SlideShare a Scribd company logo
©Veridium IP, Ltd. All Rights Reserved
Secure Mobile Banking
With Biometrics
B E FORE W E B E G IN
Attendees have been muted
You may submit questions at any
time, but we will respond at the
conclusion of the presentation
during the Q&A session
©Veridium IP, Ltd. All Rights Reserved
VE RID IUM IN T HE WORLD
©Veridium IP, Ltd. All Rights Reserved
David van Damme
Partnerships & Business
Development
bunq
• Holds degrees in marketing management and international
law
• Worked as a key account manager for Henkel before joining
bunq
• Helps develop key partnerships at bunq to drive consumer-
focused development
BE F ORE WE BE GIN
©Veridium IP, Ltd. All Rights Reserved

Recommended for you

Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries

The document discusses the challenges of identity and access management (IAM) in cloud computing environments. Traditional IAM solutions are insufficient for the cloud because they are focused on internal security, are difficult and slow to implement, and rely on proprietary standards. The next generation IAM platform needs features like federation to securely provide a single identity to multiple organizations, agility and lightweight deployment on-premise or in the cloud, and support for open standards to simplify integration. A cloud-ready IAM solution provides benefits like being future-proof for web, API and mobile access, having a single secure identity, driving revenue through improved customer experience and productivity.

identityidentity management
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication

The document discusses how governments are increasingly prioritizing strong authentication and looking to standards like FIDO to provide more secure, usable and privacy-preserving authentication. It notes that the UK and US governments have highlighted FIDO and endorsed its ability to deliver improved security without passwords. The document also discusses how authentication is an area of regulatory focus due to compliance needs around privacy, security and access across domains like digital government, healthcare, payments and financial services. It argues that FIDO specifications address regulatory needs by providing nimble, configurable and cost-effective strong authentication.

fido alliancefidofido authentication
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT

The document discusses identity in the Internet of Things (IoT) world. It covers the following key points: 1. Identity is frequently targeted in cyber attacks against executives, administrators, and outsourced vendors. Attackers need to be right once while enterprise security needs to be right every time. 2. IoT devices like refrigerators and thermostats are increasingly being hacked. 3. A framework is needed for identity management of users, devices, applications, and resources to enable secure access from any client or device to any service located anywhere. 4. Next generation IT requirements for identity in IoT include standards-driven federation and APIs, identity management for all entities, multi-factor

irm summitirmcisco
Asem Othman, PhD
Biometric Scientist
• PhD in Electrical Engineering from West Virginia University.
Post-Doc Fellow at Michigan State University
• Holds 3 patents/patents pending related to biometrics
• Lead scientist behind our 4 Fingers TouchlessID technology &
Distributed Data Model using Visual Cryptography
BE F ORE WE BE GIN
©Veridium IP, Ltd. All Rights Reserved
• How we use biometrics for mobile
security
• The challenge of securing mobile
banking transactions
• Why bunq chose biometrics for
user authentication
• The advantages of 4 Fingers
AGENDA
bunq goes beyond money.
That is why we bank different.
We focus on your great night out and cater to it.
• Our story
• What is bunq?
• Building solutions together
• Partnership with Veridium
• Why 4 Fingers?

Recommended for you

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com

The FIDO Alliance has launched a new microsite, LoginWithFIDO.com, for high level, non-technical information about FIDO for consumers and service providers. As part of this project, we wanted to learn more about consumer attitudes and habits around authentication. What are their password habits? What do they think about the FIDO approach? Do they want to see FIDO at login? To find out, we conducted a survey of 1,000 U.S. consumers – the results of which were shared on this webinar. These slides include the findings from our research and how you may be able to utilize the data for your own FIDO offerings and/or deployments. This webinar includes: --How many different passwords consumers really use for their online accounts --What tactics they use for password management and how often they are resetting passwords and --Their familiarity with various types of authentication technologies including SMS OTPs, biometrics and others --The types of apps and services where consumers most want to use FIDO --How consumers want to be communicated with about FIDO at enrollment and login We also gave the audience a detailed look at LoginWithFIDO.com and how you can consider using it for your own educational initiatives around FIDO. You’ll learn: --How to navigate through the microsite and its two landing pages --How you can reference the site and its materials for your own offerings and deployments --Added insights into how to utilize FIDO’s consumer-facing marks

fido alliancefidofido authentication
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA

Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.

securitypasswordsmulti-factor authentication
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication

The document discusses mobile authentication and the growing market for connected devices. It summarizes Nok Nok Labs' solutions for securely authenticating users and devices using biometrics on mobile phones. Nok Nok Labs has provided mobile authentication solutions for major companies in financial services, IoT security, and mobile carriers to replace passwords with stronger authentication methods. The document highlights case studies of deployments and strategic partnerships with companies seeking more secure authentication for their customers and devices.

mobilemobile authenticationfido alliance
Our Story
We receive our banking
license from the DNB
September 2014 January 2016
We launch IDEAL payments
with QR-codes
November 2016
Public beta: new features
Chat & Connect
March 2016
Business accounts launch
Minors accounts launch
with approval
April 2016
Our Story
Our Story
V2: quicker on-boarding
and many new features
May 2016 October 2016
Our own Maestro/Mastercard
connection
August 2016
First launch with an
innovation partner
November 2016
V3: Completely new design
Launch of a new app: Slice!
November 2016
More to come in
2017 :)
Social We make money social. Tuned in on group interactions.
Real-time We make money instant, with real-time transactions and settlement.
Banking license We provide security to all partners & customers. No fooling around.
Innovative We develop constantly to meet consumer wishes.
Software based We are software based so no need to invest in new hardware.
“We are not just a payment solution,
we create value propositions beyond money.”
What is bunq?

Recommended for you

Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations

The document discusses modern authentication and Nok Nok Labs' role in pioneering this area. It notes that Nok Nok Labs invented modern authentication, founded and led the FIDO Alliance, and has deployed authentication solutions for major markets. The document promotes the benefits of leveraging modern authentication, such as improved customer experience, higher retention and satisfaction, and reduced fraud and costs. It argues that authentication, security, and privacy will be vital for society with the rise of cloud services, IoT, and other technologies.

fido alliancefidofido authentication
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR

The General Data Protection Regulation (GDPR) come into effect earlier this year, ushering in the most significant change to European data protection laws in twenty years. The regulation impacts not only impact firms resident in the European Union (EU), but around the world, as any organization doing business with EU citizens must comply with the regulation. FIDO Alliance standards were created from the outset with a “privacy by design” approach and are a strong fit for GDPR compliance. Crucially, FIDO delivers authentication with no third-party involvement or tracking between accounts and services. And when it comes to biometrics, FIDO standards prevent this information from being stored and matched in servers – it never leaves the user’s device – and FIDO(R) Certified devices do not allow for any biometric data to be captured. This presentation includes: - Key GDPR considerations when deploying strong authentication - Where FIDO Authentication relates to GDPR articles on data protection, consent of data subject and data subject rights - How FIDO can help your organization meet GDPR requirements

fido alliancefidofido authentication
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative

The document is a presentation from the FIDO Alliance about establishing an Identity Verification and Binding Working Group. The working group will define criteria for remote identity proofing using government IDs and biometrics. It will create certification programs to evaluate identity verification solutions. The initial focus is on specifying requirements for remote document verification and facial matching during identity proofing. The goal is to provide guidance to help online services strengthen identity assurance when using FIDO authentication without passwords.

