Biometrics for banks: identity protection and regulatory compliance

By | January 12th, 2017|

Identity authentication based on biometric matching continues to grow along with consumer acceptance in both private and public sectors. Biometrics, the unique physical characteristics that all human beings have, include fingerprints and iris scans, as well as facial and voice matching. These modalities can all be used – to various extents – to clearly identify [...]

FIDO Adoption Pushes Passwords the Way of the Dodo

By | October 19th, 2016|

Of all the things we do online, managing our passwords has to be our least favorite. The horror stories are told over and over again – password phishing, stolen identities, data breaches. Billions of dollars are spent every year by business, government, and consumers in an attempt to safeguard our most cherished belongings: our identities. [...]

Going Branchless – Mobile Onboarding for Banks

By | September 29th, 2016|

Banks keep making banking easier, and that means cutting down on branch visits or eliminating them altogether by giving customers really great mobile apps. Perhaps more than any type of business, banking and financial services firms increasingly rely on the sophistication and ease-of-use of their mobile applications to attract new customers and keep them. They [...]

Biometric Authentication Part IV – Spoof Detection Is Critical For Mobile Facial Biometrics

By | August 18th, 2016|

Facial recognition is here to stay for mobile authentication. It’s fast, easy, and familiar to anyone who has taken a selfie. And thanks to the universal appeal of the selfie, even lower-cost mobile handsets just about now have a front-facing camera. This is important because it means that biometrics can be used to strengthen the [...]

Biometric Authentication Part III – Sorting Out the Options

By | August 4th, 2016|

Biometrics are the heir to the password for the reign of secure authentication. There are good reasons for that; our biometrics are naturally unique to us and could hardly be more convenient. They will enable strong authentication to become a seamless, transparent process that make login easier and more secure. But there are different ways [...]

Biometric Authentication Part II: Convenience and Security

By | July 19th, 2016|

In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]

Biometric Authentication Part I: A New Consumer Paradigm

By | July 7th, 2016|

2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]

What’s in a Name? FIDO Enables Trust Without Passwords

By | June 16th, 2016|

“Fido” in Latin translates as “to trust”, but it more commonly evokes thoughts of man’s most loyal companion. Abraham Lincoln had a dog named Fido, and among the most recognized (non-fictional) dogs in history was named Fido. He was a street dog that became famous in Italy in the 1950s for unwavering loyalty to his [...]