SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Passwordless
Mobile Banking
DIGITAL BANKING
May 2022
INTRO.
With the advanced technologies such as
biometrics verification and
cryptographic keys, IT around the world
is moving towards passwordless
authentication for its applications. Fast
Identity Online 2 (FIDO2) is the
industry’s answer to the global password
problem and addresses all of the issues
of traditional authentication.
Passwords are a big problem for the
financial services industry. It’s common
for criminals or hackers to compromise
passwords through brute force,
credential stuffing, dictionary attacks,
and phishing or social engineering.
According to Verizon 2021 Data Breach
Investigations Report, 89% of breaches
within Hacking involve Brute force or
the Use of lost or stolen credentials. To
limit the damage of compromised
passwords, organizations
typically ask users to set
overly complex
passwords and
3FA
KNOW
HAVE ARE
change them frequently. This practice
creates a hassle and big friction to digital
processes.
For many IT departments, password
support and maintenance are often the
largest cost. Password replacement
options can help organizations offer
convenience and improve user
experience without exposure to high
security risk. FIDO2 cryptographic login
credentials are unique across every
website, never leave the user’s device
and are never stored on a server. This
security model eliminates the risks of
phishing, all forms of password theft and
replay attacks. Login access to an
account is limited to a register device
(something you have) and requires a
second factor such as facial or
fingerprint (something you are) to
unlock the cryptographic keys.
Passwordless Authentication | Intro
Passwordless Authentication | Intro
This practice will create a more convenient authentication experience for users on
their digital journeys. Modern iOS and Android mobile devices have built-in support
for facial or fingerprint authentication, thus it reduces the fictions in the entire
process allowing users to access to the services they need in a few seconds.
Many iOS and Android mobile devices have built-in support for facial or fingerprint
recognition, allowing the device authentication to be performed within a few
seconds, thus reducing friction in the entire process.
3 steps to authenticate
your account
1 Match your fingerprint
3 Scan your fingerprint
2 Scan your face
Got it
CONGRATULATIONS!
Next
In passwordless mobile banking scenarios, users provide only a username to initiate
authentication. The mobile banking app then presents a device-native dialogue to the user.
Once the user provides biometric authentication or a PIN, the unlocked private key will be
used to sign the authentication request and pass it back to the application
Next
Your Username
Mobile Banking &
Passwordless Authentication
Passwordless Authentication | 01
• Mobile Frontend is the banking application that wants to authenticate users or
confirm the transaction.
• The Frontend component communicates with the Platform Authenticator for the
authentication ceremony. The information is then passed to the backend and
Authentication API to finish the transaction.
1st-time onboarding
After a user has registered for a bank account, users must register their mobile
device as their primary authenticator. This ceremony could be accomplished in one
of the following ways:
• Automatically: The secret keys are sent in encrypted form online. Users have
installed Mobile Banking App, register their communication channel, perform eKYC
procedures and successfully create a bank account. Encrypted data can be fetched
from Authentication API component.
• QR-Coded: A QR code containing all required key information is submitted to the
users via a Bank Branch visit or sent over a trusted channel such as video call.
Once registered, the user’s mobile device is the key to authenticate as well as sign
the transactions
Mobile Banking App
Mobile Frontend
Auth API
Mobile Backend
Authentication API
Platform
Authenticator
CTAP2 User Store
Application Architecture
Overview
Passwordless Authentication | 02
Authentication and Transaction Signing
1. Frontend trigger authentication initialization
2. User provides consent through a biometrics or a PIN
3. The authentication response phrase is sent to backend for processing
4. Authentication API validate the response phrase using stored credential public key
FIDO2-based solutions will help increase User experience, faster login and transaction
confirmation. In the digital world, make it simple for the Users with one-tap
confirmation, no need to keep USB tokens, digital token generators. The Solution also
helps reduce the operations cost, reduces requests to helpdesk for password reset.
Passwords are going away. The future belongs to passwordless authentication
solutions.
Operation 1 from 1
Got it
Bank Acc Name
The First Bank
Bank Acc No
123-45678-912
Sort Code
5439
Swift Number
HSBCSGSG
IBAN
SG12340000000123456
Amount
$100
CONFIRMED
Next
Passwordless Authentication | 03
KMS Solutions works closely with leading software companies across the
globe to bring the most advanced and innovative technologies to Asia
Pacific. The focus is to help organizations achieve their business goals
through world-class fit-for-purpose solutions and proven industry best
practices. KMS Solutions’ success is ultimately measured by the positive
impact that it makes to the client’s business.
To learn more about KMS Solutions, visit https://kms-solutions.asia/

Más contenido relacionado

Similar a Passwordless Mobile Banking.pdf

OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
A Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdfA Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdfPay10
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
How to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationHow to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationJane Brewer
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital TrustBahaa Al Zubaidi
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 

