Page 53 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 53

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               3.1.2   Image processing software

               Image processing tools can alleviate the need to manually verify the genuineness of paper identity documents.
               However, the extent to which providers of DFS could benefit from this type of system depends on the capability
               of the software and the level at which it is deployed. For example, during the customer and agent registration
               processes for mobile money, time and cost is wasted processing applications which do not satisfy registration
               requirements, and image processing software could improve efficiency, depending on how providers chose
               to enable access to it:

               •    Image processing for administrators: When used as part of an administrative management (back office)
                    suite to verify that genuine documents have been submitted as part of customer or agent registration;
                    the technology can save time by automating what would otherwise be a manual process, but will not
                    necessarily stem the flow of ineligible documents being submitted.

               •    Image processing for agents: When deployed at the agent level, greater time and cost efficiencies may
                    be achieved through a reduction in false or ineligible document submission, however submitted customer
                    applications may still be rejected on the basis of validity (i.e. individual is blacklisted on authoritative
                                       rd
                    database). Call outs to 3  party databases in order to prevent this are possible, but (unlike straightforward
                    rejection of false or ineligible documents, which can happen offline) would require Internet connectivity
                    at the point of registration, and in any case, are unlikely to be an appropriate function for agents.


                   Examples:      Aut10tix , Jumio , Mitek .
                                                      3
                                         1
                                               2
                   1   http:// www. au10tix. com/
                   2   https:// www. jumio. com/
                   3   https:// www. miteksystems. com/




               3.2    Authentication technologies

               Authentication technologies provide a filter allowing only legitimate entities to assert the attributes established
               during identification. In addition, low literacy levels in emerging markets exacerbate usability requirements.


               3.2.1   PINs
               The PIN is the authentication technology that almost all payments in the industrialised world currently rely on
               (though there is a gradual evolution towards biometrics, in the form of Apple Pay, Android Pay, et al). Similarly,
               almost all mainstream DFS providers currently rely on PINs for customer authentication.
               However, there is a commonly held view that many of those at the bottom of the pyramid (BoP) cannot use
               PINs reliably, due to illiteracy, innumeracy, lack of familiarity, etc. It is likely that in most cases the issue stems
               instead from low frequency of use, since many of these customers will access financial services infrequently –
               perhaps as little as once every three months, or even less. Since frequency of use is linked to memory, it should
               come as no surprise that PINs are forgotten. Further, the lack of use leads people to write their PINs down,
               often on the back of the card or even the mobile phone they’re using. This naturally leads to PIN compromise.

               Alongside this, it would appear that global and national fears around terrorism are beginning to have an effect
               on PIN use, as the regulatory authorities in a number of countries are deciding that a PIN is not enough, for at
               least some financial transactions. For example, in India – and soon in Pakistan – online biometric authentication
               for bank transactions, based on Aadhaar, is becoming the norm. Further, the 2015 terrorist attacks in Paris
               were reported to have been financed using prepaid debit cards, which reflects a broader issue with payment
               cards in that one person (who passes KYC checks) can acquire the card and top it up, whilst another person
               uses the funds, with the PIN being forwarded in some way alongside the card – perhaps by post. This is very
               difficult to track, and raises the possibility of the increased use of biometric verification of cardholders, to




                                                                                                       39
   48   49   50   51   52   53   54   55   56   57   58