SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Biometrics:
A New Wrinkle Changes the Authentication Landscape
January 2017
2017 Mercator Advisory Group
A new research report from Mercator Advisory Group titled Biometrics: A New
Wrinkle Changes the Authentication Landscape explains the need for multimodal
biometric authentication and describes many types of biometrics available from
various technology providers. The report shows how biometrics technology has shifted
from a primarily hardware-based solution to a software-and cloud-based solution
enabled by smartphones that have become much more secure. With voice and face
recognition, and now the addition of behavioral biometrics, this shift will drive rapid
new innovation and will tip the market in favor of the mobile architecture.
Increasingly smartphones are shipping with trusted execution environments that can
displace traditional hardware security fobs. These new smartphones are critical to this
fundamental shift in biometrics.
Criminal theft of passwords has made passwords obsolete, and so a new factor is
required for authentication. Biometrics will be that new factor. It increases security and
will prove more convenient for the consumer than passwords as it transitions into a
persistent identity over the next 5 to 8 years.
New research report is primer on fundamentals of
biometrics for authentication of consumers’ identity
2017 Mercator Advisory Group
For persistent identity, authentication no longer entails just a single challenge event
such as a fingerprint scan but evolves into a passive trust value uniquely associated
with an individual, as is being pursued by Google. The trust value will be constantly
updated based on multiple factors including location and passive sound (voice and
ambiance) as well as facial recognition and a range of behavioral inputs.
With the mobile device formulating this trust factor, it is highly likely that Apple and
Google will be critical partners in consumer authentication for the majority of access
control scenarios, including call centers and physical access.
This reliance on the smartphone will help establish the FIDO (the Fast Identity Online)
Standard as the appropriate architectural approach for managing authentication
credentials. Keeping the credentials in the handset eliminates the honeypots that
attract criminals, increases consumer trust, and converts the authentication
infrastructure into a shared resource that will greatly lower deployment costs currently
associated with all authentication solutions.
Research report argues that passwords are obsolete
2017 Mercator Advisory Group
With the mobile device formulating this trust factor, it is highly likely that Apple and
Google will be critical partners in consumer authentication for the majority of access
control scenarios, including call centers and physical access, according to the report.
This reliance on the smartphone will help establish the FIDO (the Fast Identity Online)
Standard as the appropriate architectural approach for managing authentication
credentials. Keeping the credentials in the handset eliminates the honeypots that
attract criminals, increases consumer trust, and converts the authentication
infrastructure into a shared resource that will greatly lower deployment costs currently
associated with all authentication solutions.
Keeping credentials in the handset aids
authentication and enhances security
2017 Mercator Advisory Group
“The digital future is rushing toward us. Today mobile phones collect consumer activity
data and utilize machine learning to provide a range of conveniences before the user
even asks—from helping find where one parked one’s car to “Behavioral dynamics will
play an increasingly important factor in establishing trust factors for the authenticating
consumers’ identity across every channel and for establishing persistent identity,” said
Tim Sloane, Vice President, Payments Innovation at Mercator Advisory Group,
and author of report.
Tim Sloane
Vice President, Payments Innovation, and
Director, Emerging Technologies Advisory Service
Mercator Advisory Group
2017 Mercator Advisory Group
Highlights of this research report:
• Cybercriminals are so effective that data security will continue to be at risk until passwords are