fido allianceuser verificationidentity verification
Building Solutions Together
Face vs. 4 Fingers
Main Benefits:
• Compatibility across devices [front vs. back camera]
• User threshold [selfie vs. ‘handy’]
• More control - dependency on external factors decreased
4 Fingers
User Feedback:
• “I prefer hand recognition because it always works!”
• “I like how it doesn’t attract weird looks, versus a selfie.”
• “It’s just cool!”
4 Fingers
Statistics:
• Amount of complaints of biometric ‘failure’ has dropped
significantly, about 80% - 90%
• 78% of users select 4 Fingers as their preferred authentication
method
• Amount of attempts before a successful authentication decreased
significantly

Recommended for you

FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare

A case study for healthcare leader, Aetna on how they are developing a digital competitive advantage. As part of their strategy to improve user experience and protect members, they have deployed FIDO Authentication.

fido allianceauthenticationhealthcare
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News

Learn about FIDO Alliance status and plans. From FIDO Alliance Seminar in Washington, D.C., in October, 2015. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.

fido alliancepresentationinformation technology
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and Access

Presentation SE-4111, User Authentication for Mobile Devices and Access, by Max Berman at the AMD Developer Summit (APU13) November 11-13, 2013.

max bermanuser authenticationse4111
Secure Mobile Banking
PROV ING ID E NT IT Y
Passwords only authorize
access, while
authentication is the
process of verifying the
claim that identity makes.
Identity is the “claim” you
make to access information,
but making that claim with a
password doesn’t prove who
you are.
Only biometrics – your
face, your voice, your
fingerprints – prove
you are who you say
you are.
©Veridium IP, Ltd. All Rights Reserved
We provide all the components necessary for a complete, end-to-end biometric
authentication solution that is flexible, secure, and enterprise ready.
©Veridium IP, Ltd. All Rights Reserved
• Matching on the device (FIDO compliant)
or on the server
• Vectors stored on device, server, or
distributed between the two
• IOS, Android, and Windows platforms
• Multiple plug-and-play biometric library
• Hosted on premise or in the cloud
• 2-way SSL communication between device
and server
• Visual Cryptography for secure storage of
biometric data
• Solution deployment scripts are
obfuscated for additional security
• Integrates with Active Directory, Radius,
LDAP, SAML, and NetScaler
• Admin dashboard for analytics and
reporting
• Customer support
• Built on an open standard called IEEE 2410,
supported by a working group which
continues to advance this standard, future-
proofing your investment
©Veridium IP, Ltd. All Rights Reserved

Recommended for you

The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO

Executive Director and Chief Marketing Officer of FIDO Alliance, Andrew Shikiar updates viewers on the State of FIDO.

fido alliancefidoidentiverse
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass

The document discusses FIDO Alliance's efforts to create simpler and stronger authentication standards to replace passwords. It provides an overview of FIDO authentication, including how it works, adoption rates, and certification programs. It also summarizes the Alliance's work in identity verification, binding, and FIDO Device Onboarding to fill gaps and further the passwordless vision.

FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview

The document discusses technical specifications for device authentication provided by FIDO. It describes issues with traditional password authentication and how FIDO addresses these through standards that separate user verification from authentication. FIDO uses public key cryptography and relies on authenticators that can be integrated into devices to enable strong, passwordless authentication across multiple websites and applications.

fido alliancefidofido authentication
4 Fingers TouchlessID is a significantly more reliable biometric than other mobile-based solutions.
Capturing all four fingerprints at once increases the complexity of the data collected, enhancing overall security.
4 Fingers TouchlessID doesn’t require any additional hardware beyond a 5MP camera and LED flash, which nearly
all smartphones already have, making it ready to deploy.
©Veridium IP, Ltd. All Rights Reserved
©Veridium IP, Ltd. All Rights Reserved
• Universality (Does every user have it?)
• Distinctiveness (Is it unique across users?)
• Permanence (Does it change over time?)
• Collectability (Can it be measured quantitatively?)
HOW TO CHOOSE A BIOME T RIC T RAIT
©Veridium IP, Ltd. All Rights Reserved
• Performance (Does it meet error rate, throughput..?)
• Users Perception and Acceptability (Is it acceptable to users?)
• Vulnerability (Can it be easily spoofed?)
• App Integration (Can it be acquired by available devices?)
• Large-Scale Adoption ”Usability” (What is the post-usage attitude?)
HOW TO CHOOSE A PRACT ICAL MOBILE BIOME T RIC T RAIT
©Veridium IP, Ltd. All Rights Reserved

