Thieves, Pills & Tattoos: another side to mobile payments

Sirpa Nordlund

For years authentication has been a thorny issue for banks and financial institutions, particularly in the world of mobile services. To date, these organisations have focused on building two of the three primary sources of authentication data into their products and services, namely ‘something you know’, like a password, and ‘something you have’, like a payment card.

The desire to raise the level of user convenience for mobile authentication is now driving banks to explore the third source, namely ‘something you are’, in the form of biometric solutions.

Already, consumers all over the world are using their fingerprints, voices and faces to access their devices and authenticate to a wide variety of value-added mobile services. Reliability, familiarity and ease of use are driving consumer trust and adoption for these authentication models. This is good news; the populist suspicions that have surrounded biometric security are largely unfounded and their integration with mobile services is finally putting them to rest. But convenient as these may seem, there’s a sticking point: popular forms of biometric authentication, such as fingerprint and vein ID, still require active user input; a thumb on a sensor, for example. They are not ‘frictionless’ and, as a result, interfere with the intuitive mobile user experience that was originally intended.

Blended Biometrics

But this is just the beginning; biometrics need not be limited to physiology. Behavioural ID, which analyses the unique traits of each device user, has the potential to remove friction from the authentication process entirely. Keystroke patterns, mouse movements, key locations and a range of other identifiers are being explored, both for identification and fraud prevention, some of which have delivered 97% accuracy in trials*. Even then, is a 3% margin of error acceptable? Certainly not for the mass deployment of mobile financial services.

The future lies in combining biometric forms. A layered approach should drive long-term adoption by delivering the right blend of convenience and security. It’s easy to envision a mobile banking and payments world where a behavioural metric may grant user access to an account statement, for example, but a physiological validation, like a fingerprint, is needed to authenticate a payment or permit deeper access to account information.

Needles, Pills & Tattoos – PayPal’s PR gimmick

A recent announcement from PayPal caused quite a stir. The over-the-top payments giant suggested a number of possible future replacements for the password, including ingestible technology and computer chip tattoos. The sentiment is noble; passwords are notoriously unsecure and a thorn in the side of so many industries. But such radical approaches would require both popular consensus and industry standardisation before they can be taken seriously. Who is going to want to swallow pills, suffer injections each morning or have their arm embossed with chip-based tattoos? These radical methods may have a place in high security facilities, for example, but certainly not yet in the payments market.

Samsung hacked!

News that a flaw in the Galaxy S5 has allowed hackers to clone fingerprints made recent headlines. In the same way that PC’s and laptops have been prone to keylogging attacks, data collected by the S5’s sensor was monitored, and replicated, in real-time. Encouragingly, however, credentials stored in Samsung’s trusted execution environment (TEE), Samsung KNOX, remained out of reach, highlighting the need to protect a device’s input and output components with TEE technology, in addition to the user’s secure credentials.

Options here could include a trusted user interface as part of the TEE, so that the information displayed to consumers together with their method of data entry (fingerprint sensor, in this case) are protected, meaning the information captured and transferred cannot be hacked. When dealing with financial and biometric data it is absolutely essential that all potential points of failure are addressed. There is little point in building an impenetrable iron door if it is secured with a plastic lock.

* http://www.bbc.com/news/business-31968642

Author is Sirpa Nordlund, executive director, Mobey Forum, offers soundbites and sentiments from the global industry association’s Biometrics Workgroup

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more