eliminated entirely.
• Consumers will come to accept biometrics just as they did mobile banking.
• Apple and Google will continue to upgrade and extend the security and biometrics implemented in
hardware and operating systems and, due to their broad visibility into the life of the mobile device user,
will have more data than all others for authenticating the individual.
• Authentication will evolve from a single challenge event, as with fingerprint readers, into a passive
persistent identity trust value based on multimodal biometrics
• Smartphone technology is rapidly becoming more secure and broadly available in the U.S. population,
which means that broad deployment of biometric hardware by financial institutions is likely to be
obsolete in less than 5 years.
• Apple and Google solutions will likely become critical hardware and software authentication suppliers
for the majority of access control scenarios, including devices, call centers, cloud and application
authentication needs.
• Biometric tags and trust decisions should be held and calculated in the device to mitigate the risk
associated with central storage of credentials; this is critical for increased consumer trust.
• FIDO authentication architecture will establish an authentication framework that moves much of the
hardware and software into a shared asset resident on the mobile phone, greatly lowering the cost of
deploying authentication solutions.
• Financial institutions should plan for the biometric world described above by utilizing the mobile device
for authentication wherever possible and to avoid the collection of biometric data centrally as that data
represents yet another target for criminals.
One of the 8 exhibits included in this research report:
© 2017 Mercator Advisory Group
Figure 1: Each Organization Has a Perspective on Identity
That Is Linked to Its Own Credential
Source: Mercator Advisory Group © 2017 Mercator Advisory Group
KYC/Loan Risk Newspaper Driver’s License Online Purchase Email Account
Gw^1H9!
Hj9(1+?B! buY1tN0W!
emai1102!?
About the research report:
2017 Mercator Advisory Group
This report is 44 pages long and contains 8 exhibits.
Companies mentioned in this report include: AimBrain, Allscripts, Amazon, Apple, Arena, AstraZeneca,
Balabit, Bank of America, Bank of Tokyo, Bayer, BehavioSec, BioCatch, BrowserSpy.dk, bunq, Chase,
ContinUse, CO-OP Financial Services, Desert Schools Federal Credit Union, Diebold, Discover, E8 Security,
Early Warning, Eli Lilly, Entrust Datacard, Etsy, Evernym, Exabeam, Facebook, FIDO Alliance, FIS, Fiserv,
Fortscale, Fujitsu, GlaxoSmithKline, Google (Alphabet), Gurucul, HID Global, The Hiroshima Bank, HP, IBM,
IDScan Biometrics, IEEE, LexisNexis, LG, Merck, National Westminster Bank, Nikon, NuData, Nymi,
MasterCard, MicroBilt, Microsoft, Mitek, NetGuardians, PayPal, Plurilock, Qualcomm, SAFE-BioPharma,
Samsung, SecureAuth, Securonix, Sovrin Foundation, Sqrrl, Telesign, Temenos, TMG, Twitter, UniCredit,
USAA, US Defense Department, Veridium, Visa, VoiceVault, Wells Fargo, Yahoo, and Xiaomi.
Members of Mercator Advisory Group’s Emerging Technologies Advisory Service have access to these
reports as well as the upcoming research for the year ahead, presentations, analyst access, and other
membership benefits.
For more information and media inquiries, please call Mercator Advisory Group's main line: 1-781-419-1700;
send email to media@mercatoradvisorygroup.com.
For free industry news, opinions, research, company information and more, visit us at
www.PaymentsJournal.com.
Follow us on Twitter @ http://twitter.com/MercatorAdvisor.
About Mercator Advisory Group
Mercator Advisory Group is the leading independent research and advisory
services firm exclusively focused on the payments and banking industries. We
deliver pragmatic and timely research and advice designed to help our clients
uncover the most lucrative opportunities to maximize revenue growth and
contain costs.
Our clients range from the world's largest payment issuers, acquirers,
processors, merchants and associations to leading technology providers and
investors. Mercator Advisory Group is also the publisher of the online payments
and banking news and information portal PaymentsJournal.com.
2016 Mercator Advisory Group