Recommended for you

Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics

A look at the changing regulatory environment in Europe and the impact on payments, EMVCo 3D Secure along with details on Visa's implementation.

fintechpsd23d secure
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security

The document discusses enterprise mobile security. It covers the lifecycle of mobile device solutions within an enterprise, including initiation, development, implementation, operation and maintenance, and disposal. It also discusses developing a mobile policy using use cases, BYOD scenarios, and various MDM solutions. The key aspects of a mobile security program are identified as device management, data protection, network protection, identity and access management, and application management. A case study example is also provided.

#byod#mobile securiry#mobile risks
A Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no MundoA Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no Mundo

Apresentação sobre a revolução dos smartphones e tablets ao redor do mundo. Exemplos de aplicativos são dados.

itaupaymentsmobile
• Multimodal Biometric system
• Consolidate the evidence presented by
multiple biometric sources.
• Typically provides better recognition
performance compared to systems
based on a single biometric modality.
• Provides anti-spoofing measures by
making it difficult for an intruder to
spoof multiple biometric instance
simultaneously.
Patent US 9,361,507
©Veridium IP, Ltd. All Rights Reserved
• False rejection rate (FRR) is as low as 1% at false acceptance rate (FAR) of 0.01%.
• 4 Fingers has its own light source (your phone’s flash) so it works in any lighting
condition
• 4 Fingers requires no external hardware.
• We just require a 5MP camera and LED flash.
• 4 Fingers is one of the most secure biometrics available.
4 Fingers is reliable in almost any environment
©Veridium IP, Ltd. All Rights Reserved
COMPARISON OF TOP “MOBILE ” BIOME T RIC T E CHNOLOGIE S
(H=High, M=Medium, L=Low)
Biometrics Universality Uniqueness Permanence Collectability Performance Acceptability
Face H L M H L H
Fingerprint M H H M* H M
Iris H H H M* H L*
Voice M L L M* L H
4 Fingers
TouchlessID*
H H H H H H
(H=High, M=Medium, L=Low)
Circumventions
(Presentation
Attack)
H
M
L
H
L
Anil K. Jain, Arun Ross, and Salil Prabhakar. "An introduction to biometric recognition." Appeared in IEEE Transactions on Circuits and Systems for Video
Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.
©Veridium IP, Ltd. All Rights Reserved
PRIVACY
AND
SECURITY RISKS

Recommended for you

IAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - BradescoIAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - Bradesco

Este documento resume um evento sobre mobilidade no setor bancário apresentado pelo IAB Brasil. Ele discute o crescimento dos canais digitais e móveis no Bradesco, incluindo o aumento das transações e downloads de aplicativos, assim como estratégias para acessibilidade e engajamento em redes sociais.

Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction

Biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics to automatically verify identity. There are two main types of biometrics: physiological, which relate to the body shape like fingerprints, retina, and face; and behavioral, which relate to behaviors like voice, handwriting, and typing patterns. Biometric systems use verification to compare a sample to a single stored template or identification to search a sample against a database of templates to resolve a person's identity. While biometrics can provide strong authentication for applications like secure banking, border control, and access control, they are not perfect and have limitations like cost, accuracy, and privacy concerns.

nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System

The document discusses penetration testing of biometric systems. It describes various attack vectors against biometric fingerprint systems, including local attacks against the fingerprint sensor and remote attacks against the backend database, biometric management servers, and admin interfaces. It provides examples of how to steal fingerprints, reproduce fake fingerprints, attack remote management protocols, and detect biometric devices on a network.

