addresses financial inclusion challenges
When the hard-to-reach become your preferred customers Finc / the offering which addresses financial inclusion challenges Powering the Financial Inclusion revolution Today, 75% of the world s population
More informationAadhaar, Direct Benefit Transfers and their impact
Aadhaar, Direct Benefit Transfers and their impact 11 th March 2013 UIDAI www.uidai.gov.in 1 Structure of the presentation Overall mandate of the Aadhaar Project Aadhaar and it s potential Direct Benefit
More informationIDENTIFICATION SOLUTIONS
IDENTIFICATION SOLUTIONS IDENTIFICATION SOLUTIONS 01 INKRIPT Security at heart. Inkript delivers bespoke solutions in the fields of security printing, smartcards and trusted identification. Established
More informationINVESTOR PRESENTATION DNB TMT CONFERENCE
INVESTOR PRESENTATION DNB TMT CONFERENCE 29 August 2018 CFO, Henrik Knudtzon DISCLAIMER This presentation includes and is based, inter alia, on forward-looking information and statements that are subject
More informationThe Digital Financial Services Ecosystem
Digital Financial Services Focus Group The Digital Financial Services Ecosystem Presentation to the ITU Regional Economic and Financial Forum of Telecommunications/ICTs for Asia and Pacific, Kuala Lumpur,
More informationConnectivity key to efficient, safe, and convenient mobility
Connectivity key to efficient, safe, and convenient mobility Dr. Markus Heyn Member of the board of management, Robert Bosch GmbH 1 Invented for life means connected for life Combining cross-domain know-how
More informationA Crossmatch Identity Management Product
A Crossmatch Identity Management Product 1 Imagine a World Where Identity proofing is simple to implement Biometric-based anti-fraud systems are comprehensive and omni-channel Analytics aid in preventing
More informationEmerging Payments: The Next Step in Providing Member Convenience via Channel Expansion. Presented by CO-OP Financial Services
Emerging Payments: The Next Step in Providing Member Convenience via Channel Expansion Presented by CO-OP Financial Services Today s Presenters DR.KATHYHERZIGER-SNIDER Vice President, Product Development
More informationThe Universal Postal Union (The real THE Post Office) global Postal Trust Services
The Universal Postal Union (The real THE Post Office) global Postal Trust Services Universal Postal Union, Electronic Services Martin Roe roem@postoffice.co.uk Presentation Objective To provide an understanding
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 19:51:29 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationShared Services between Government Agencies using BizTalk
Shared Services between Government Agencies using BizTalk with BizTalk Server 2006 R2 Christine Axton Application Platform Specialist Federal and State Public Sector UK Online Agenda - 2000 We're asking
More informationMy new Apple device will have a payment feature. How do I set it up?
F S HOW IT WORKS: PPLE PY ND DIGITL CCOUNT NUMBERS My new pple device will have a payment feature. How do I set it up? Before making payment with your new pple Device you will need to follow a few simple
More informationBridgegate, customers. Continuum247 is features users. The. to be able. build this system. procedures. the system. The
Continuum247 is a leading online workforce management solution that has been catering to some of the prominent security providers like Bridgegate, Level One, Secur it and many more across UK. It has helped
More informationPublic Procur ement. Global competition era has dawned. Renewed recognition on the role of procurement
February 2011 Public Procurement Service Function Introduction to PPS Background of KONEPS Rationale Development Characteristics of KONEPS Single Window (One stop / Integration) Market share KONEPS Architecture
More informationBiometric Attendance System
Biometric Attendance System Dr. Sunita Narang, Dr. Surinder Kaur, Dr. Shalu Mahajan Acharya Narendra Dev College (University of Delhi) Email: sunitanarang@andc.du.ac.in, surinderkaur@andc.du.ac.in shalumahajan@andc.du.ac.in
More informationSmart credentials. Enabling today s and tomorrow s digital identities.
Smart credentials Enabling today s and tomorrow s digital identities www.infineon.com/govid Opportunities Strengthen national security Increase administrative efficiency and deliver new government services
More information16th International Conference on Security and Cryptography
16th International Conference on Security and Cryptography SECRYPT is part of ICETE, the 16th International Joint Conference on e-business and Telecommunications. Registration to SECRYPT allows free access
More informationAWS Life Sciences Competency Consulting Partner Validation Checklist
AWS Life Sciences Competency February 2018 Version 2.2 Table of Contents Introduction... 3 Competency Application and Audit Process... 3 Program Policies... 3 AWS Life Sciences Competency Program Prerequisites...
More informationCan drones & AI-enabled document analysis support audits in the future?
Can drones & AI-enabled document analysis support audits in the future? Showcases on new internal audit methodologies IAS 2018 Conference Brussels, 6 November 2018 The better the question. The better the
More informationFINGERPRINTS BIOMETRICS THE MISSING PIECE OF THE PAYMENT CARD PUZZLE?
FINGERPRINTS BIOMETRICS THE MISSING PIECE OF THE PAYMENT CARD PUZZLE? 2018 On-card biometrics is the final piece of the puzzle to bring trust and security to contactless payments, without compromising
More informationWHO S GOT IT? WHO GETS IT?
3D SECURE 2.0: WHO S GOT IT? WHO GETS IT? An Outlook on Merchant Adoption BUSINESS-DRIVEN SECURITY SOLUTIONS 3D SECURE AUTHENTICATION 2.0: MERCHANTS WHO GOT IT ARE GETTING IT Online merchants whose experience
More informationThe 2015 State of Consumer Privacy & Personalization
The 2015 State of Consumer Privacy & Personalization The 2015 State of Consumer Privacy & Personalization Last year, Gigya s privacy and personalization survey revealed that, when it came to their data
More informationReligare & Mantra Labs. Digitizing Insurance. -A Case Studywww.mantralabs.tech
Religare & Mantra Labs Digitizing Insurance +91 991-163-7969 hello@mantralabs.tech -A Case Studywww.mantralabs.tech 01 Mantra Labs Introduction We are boutique digital InsurTech focused company with an
More information