Mais conteúdo relacionado

Mais procurados

Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Dr. Amarjeet Singh
 
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCloudIDSummit
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010Nazmul
 
The AI Revolution in Insurance: A Reality Check
The AI Revolution in Insurance: A Reality CheckThe AI Revolution in Insurance: A Reality Check
The AI Revolution in Insurance: A Reality CheckNTT DATA Consulting, Inc.
 
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...Black Duck by Synopsys
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report InfographicCarlo Arioli
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Arun Shankar
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Praveen Velichety
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Shufti Pro
 

Mais procurados (20)

Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...
 
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010
 
The AI Revolution in Insurance: A Reality Check
The AI Revolution in Insurance: A Reality CheckThe AI Revolution in Insurance: A Reality Check
The AI Revolution in Insurance: A Reality Check
 
AI in Insurance - InView Primer
AI in Insurance - InView PrimerAI in Insurance - InView Primer
AI in Insurance - InView Primer
 
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...Open Source Insight:  HBO, Voting Machines & Car Washes Hacked  & Black Hat /...
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
AI Insurance Bot
AI Insurance BotAI Insurance Bot
AI Insurance Bot
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 

Semelhante a Biometrics: A New Wrinkle Changes the Authentication Landscape

Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Learningade
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketAn Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...Jenna Murray
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of BiometricsPeachy Essay
 
Mobile trends and implications
Mobile trends and implicationsMobile trends and implications
Mobile trends and implicationsStephen Johnston
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper ExampleKayla Perry
 

Semelhante a Biometrics: A New Wrinkle Changes the Authentication Landscape (20)

Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
The 10 most trusted biometric companies
The 10 most trusted biometric companiesThe 10 most trusted biometric companies
The 10 most trusted biometric companies
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketAn Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
Mobile trends and implications
Mobile trends and implicationsMobile trends and implications
Mobile trends and implications
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 

Último

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 

Último (20)

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Biometrics: A New Wrinkle Changes the Authentication Landscape