pentrationbiometricsystem
• Biometric data of an individual is often stored in a central database
• Raises issues related to security and privacy of biometric data
• Unlike compromised passwords, it is difficult to re-issue biometric data
• Cross-database matching may be done to track individuals
PRE SE RV ING DATA PRIVACY
©Veridium IP, Ltd. All Rights Reserved
OUR ST RAT E GY – D IST RIBUT E D DATA
©Veridium IP, Ltd. All Rights Reserved
MATCHING – MOBILE /SE RV E R
©Veridium IP, Ltd. All Rights Reserved
• Visual Cryptography Scheme (VCS) is a simple and secure way to allow the
secret sharing of secrets without any cryptographic computations.
• It is the encryption of visual information such that decryption can be
performed using the human visual system.
• Someone who has no previous knowledge of Cryptography.
• The mathematical proof of this scheme and its perfect encryption are shown in
the original paper by Naor & Shamir.
* M. Naor and A. Shamir, “Visual cryptography,” in EUROCRYPT, pp. 1–12, 1994.
V ISUAL CRYPTOGRAPHY
©Veridium IP, Ltd. All Rights Reserved

Recommended for you

IBM Mobile First Security
IBM Mobile First SecurityIBM Mobile First Security
IBM Mobile First Security

Apresentação IBM Solutions Connect 2013: Desafios da mobilidade nos ambientes corporativos. Soluções de segurança da IBM para proteção de ambientes móveis parte da iniciativa IBM Mobile First.

mdmsegurançasecurity
Aplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experienceAplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experience

Este documento discute a evolução da internet e sua popularização a partir dos anos 1990, permitindo a conexão de computadores em todo o mundo. Também aborda como as tecnologias móveis modificaram o conceito de espaço e tempo, possibilitando a comunicação independente da localização física. Finalmente, apresenta perspectivas de crescimento para o mercado de mobile banking no Brasil.

user experienceuxexperiência do usuário
Will Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in BankingWill Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in Banking

Account security is paramount to banks. Despite taking several precautions and beefing up security levels, there have been many instances of security breaches. Biometrics is seriously being considered as a viable option to meet these security threats. Biometrics - unique to each individual - when layered with another authentication factor (such as One-Time Password, etc.) can become a potent mechanism to protect individual accounts from getting hacked. Learn more in this infographic.

bankinghackingphishing
Secure Mobile Banking
V ISUAL CRYPTOGRAPHY
©Veridium IP, Ltd. All Rights Reserved
SEE IT IN ACTION
www.VeridiumID.com/bunq
For more information contact: Info@VeridiumID.com
Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium
UPCOMING
WEBINAR
March 23, 2017

Recommended for you

The Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationThe Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric Authentication

In 2015, 63 percent of all confirmed data breaches were the result of weak, default, or stolen passwords. In fact, this was the second primary cause of all data breaches, globally, according to the 2016 Verizon Data Breach Investigations Report. The death of passwords has been heralded for over a decade now, but these reports were often greatly exaggerated. However, in recent years this has begun to change, as new technologies are allowing companies to change how they secure access to digital assets. From traditional usernames and passwords to two-factor authentication, outdated security practices are failing to keep data secure. Whether it’s a lack of user adoption or actual flaws in the security infrastructure, businesses need a better option to protect access to their most important resources. In this webinar, we will discuss the prevalence of data breaches today and where passwords and two-factor authentication fall short, followed by how biometrics, when properly deployed through end-to-end solutions like HoyosID, can provide the missing piece for fully securing digital access.

authenticationmultifactor authenticationbiometrics
Biometrics in banking industry
Biometrics in banking industryBiometrics in banking industry
Biometrics in banking industry

With the rise of various threats in the market, the banking industry must come with methods to stay ahead of the curve to deflect cyber criminals from accessing our financial records. Biometrics offers a solution to prevent such intrusions, and allows users to authenticate themselves via various technologies to access their financial information.

banking securitybiometricssecurity
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption

Biometric encryption is a technique that securely binds a cryptographic key to a biometric template. During enrollment, a random key is linked to a user's biometric template using a binding algorithm. During verification, applying the same biometric will regenerate the key through a retrieval algorithm. This allows authentication while preventing storage of the actual biometric data. Biometric encryption offers advantages like improved security, ability to revoke compromised keys, and privacy by not retaining biometric images.

