SlideShare une entreprise Scribd logo
1  sur  26
Authentication Simple as a Selfie
How Biometrics are Reducing Customer Friction & Improving Security
Paul Wilson
Product Manager
AGENDA
• The state of authentication today
• Why biometric authentication?
• New biometric options and how they
reduce customer friction
• Why biometrics need to be part of an
authentication framework
The state of authentication
"There is no doubt that over time, people are
going to rely less and less on passwords. People
use the same password on different systems,
they write them down and they just don't meet
the challenge for anything you really want to
secure."
Bill Gates - 2004
The state of authentication
The password has proven
very hard to replace
The state of authentication
Big companies pushing authentication
technologies to corporations
It is 2016…
There is no silver bullet in security
Your customers prefer tools that are
easy to use and they perceive as secure
Digital disruption is here
• Employees are working from home
• Remote teams and offices
• Self support
• Digital banking
• Online customer portals
Why Biometrics?
Easy – Secure – Fun!
Convenience, especially on mobile
No need to remember passwords
Biometric devices are already in use
Easy
Secure
High perception of security
Hard to duplicate
Can add factors to prevent duplication
Fun
Customers very interested in biometrics
Fun features, like taking a selfie
Biometrics a buzzword at the moment with
Apple Touch ID
Biometric options
• DNA Matching
• Ear
• Eyes - Iris Recognition
• Eyes - Retina Recognition
• Face Recognition
• Fingerprint Recognition
• Finger Geometry Recognition
• Hand Geometry Recognition
• Signature Recognition
• Typing Recognition
• Vein Recognition
• Voice / Speaker Recognition
• Voice - Speaker Verification / Authentication
• Voice - Speaker Identification
Mobile devices and how they
influence biometrics
• Smartphone sales keep increasing
• Customers require experiences with less friction
• Mobile sensors facilitate all the work
• Front-facing camera
• Fingerprint reader
• Microphone
• Hardware-agnostic biometrics
• Hard to duplicate
• Biometric devices
already deployed
among customers
• High perception of
security
• In some cases, easy
to steal
• Nearly impossible to
replace
• Common to multiple
destinations
Biometric Authentication
• Biometrics won´t replace passcodes
• Passcodes are secret, random and can
be easily destroyed
• Biometrics are not secret
• It is important to verify biometrics are
used by its real owner when being
authenticated
Best practices biometrics
> Biometrics should be optional
> Different types for adapting to user needs and situation
> Framework is essential:
> Facilitates migration
> Validate device with analytics
> Multi-channel ready – options for registrations
> Voice, Face and Fingerprint best suited for mobile
Why are other factors important?
Multi-Factor Authentication
> To cover all end-user scenarios
> To improve low friction authentication
> Voice and Device ID together are very secure and retain a very
good end-user experience
> To fulfill the – “Something you have, something you know
and something you are” requirement
> Often suggested in regulations/compliance/audits
> DID combinations fulfill this - Device ID, OTP/Password, Biometrics
Three biometric factors that are gaining traction
Voice Face Fingerprint
Voice
• Language, accent and dialect
independent
• Real-time tuning
• Mobile SDK available
• Voiceprints are stored
• End-user enrolls a
passphrase
Face
• Liveness Verification, “Blink”
• Move head during registration
• Better recognition
• Changes do not affect recognition
• Dark light
• Glasses
• Hair style
• Expressions
• Technology measures and records
various points on a human face
Touch
Protect access to apps
Protect access to Push
Notifications
Leverages device utility
Biometric Authentication in the News
Biometric Authentication in the News
Google launches face biometrics
payment app – March 3, 2016
La Banque Postale uses voice
biometrics to authenticate card
not present payments – March
28, 2016
Key Takeaways
• Biometrics allow for a more
convenient customer
authentication experience…
• But, standalone biometric
authentication solutions are
not foolproof
• For convenience and
security, biometrics must be
deployed as part of an
authentication framework
Thank you! – Questions?

Contenu connexe

Tendances

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs Nadine A. Jaafar
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 

Tendances (19)

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Visual transaction signing solution
Visual transaction signing solutionVisual transaction signing solution
Visual transaction signing solution
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Check cashing mobile solution
Check cashing mobile solutionCheck cashing mobile solution
Check cashing mobile solution
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 
Biometrics
BiometricsBiometrics
Biometrics
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Goibibo whats Up
Goibibo whats UpGoibibo whats Up
Goibibo whats Up
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Precision pb510 brochure email
Precision pb510 brochure emailPrecision pb510 brochure email
Precision pb510 brochure email
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 

Similaire à Authentication Simple as a Selfie - How Biometrics are Reducing Customer Friction & Improving Security

Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationUniphore
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital TrustBahaa Al Zubaidi
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfMobibizIndia1
 
The future of passwordless authentication.pdf
The future of passwordless authentication.pdfThe future of passwordless authentication.pdf
The future of passwordless authentication.pdfBahaa Abdulhadi
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptxPavani839789
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authenticationSensiple Inc.,
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authenticationKelley Robinson
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methodsFelixTaelemans
 
Biometric Time and Attendance
Biometric Time and Attendance Biometric Time and Attendance
Biometric Time and Attendance Roy Gibson
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric datanishiyath
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Mark Perry
 
Biometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxBiometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxFTx Identity
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 

Similaire à Authentication Simple as a Selfie - How Biometrics are Reducing Customer Friction & Improving Security (20)

Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 
The future of passwordless authentication.pdf
The future of passwordless authentication.pdfThe future of passwordless authentication.pdf
The future of passwordless authentication.pdf
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authentication
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methods
 