Similar a Passwordless Mobile Banking.pdf (20)

Bg24375379
Bg24375379Bg24375379
Bg24375379
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
A Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdfA Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdf
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
How to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationHow to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os application
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Loqr
LoqrLoqr
Loqr
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 

Más de KMSSolutionsMarketin

Digital Transformation Trends and Predictions for 2020.pdf
Digital Transformation Trends and Predictions for 2020.pdfDigital Transformation Trends and Predictions for 2020.pdf
Digital Transformation Trends and Predictions for 2020.pdfKMSSolutionsMarketin
 
TPBank Case Study - long ver (2).pdf
TPBank Case Study - long ver (2).pdfTPBank Case Study - long ver (2).pdf
TPBank Case Study - long ver (2).pdfKMSSolutionsMarketin
 
Automation Testing Best Practices.pdf
Automation Testing Best Practices.pdfAutomation Testing Best Practices.pdf
Automation Testing Best Practices.pdfKMSSolutionsMarketin
 
GIC Real Estate Analytics Project Success Story.pdf
GIC Real Estate Analytics Project Success Story.pdfGIC Real Estate Analytics Project Success Story.pdf
GIC Real Estate Analytics Project Success Story.pdfKMSSolutionsMarketin
 
An Introduction to Software Testing Life Cycle
An Introduction to Software Testing Life CycleAn Introduction to Software Testing Life Cycle
An Introduction to Software Testing Life CycleKMSSolutionsMarketin
 
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATION
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATIONTESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATION
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATIONKMSSolutionsMarketin
 
Design Thinking for Digital Banking
Design Thinking for Digital BankingDesign Thinking for Digital Banking
Design Thinking for Digital BankingKMSSolutionsMarketin
 
Must-have Features for Banking Application.pdf
Must-have Features for Banking Application.pdfMust-have Features for Banking Application.pdf
Must-have Features for Banking Application.pdfKMSSolutionsMarketin
 
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfAn Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfKMSSolutionsMarketin
 
How to Build a Digital Platform in the Age of Digital
How to Build a Digital Platform in the Age of DigitalHow to Build a Digital Platform in the Age of Digital
How to Build a Digital Platform in the Age of DigitalKMSSolutionsMarketin
 
Strategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdfStrategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdfKMSSolutionsMarketin
 

Más de KMSSolutionsMarketin (17)

Digital Transformation Trends and Predictions for 2020.pdf
Digital Transformation Trends and Predictions for 2020.pdfDigital Transformation Trends and Predictions for 2020.pdf
Digital Transformation Trends and Predictions for 2020.pdf
 
TPBank Case Study - long ver (2).pdf
TPBank Case Study - long ver (2).pdfTPBank Case Study - long ver (2).pdf
TPBank Case Study - long ver (2).pdf
 
Automation Testing Best Practices.pdf
Automation Testing Best Practices.pdfAutomation Testing Best Practices.pdf
Automation Testing Best Practices.pdf
 
GIC Real Estate Analytics Project Success Story.pdf
GIC Real Estate Analytics Project Success Story.pdfGIC Real Estate Analytics Project Success Story.pdf
GIC Real Estate Analytics Project Success Story.pdf
 
Lean Agile.pptx
Lean Agile.pptxLean Agile.pptx
Lean Agile.pptx
 
An Introduction to Software Testing Life Cycle
An Introduction to Software Testing Life CycleAn Introduction to Software Testing Life Cycle
An Introduction to Software Testing Life Cycle
 
ACB Case Study
ACB Case StudyACB Case Study
ACB Case Study
 
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATION
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATIONTESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATION
TESTING STRATEGIES TO ENSURE A CORE BANKING TRANSFORMATION
 
6 Imperatives for Digital Banking
6 Imperatives for Digital Banking6 Imperatives for Digital Banking
6 Imperatives for Digital Banking
 
Design Thinking for Digital Banking
Design Thinking for Digital BankingDesign Thinking for Digital Banking
Design Thinking for Digital Banking
 
Must-have Features for Banking Application.pdf
Must-have Features for Banking Application.pdfMust-have Features for Banking Application.pdf
Must-have Features for Banking Application.pdf
 
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfAn Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
 
How to Build a Digital Platform in the Age of Digital
How to Build a Digital Platform in the Age of DigitalHow to Build a Digital Platform in the Age of Digital
How to Build a Digital Platform in the Age of Digital
 
Digital Strategy
Digital StrategyDigital Strategy
Digital Strategy
 
The Future of Learning Ecosystem
The Future of Learning EcosystemThe Future of Learning Ecosystem
The Future of Learning Ecosystem
 
Strategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdfStrategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdf
 