For more information contact: Info@VeridiumID.com
Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium
QUESTIONS?

More Related Content

What's hot

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
FIDO Alliance
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
FIDO Alliance
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
AMD Developer Central
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
FIDO Alliance
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
FIDO Alliance
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
FIDO Alliance
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
Santosh Satam
 

What's hot (20)

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 

Viewers also liked

A Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no MundoA Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no Mundo
kubicmobile
 
IAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - BradescoIAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB Brasil
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
n|u - The Open Security Community
 
IBM Mobile First Security
IBM Mobile First SecurityIBM Mobile First Security
IBM Mobile First Security
Alexandre Freire
 
Aplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experienceAplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experience
Camila Augusto
 
Will Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in BankingWill Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in Banking
ICFAIEDGE
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationThe Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Veridium
 
Biometrics in banking industry
Biometrics in banking industryBiometrics in banking industry
Biometrics in banking industry
Debashis Chanda
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Divya Kottikkal
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
MUTHUKUMAR MANIVANNAN
 

Viewers also liked (12)

A Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no MundoA Revolução Mobile no Brasil e no Mundo
A Revolução Mobile no Brasil e no Mundo
 
IAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - BradescoIAB MOBILE DAY - Luca Cavalcanti - Bradesco
IAB MOBILE DAY - Luca Cavalcanti - Bradesco
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
IBM Mobile First Security
IBM Mobile First SecurityIBM Mobile First Security
IBM Mobile First Security
 
Aplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experienceAplicativos mobile banking sob o olhar da usabilidade e user experience
Aplicativos mobile banking sob o olhar da usabilidade e user experience
 
Will Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in BankingWill Biometrics Usher in a New Era in Banking
Will Biometrics Usher in a New Era in Banking
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric AuthenticationThe Password Is Dead: An Argument for Multifactor Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric Authentication
 
Biometrics in banking industry
Biometrics in banking industryBiometrics in banking industry
Biometrics in banking industry
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 

Similar to Secure Mobile Banking

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013
DaveEdwards12
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions fail
DaveEdwards12
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
Oz Forensics
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
Cisco Canada
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
i7Networks
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
NCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentialsNCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentials
NCVO - National Council for Voluntary Organisations
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-in
Sandeep Mohanta
 
Bank security
Bank securityBank security

Similar to Secure Mobile Banking (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions fail
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
NCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentialsNCVO/Zurich webinar: Beyond cyber essentials
NCVO/Zurich webinar: Beyond cyber essentials
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-in
 
Bank security
Bank securityBank security
Bank security
 

Recently uploaded

Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 

Recently uploaded (20)

Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 

Secure Mobile Banking

  • 1. ©Veridium IP, Ltd. All Rights Reserved Secure Mobile Banking With Biometrics
  • 2. B E FORE W E B E G IN Attendees have been muted You may submit questions at any time, but we will respond at the conclusion of the presentation during the Q&A session ©Veridium IP, Ltd. All Rights Reserved
  • 3. VE RID IUM IN T HE WORLD ©Veridium IP, Ltd. All Rights Reserved
  • 4. David van Damme Partnerships & Business Development bunq • Holds degrees in marketing management and international law • Worked as a key account manager for Henkel before joining bunq • Helps develop key partnerships at bunq to drive consumer- focused development BE F ORE WE BE GIN ©Veridium IP, Ltd. All Rights Reserved
  • 5. Asem Othman, PhD Biometric Scientist • PhD in Electrical Engineering from West Virginia University. Post-Doc Fellow at Michigan State University • Holds 3 patents/patents pending related to biometrics • Lead scientist behind our 4 Fingers TouchlessID technology & Distributed Data Model using Visual Cryptography BE F ORE WE BE GIN ©Veridium IP, Ltd. All Rights Reserved
  • 6. • How we use biometrics for mobile security • The challenge of securing mobile banking transactions • Why bunq chose biometrics for user authentication • The advantages of 4 Fingers AGENDA
  • 7. bunq goes beyond money. That is why we bank different. We focus on your great night out and cater to it.
  • 8. • Our story • What is bunq? • Building solutions together • Partnership with Veridium • Why 4 Fingers?
  • 9. Our Story We receive our banking license from the DNB September 2014 January 2016 We launch IDEAL payments with QR-codes November 2016 Public beta: new features Chat & Connect March 2016 Business accounts launch Minors accounts launch with approval April 2016
  • 11. Our Story V2: quicker on-boarding and many new features May 2016 October 2016 Our own Maestro/Mastercard connection August 2016 First launch with an innovation partner November 2016 V3: Completely new design Launch of a new app: Slice! November 2016 More to come in 2017 :)
  • 12. Social We make money social. Tuned in on group interactions. Real-time We make money instant, with real-time transactions and settlement. Banking license We provide security to all partners & customers. No fooling around. Innovative We develop constantly to meet consumer wishes. Software based We are software based so no need to invest in new hardware. “We are not just a payment solution, we create value propositions beyond money.” What is bunq?
  • 14. Face vs. 4 Fingers Main Benefits: • Compatibility across devices [front vs. back camera] • User threshold [selfie vs. ‘handy’] • More control - dependency on external factors decreased
  • 15. 4 Fingers User Feedback: • “I prefer hand recognition because it always works!” • “I like how it doesn’t attract weird looks, versus a selfie.” • “It’s just cool!”
  • 16. 4 Fingers Statistics: • Amount of complaints of biometric ‘failure’ has dropped significantly, about 80% - 90% • 78% of users select 4 Fingers as their preferred authentication method • Amount of attempts before a successful authentication decreased significantly
  • 18. PROV ING ID E NT IT Y Passwords only authorize access, while authentication is the process of verifying the claim that identity makes. Identity is the “claim” you make to access information, but making that claim with a password doesn’t prove who you are. Only biometrics – your face, your voice, your fingerprints – prove you are who you say you are. ©Veridium IP, Ltd. All Rights Reserved
  • 19. We provide all the components necessary for a complete, end-to-end biometric authentication solution that is flexible, secure, and enterprise ready. ©Veridium IP, Ltd. All Rights Reserved
  • 20. • Matching on the device (FIDO compliant) or on the server • Vectors stored on device, server, or distributed between the two • IOS, Android, and Windows platforms • Multiple plug-and-play biometric library • Hosted on premise or in the cloud • 2-way SSL communication between device and server • Visual Cryptography for secure storage of biometric data • Solution deployment scripts are obfuscated for additional security • Integrates with Active Directory, Radius, LDAP, SAML, and NetScaler • Admin dashboard for analytics and reporting • Customer support • Built on an open standard called IEEE 2410, supported by a working group which continues to advance this standard, future- proofing your investment ©Veridium IP, Ltd. All Rights Reserved
