SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Positively Authenticate Customer Identities with RightAccount™
Fast, accurate, and secure bank customer identification
Protect your customers and your institution
Financial services customers need to feel safe and secure knowing that their identities
are protected for each and every transaction. In a world where fraud and identity theft
are increasing security concerns, bank patrons expect that their financial service
institutions are investing in modern technology that can quickly, accurately, and securely
verify their identities and protect their assets.
What is RightAccount™?
Our RightAccount™ multimodal biometric identification solution is built with our award-
winning Bio-Plugin™ identification management software and helps to safeguard
against the rise in identity theft and fraud by positively authenticating customer
identities directly at the point of service.
RightAccount™
www.m2sys.com© 2014
The number one reason behind bank fraud is the customer identity theft.
• An approximate 10 million people are victims of identity theft every year.
• There are 19 new victims every minute of every day.
• Bank ID theft is increasing at an alarming rate and is affecting millions of people.
• The majority of identity theft incidents (85%) involved the fraudulent use of existing
account information, such as credit card or bank account information.
• Victims who had personal information used to open a new account or for other
fraudulent purposes were more likely than victims of existing account fraud to
experience financial, credit, and relationship problems and severe emotional distress.
Source: Identity Theft - Facts and Figures
Identity Theft & Bank Fraud Facts and Stats
Fraud and ID Theft A Rising Concern
www.m2sys.com© 2014
• Financial institutions incurred $955 million in losses due to debit card fraud in 2010 – a 21% increase from the
$788 million in losses incurred during 2008.
• In 2011, 59% of the more than 37 billion debit card transactions that were made were verified by signature, 85%
of all fraudulent debit card transactions involved signature “verification,” and $1.15 billion of the total $1.35
billion in debt card fraud losses (85%) stemmed from signature debit card transactions.
• Identity theft is a form of fraud that often results in unauthorized credit card and debit card transactions. There
were 13% more cases of identity theft in 2011 than in 2010, yet the costs incurred by consumers actually
represented a 44% decrease over the course of the previous eight years.
Source: Credit Card & Debit Card Fraud Statistics
Bank Fraud Statistics
The Negative Effects of Bank Fraud
www.m2sys.com© 2014
Seamless integration
into existing banking
software
Establishes a concrete
audit trail for
customer financial
transactions
Eliminates risk
associated with
password or signature
based security
Improves customer
service and brand
sentiment
Features of RightAccount™
RightAccount™ Helps to Prevent Fraud
www.m2sys.com© 2014
RightAccount™ enrolls
customer based on fingerprint
+ finger vein pattern (when
used with M2-FuseID™
device)
Customer scans a finger
Employee opens the new
customer account
opening screen
Bank employee logs into
the core banking
application
RightAccount™ prompts
for customer finger scan
– locks all other
operations
New account opening screen
continues
Audit trail created
Customer enters the bank and
is directed to bank employees
for account transactions
We recommend our M2-
FuseID™ “smart” finger scanner
as the biometric modality.
RightAccount™ Workflow
www.m2sys.com© 2014
Step 1
• Customer enters bank and is directed to bank employees for secure transaction.
Step 2
• Bank employee logs into the core banking application.
Step 3
• Employee navigates to inter-bank fund transfer screen.
Step 4
• RightAccount™ prompts for customer biometric scan – locks all other operations.
Step 4
• Customer scans a biometric.
Step 5
• RightAccount™ authenticates the customer based on biometrics, creates audit trail.
Step 6
• Inter-bank fund transfer operation continues.
How Does RightAccount™ Authentication
Secure Bank Transactions?
www.m2sys.com© 2014
Here are some benefits of using
RightAccount™ for customer authentication:
• Establish safe and secure transactions by
protecting customer identities with their
unique biometric features like fingerprints
and finger vein patterns.
• Improve customer service by eliminating
the risk of sharing personal information
over unsecured telephone lines with the
use of voice biometric for customer
authentication.
• Reduce identity fraud at the point of
service by providing biometric
authentication on mobile phones.
Why Adopt RightAccount™?
www.m2sys.com© 2014
Corporate Headquarters:
1050 Crown Pointe Pkwy.
Suite 850
Atlanta, GA 30338
USA
Asia Office:
House-279, Road-19,
Mohakhali DOHS,
Dhaka 1216
Bangladesh
E-mail: info@m2sys.com
Phone: +1 (770) 393 0986
Website: www.m2sys.com
Get Social:
Facebook: https://www.facebook.com/m2sys
Twitter: @M2SYS
LinkedIn: http://www.linkedin.com/company/m2sys-technology
Blog: blog.m2sys.com
YouTube: http://www.youtube.com/m2sys
Google+: https://plus.google.com/M2SYS
Contact Us
www.m2sys.com© 2014