Biometric Time and Attendance
Biometric Time and Attendance Biometric Time and Attendance
Biometric Time and Attendance
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric data
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
 
Biometrics
Biometrics Biometrics
Biometrics
 
Biometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxBiometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptx
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Authentication Simple as a Selfie - How Biometrics are Reducing Customer Friction & Improving Security

  • 1. Authentication Simple as a Selfie How Biometrics are Reducing Customer Friction & Improving Security Paul Wilson Product Manager
  • 2. AGENDA • The state of authentication today • Why biometric authentication? • New biometric options and how they reduce customer friction • Why biometrics need to be part of an authentication framework
  • 3. The state of authentication "There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." Bill Gates - 2004
  • 4. The state of authentication The password has proven very hard to replace
  • 5. The state of authentication Big companies pushing authentication technologies to corporations
  • 6. It is 2016… There is no silver bullet in security
  • 7. Your customers prefer tools that are easy to use and they perceive as secure
  • 8. Digital disruption is here • Employees are working from home • Remote teams and offices • Self support • Digital banking • Online customer portals
  • 9. Why Biometrics? Easy – Secure – Fun!
  • 10. Convenience, especially on mobile No need to remember passwords Biometric devices are already in use Easy
  • 11. Secure High perception of security Hard to duplicate Can add factors to prevent duplication
  • 12. Fun Customers very interested in biometrics Fun features, like taking a selfie Biometrics a buzzword at the moment with Apple Touch ID
  • 13. Biometric options • DNA Matching • Ear • Eyes - Iris Recognition • Eyes - Retina Recognition • Face Recognition • Fingerprint Recognition • Finger Geometry Recognition • Hand Geometry Recognition • Signature Recognition • Typing Recognition • Vein Recognition • Voice / Speaker Recognition • Voice - Speaker Verification / Authentication • Voice - Speaker Identification
  • 14. Mobile devices and how they influence biometrics • Smartphone sales keep increasing • Customers require experiences with less friction • Mobile sensors facilitate all the work • Front-facing camera • Fingerprint reader • Microphone • Hardware-agnostic biometrics
  • 15. • Hard to duplicate • Biometric devices already deployed among customers • High perception of security • In some cases, easy to steal • Nearly impossible to replace • Common to multiple destinations
  • 16. Biometric Authentication • Biometrics won´t replace passcodes • Passcodes are secret, random and can be easily destroyed • Biometrics are not secret • It is important to verify biometrics are used by its real owner when being authenticated
  • 17. Best practices biometrics > Biometrics should be optional > Different types for adapting to user needs and situation > Framework is essential: > Facilitates migration > Validate device with analytics > Multi-channel ready – options for registrations > Voice, Face and Fingerprint best suited for mobile
  • 18. Why are other factors important? Multi-Factor Authentication > To cover all end-user scenarios > To improve low friction authentication > Voice and Device ID together are very secure and retain a very good end-user experience > To fulfill the – “Something you have, something you know and something you are” requirement > Often suggested in regulations/compliance/audits > DID combinations fulfill this - Device ID, OTP/Password, Biometrics
  • 19. Three biometric factors that are gaining traction Voice Face Fingerprint
  • 20. Voice • Language, accent and dialect independent • Real-time tuning • Mobile SDK available • Voiceprints are stored • End-user enrolls a passphrase
  • 21. Face • Liveness Verification, “Blink” • Move head during registration • Better recognition • Changes do not affect recognition • Dark light • Glasses • Hair style • Expressions • Technology measures and records various points on a human face
  • 22. Touch Protect access to apps Protect access to Push Notifications Leverages device utility
  • 24. Biometric Authentication in the News Google launches face biometrics payment app – March 3, 2016 La Banque Postale uses voice biometrics to authenticate card not present payments – March 28, 2016
  • 25. Key Takeaways • Biometrics allow for a more convenient customer authentication experience… • But, standalone biometric authentication solutions are not foolproof • For convenience and security, biometrics must be deployed as part of an authentication framework
  • 26. Thank you! – Questions?

Notes de l'éditeur

  1. DNA Matching Chemical Biometric The identification of an individual using the analysis of segments from DNA. Ear Visual Biometric The identification of an individual using the shape of the ear. Eyes - Iris Recognition Visual Biometric The use of the features found in the iris to identify an individual. Eyes - Retina Recognition Visual Biometric The use of patterns of veins in the back of the eye to accomplish recognition. Face Recognition Visual Biometric The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis. Fingerprint Recognition Visual Biometric The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual. Finger Geometry Recognition Visual/Spatial Biometric The use of 3D geometry of the finger to determine identity. Gait Behavioural Biometric The use of an individuals walking style or gait to determine identity. Hand Geometry Recognition Visual/Spatial Biometric The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual. Odour Olfactory Biometric The use of an individuals odor to determine identity. Signature Recognition Visual/Behavioural Biometric The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes. Typing Recognition Behavioural Biometric The use of the unique characteristics of a persons typing for establishing identity. Vein Recognition Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm. Voice / Speaker Recognition There are two major applications of speaker recognition: Voice - Speaker Verification / Authentication Auditory Biometric  The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print" or "voice model"). Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user's knowledge and typically require their cooperation. For example, presenting a person’s passport at border control is a verification process - the agent compares the person’s face to the picture in the document. Voice - Speaker Identification Auditory Biometric  Identification is the task of determining an unknown speaker's identity.  Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user's knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc. For example, a police officer compares a sketch of an assailant against a database of previously documented criminals to find the closest match(es).  In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match.