Doing Digital Banking Right
Doing Digital Banking RightDoing Digital Banking Right
Doing Digital Banking Right
 

Último

how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfMehmet Akar
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems ApproachNeo4j
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfsteffenkarlsson2
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1KnowledgeSeed
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024vaibhav130304
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAlluxio, Inc.
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfDeskTrack
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...naitiksharma1124
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Andrea Goulet
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfVictor Lopez
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesNeo4j
 

Último (20)

how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdf
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdf
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 

Passwordless Mobile Banking.pdf

  • 2. INTRO. With the advanced technologies such as biometrics verification and cryptographic keys, IT around the world is moving towards passwordless authentication for its applications. Fast Identity Online 2 (FIDO2) is the industry’s answer to the global password problem and addresses all of the issues of traditional authentication. Passwords are a big problem for the financial services industry. It’s common for criminals or hackers to compromise passwords through brute force, credential stuffing, dictionary attacks, and phishing or social engineering. According to Verizon 2021 Data Breach Investigations Report, 89% of breaches within Hacking involve Brute force or the Use of lost or stolen credentials. To limit the damage of compromised passwords, organizations typically ask users to set overly complex passwords and 3FA KNOW HAVE ARE change them frequently. This practice creates a hassle and big friction to digital processes. For many IT departments, password support and maintenance are often the largest cost. Password replacement options can help organizations offer convenience and improve user experience without exposure to high security risk. FIDO2 cryptographic login credentials are unique across every website, never leave the user’s device and are never stored on a server. This security model eliminates the risks of phishing, all forms of password theft and replay attacks. Login access to an account is limited to a register device (something you have) and requires a second factor such as facial or fingerprint (something you are) to unlock the cryptographic keys. Passwordless Authentication | Intro Passwordless Authentication | Intro
  • 3. This practice will create a more convenient authentication experience for users on their digital journeys. Modern iOS and Android mobile devices have built-in support for facial or fingerprint authentication, thus it reduces the fictions in the entire process allowing users to access to the services they need in a few seconds. Many iOS and Android mobile devices have built-in support for facial or fingerprint recognition, allowing the device authentication to be performed within a few seconds, thus reducing friction in the entire process. 3 steps to authenticate your account 1 Match your fingerprint 3 Scan your fingerprint 2 Scan your face Got it CONGRATULATIONS! Next In passwordless mobile banking scenarios, users provide only a username to initiate authentication. The mobile banking app then presents a device-native dialogue to the user. Once the user provides biometric authentication or a PIN, the unlocked private key will be used to sign the authentication request and pass it back to the application Next Your Username Mobile Banking & Passwordless Authentication Passwordless Authentication | 01
  • 4. • Mobile Frontend is the banking application that wants to authenticate users or confirm the transaction. • The Frontend component communicates with the Platform Authenticator for the authentication ceremony. The information is then passed to the backend and Authentication API to finish the transaction. 1st-time onboarding After a user has registered for a bank account, users must register their mobile device as their primary authenticator. This ceremony could be accomplished in one of the following ways: • Automatically: The secret keys are sent in encrypted form online. Users have installed Mobile Banking App, register their communication channel, perform eKYC procedures and successfully create a bank account. Encrypted data can be fetched from Authentication API component. • QR-Coded: A QR code containing all required key information is submitted to the users via a Bank Branch visit or sent over a trusted channel such as video call. Once registered, the user’s mobile device is the key to authenticate as well as sign the transactions Mobile Banking App Mobile Frontend Auth API Mobile Backend Authentication API Platform Authenticator CTAP2 User Store Application Architecture Overview Passwordless Authentication | 02
  • 5. Authentication and Transaction Signing 1. Frontend trigger authentication initialization 2. User provides consent through a biometrics or a PIN 3. The authentication response phrase is sent to backend for processing 4. Authentication API validate the response phrase using stored credential public key FIDO2-based solutions will help increase User experience, faster login and transaction confirmation. In the digital world, make it simple for the Users with one-tap confirmation, no need to keep USB tokens, digital token generators. The Solution also helps reduce the operations cost, reduces requests to helpdesk for password reset. Passwords are going away. The future belongs to passwordless authentication solutions. Operation 1 from 1 Got it Bank Acc Name The First Bank Bank Acc No 123-45678-912 Sort Code 5439 Swift Number HSBCSGSG IBAN SG12340000000123456 Amount $100 CONFIRMED Next Passwordless Authentication | 03
  • 6. KMS Solutions works closely with leading software companies across the globe to bring the most advanced and innovative technologies to Asia Pacific. The focus is to help organizations achieve their business goals through world-class fit-for-purpose solutions and proven industry best practices. KMS Solutions’ success is ultimately measured by the positive impact that it makes to the client’s business. To learn more about KMS Solutions, visit https://kms-solutions.asia/