Contenu connexe

Plus de M2SYS Technology

TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Plus de M2SYS Technology (15)

TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Dernier

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxuzma244191
 

Dernier (20)

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptx
 

RightAccount™ Biometric Customer Identification for Banks and the Financial Services Industry

  • 1.
  • 2. Positively Authenticate Customer Identities with RightAccount™ Fast, accurate, and secure bank customer identification Protect your customers and your institution Financial services customers need to feel safe and secure knowing that their identities are protected for each and every transaction. In a world where fraud and identity theft are increasing security concerns, bank patrons expect that their financial service institutions are investing in modern technology that can quickly, accurately, and securely verify their identities and protect their assets. What is RightAccount™? Our RightAccount™ multimodal biometric identification solution is built with our award- winning Bio-Plugin™ identification management software and helps to safeguard against the rise in identity theft and fraud by positively authenticating customer identities directly at the point of service. RightAccount™ www.m2sys.com© 2014
  • 3. The number one reason behind bank fraud is the customer identity theft. • An approximate 10 million people are victims of identity theft every year. • There are 19 new victims every minute of every day. • Bank ID theft is increasing at an alarming rate and is affecting millions of people. • The majority of identity theft incidents (85%) involved the fraudulent use of existing account information, such as credit card or bank account information. • Victims who had personal information used to open a new account or for other fraudulent purposes were more likely than victims of existing account fraud to experience financial, credit, and relationship problems and severe emotional distress. Source: Identity Theft - Facts and Figures Identity Theft & Bank Fraud Facts and Stats Fraud and ID Theft A Rising Concern www.m2sys.com© 2014
  • 4. • Financial institutions incurred $955 million in losses due to debit card fraud in 2010 – a 21% increase from the $788 million in losses incurred during 2008. • In 2011, 59% of the more than 37 billion debit card transactions that were made were verified by signature, 85% of all fraudulent debit card transactions involved signature “verification,” and $1.15 billion of the total $1.35 billion in debt card fraud losses (85%) stemmed from signature debit card transactions. • Identity theft is a form of fraud that often results in unauthorized credit card and debit card transactions. There were 13% more cases of identity theft in 2011 than in 2010, yet the costs incurred by consumers actually represented a 44% decrease over the course of the previous eight years. Source: Credit Card & Debit Card Fraud Statistics Bank Fraud Statistics The Negative Effects of Bank Fraud www.m2sys.com© 2014
  • 5. Seamless integration into existing banking software Establishes a concrete audit trail for customer financial transactions Eliminates risk associated with password or signature based security Improves customer service and brand sentiment Features of RightAccount™ RightAccount™ Helps to Prevent Fraud www.m2sys.com© 2014
  • 6. RightAccount™ enrolls customer based on fingerprint + finger vein pattern (when used with M2-FuseID™ device) Customer scans a finger Employee opens the new customer account opening screen Bank employee logs into the core banking application RightAccount™ prompts for customer finger scan – locks all other operations New account opening screen continues Audit trail created Customer enters the bank and is directed to bank employees for account transactions We recommend our M2- FuseID™ “smart” finger scanner as the biometric modality. RightAccount™ Workflow www.m2sys.com© 2014
  • 7. Step 1 • Customer enters bank and is directed to bank employees for secure transaction. Step 2 • Bank employee logs into the core banking application. Step 3 • Employee navigates to inter-bank fund transfer screen. Step 4 • RightAccount™ prompts for customer biometric scan – locks all other operations. Step 4 • Customer scans a biometric. Step 5 • RightAccount™ authenticates the customer based on biometrics, creates audit trail. Step 6 • Inter-bank fund transfer operation continues. How Does RightAccount™ Authentication Secure Bank Transactions? www.m2sys.com© 2014
  • 8. Here are some benefits of using RightAccount™ for customer authentication: • Establish safe and secure transactions by protecting customer identities with their unique biometric features like fingerprints and finger vein patterns. • Improve customer service by eliminating the risk of sharing personal information over unsecured telephone lines with the use of voice biometric for customer authentication. • Reduce identity fraud at the point of service by providing biometric authentication on mobile phones. Why Adopt RightAccount™? www.m2sys.com© 2014
  • 9. Corporate Headquarters: 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 USA Asia Office: House-279, Road-19, Mohakhali DOHS, Dhaka 1216 Bangladesh E-mail: info@m2sys.com Phone: +1 (770) 393 0986 Website: www.m2sys.com Get Social: Facebook: https://www.facebook.com/m2sys Twitter: @M2SYS LinkedIn: http://www.linkedin.com/company/m2sys-technology Blog: blog.m2sys.com YouTube: http://www.youtube.com/m2sys Google+: https://plus.google.com/M2SYS Contact Us www.m2sys.com© 2014