  • 21. 4 Fingers TouchlessID is a significantly more reliable biometric than other mobile-based solutions. Capturing all four fingerprints at once increases the complexity of the data collected, enhancing overall security. 4 Fingers TouchlessID doesn’t require any additional hardware beyond a 5MP camera and LED flash, which nearly all smartphones already have, making it ready to deploy. ©Veridium IP, Ltd. All Rights Reserved
  • 22. ©Veridium IP, Ltd. All Rights Reserved
  • 23. • Universality (Does every user have it?) • Distinctiveness (Is it unique across users?) • Permanence (Does it change over time?) • Collectability (Can it be measured quantitatively?) HOW TO CHOOSE A BIOME T RIC T RAIT ©Veridium IP, Ltd. All Rights Reserved
  • 24. • Performance (Does it meet error rate, throughput..?) • Users Perception and Acceptability (Is it acceptable to users?) • Vulnerability (Can it be easily spoofed?) • App Integration (Can it be acquired by available devices?) • Large-Scale Adoption ”Usability” (What is the post-usage attitude?) HOW TO CHOOSE A PRACT ICAL MOBILE BIOME T RIC T RAIT ©Veridium IP, Ltd. All Rights Reserved
  • 25. • Multimodal Biometric system • Consolidate the evidence presented by multiple biometric sources. • Typically provides better recognition performance compared to systems based on a single biometric modality. • Provides anti-spoofing measures by making it difficult for an intruder to spoof multiple biometric instance simultaneously. Patent US 9,361,507 ©Veridium IP, Ltd. All Rights Reserved
  • 26. • False rejection rate (FRR) is as low as 1% at false acceptance rate (FAR) of 0.01%. • 4 Fingers has its own light source (your phone’s flash) so it works in any lighting condition • 4 Fingers requires no external hardware. • We just require a 5MP camera and LED flash. • 4 Fingers is one of the most secure biometrics available. 4 Fingers is reliable in almost any environment ©Veridium IP, Ltd. All Rights Reserved
  • 27. COMPARISON OF TOP “MOBILE ” BIOME T RIC T E CHNOLOGIE S (H=High, M=Medium, L=Low) Biometrics Universality Uniqueness Permanence Collectability Performance Acceptability Face H L M H L H Fingerprint M H H M* H M Iris H H H M* H L* Voice M L L M* L H 4 Fingers TouchlessID* H H H H H H (H=High, M=Medium, L=Low) Circumventions (Presentation Attack) H M L H L Anil K. Jain, Arun Ross, and Salil Prabhakar. "An introduction to biometric recognition." Appeared in IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004. ©Veridium IP, Ltd. All Rights Reserved
  • 29. • Biometric data of an individual is often stored in a central database • Raises issues related to security and privacy of biometric data • Unlike compromised passwords, it is difficult to re-issue biometric data • Cross-database matching may be done to track individuals PRE SE RV ING DATA PRIVACY ©Veridium IP, Ltd. All Rights Reserved
  • 30. OUR ST RAT E GY – D IST RIBUT E D DATA ©Veridium IP, Ltd. All Rights Reserved
  • 31. MATCHING – MOBILE /SE RV E R ©Veridium IP, Ltd. All Rights Reserved
  • 32. • Visual Cryptography Scheme (VCS) is a simple and secure way to allow the secret sharing of secrets without any cryptographic computations. • It is the encryption of visual information such that decryption can be performed using the human visual system. • Someone who has no previous knowledge of Cryptography. • The mathematical proof of this scheme and its perfect encryption are shown in the original paper by Naor & Shamir. * M. Naor and A. Shamir, “Visual cryptography,” in EUROCRYPT, pp. 1–12, 1994. V ISUAL CRYPTOGRAPHY ©Veridium IP, Ltd. All Rights Reserved
  • 34. V ISUAL CRYPTOGRAPHY ©Veridium IP, Ltd. All Rights Reserved
  • 35. SEE IT IN ACTION www.VeridiumID.com/bunq
  • 36. For more information contact: Info@VeridiumID.com Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium UPCOMING WEBINAR March 23, 2017
  • 37. For more information contact: Info@VeridiumID.com Phone: +1 877.301.0299 • www.VeridiumID.com • Twitter: @VeridiumID • LinkedIn: Veridium QUESTIONS?