  • 1. Biometrics: A New Wrinkle Changes the Authentication Landscape January 2017
  • 2. 2017 Mercator Advisory Group A new research report from Mercator Advisory Group titled Biometrics: A New Wrinkle Changes the Authentication Landscape explains the need for multimodal biometric authentication and describes many types of biometrics available from various technology providers. The report shows how biometrics technology has shifted from a primarily hardware-based solution to a software-and cloud-based solution enabled by smartphones that have become much more secure. With voice and face recognition, and now the addition of behavioral biometrics, this shift will drive rapid new innovation and will tip the market in favor of the mobile architecture. Increasingly smartphones are shipping with trusted execution environments that can displace traditional hardware security fobs. These new smartphones are critical to this fundamental shift in biometrics. Criminal theft of passwords has made passwords obsolete, and so a new factor is required for authentication. Biometrics will be that new factor. It increases security and will prove more convenient for the consumer than passwords as it transitions into a persistent identity over the next 5 to 8 years. New research report is primer on fundamentals of biometrics for authentication of consumers’ identity
  • 3. 2017 Mercator Advisory Group For persistent identity, authentication no longer entails just a single challenge event such as a fingerprint scan but evolves into a passive trust value uniquely associated with an individual, as is being pursued by Google. The trust value will be constantly updated based on multiple factors including location and passive sound (voice and ambiance) as well as facial recognition and a range of behavioral inputs. With the mobile device formulating this trust factor, it is highly likely that Apple and Google will be critical partners in consumer authentication for the majority of access control scenarios, including call centers and physical access. This reliance on the smartphone will help establish the FIDO (the Fast Identity Online) Standard as the appropriate architectural approach for managing authentication credentials. Keeping the credentials in the handset eliminates the honeypots that attract criminals, increases consumer trust, and converts the authentication infrastructure into a shared resource that will greatly lower deployment costs currently associated with all authentication solutions. Research report argues that passwords are obsolete
  • 4. 2017 Mercator Advisory Group With the mobile device formulating this trust factor, it is highly likely that Apple and Google will be critical partners in consumer authentication for the majority of access control scenarios, including call centers and physical access, according to the report. This reliance on the smartphone will help establish the FIDO (the Fast Identity Online) Standard as the appropriate architectural approach for managing authentication credentials. Keeping the credentials in the handset eliminates the honeypots that attract criminals, increases consumer trust, and converts the authentication infrastructure into a shared resource that will greatly lower deployment costs currently associated with all authentication solutions. Keeping credentials in the handset aids authentication and enhances security
  • 5. 2017 Mercator Advisory Group “The digital future is rushing toward us. Today mobile phones collect consumer activity data and utilize machine learning to provide a range of conveniences before the user even asks—from helping find where one parked one’s car to “Behavioral dynamics will play an increasingly important factor in establishing trust factors for the authenticating consumers’ identity across every channel and for establishing persistent identity,” said Tim Sloane, Vice President, Payments Innovation at Mercator Advisory Group, and author of report. Tim Sloane Vice President, Payments Innovation, and Director, Emerging Technologies Advisory Service Mercator Advisory Group
  • 6. 2017 Mercator Advisory Group Highlights of this research report: • Cybercriminals are so effective that data security will continue to be at risk until passwords are eliminated entirely. • Consumers will come to accept biometrics just as they did mobile banking. • Apple and Google will continue to upgrade and extend the security and biometrics implemented in hardware and operating systems and, due to their broad visibility into the life of the mobile device user, will have more data than all others for authenticating the individual. • Authentication will evolve from a single challenge event, as with fingerprint readers, into a passive persistent identity trust value based on multimodal biometrics • Smartphone technology is rapidly becoming more secure and broadly available in the U.S. population, which means that broad deployment of biometric hardware by financial institutions is likely to be obsolete in less than 5 years. • Apple and Google solutions will likely become critical hardware and software authentication suppliers for the majority of access control scenarios, including devices, call centers, cloud and application authentication needs. • Biometric tags and trust decisions should be held and calculated in the device to mitigate the risk associated with central storage of credentials; this is critical for increased consumer trust. • FIDO authentication architecture will establish an authentication framework that moves much of the hardware and software into a shared asset resident on the mobile phone, greatly lowering the cost of deploying authentication solutions. • Financial institutions should plan for the biometric world described above by utilizing the mobile device for authentication wherever possible and to avoid the collection of biometric data centrally as that data represents yet another target for criminals.
  • 7. One of the 8 exhibits included in this research report: © 2017 Mercator Advisory Group Figure 1: Each Organization Has a Perspective on Identity That Is Linked to Its Own Credential Source: Mercator Advisory Group © 2017 Mercator Advisory Group KYC/Loan Risk Newspaper Driver’s License Online Purchase Email Account Gw^1H9! Hj9(1+?B! buY1tN0W! emai1102!?
  • 8. About the research report: 2017 Mercator Advisory Group This report is 44 pages long and contains 8 exhibits. Companies mentioned in this report include: AimBrain, Allscripts, Amazon, Apple, Arena, AstraZeneca, Balabit, Bank of America, Bank of Tokyo, Bayer, BehavioSec, BioCatch, BrowserSpy.dk, bunq, Chase, ContinUse, CO-OP Financial Services, Desert Schools Federal Credit Union, Diebold, Discover, E8 Security, Early Warning, Eli Lilly, Entrust Datacard, Etsy, Evernym, Exabeam, Facebook, FIDO Alliance, FIS, Fiserv, Fortscale, Fujitsu, GlaxoSmithKline, Google (Alphabet), Gurucul, HID Global, The Hiroshima Bank, HP, IBM, IDScan Biometrics, IEEE, LexisNexis, LG, Merck, National Westminster Bank, Nikon, NuData, Nymi, MasterCard, MicroBilt, Microsoft, Mitek, NetGuardians, PayPal, Plurilock, Qualcomm, SAFE-BioPharma, Samsung, SecureAuth, Securonix, Sovrin Foundation, Sqrrl, Telesign, Temenos, TMG, Twitter, UniCredit, USAA, US Defense Department, Veridium, Visa, VoiceVault, Wells Fargo, Yahoo, and Xiaomi. Members of Mercator Advisory Group’s Emerging Technologies Advisory Service have access to these reports as well as the upcoming research for the year ahead, presentations, analyst access, and other membership benefits. For more information and media inquiries, please call Mercator Advisory Group's main line: 1-781-419-1700; send email to media@mercatoradvisorygroup.com. For free industry news, opinions, research, company information and more, visit us at www.PaymentsJournal.com. Follow us on Twitter @ http://twitter.com/MercatorAdvisor.
  • 9. About Mercator Advisory Group Mercator Advisory Group is the leading independent research and advisory services firm exclusively focused on the payments and banking industries. We deliver pragmatic and timely research and advice designed to help our clients uncover the most lucrative opportunities to maximize revenue growth and contain costs. Our clients range from the world's largest payment issuers, acquirers, processors, merchants and associations to leading technology providers and investors. Mercator Advisory Group is also the publisher of the online payments and banking news and information portal PaymentsJournal.com. 2016 Mercator Advisory Group