Page 57 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 57

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               3.2.3.4  Necessary developments

               The benefits of the prevention of dual registrations, as well as convenience are driving the use of biometric
               technologies in public identity schemes such as Aadhaar, NIMC, and NADRA. However, ubiquitous adoption
               within both the private and public sector in the future is likely to be dependent on a number of key developments:

               •    Quality of data captured: The quality of the data captured by biometric technologies has to be appropriate
                    to the intended use for that data. In the case of biometrics for identification activities for example, the data
                    captured has to be sufficiently unique to distinguish it from all other profiles within a given ecosystem.
                    However, for use in authentication, the data collected may only need to be sufficient enough to confirm
                    a 1:1 match. Failure to meet an appropriate balance between quality and intended use has the potential
                    to shape consumer opinion on the use of biometrics in the future and ultimately adoption of them.
               •    Centralised or distributed: The decision of where the biometric data is held (see section ‎0) is influenced
                    by use cases and risk, and privacy rules. A decision is also dependent on ongoing developments – such
                    as is the case with some services that carry out biometric authentication on a client personal device,
                    and then generate and deliver a cryptographic token with a claim about the authentication result, rather
                    than the biometric itself.

               •    Usability and reliability: One of key benefits of biometric technologies to the developing world is
                    presented by a reduced dependency on alphanumeric inputs. This has the potential to promote inclusion
                    among low literacy demographics, provided the accompanying mechanism is sufficiently usable.
                    For example, the UIDAI’s biometrics standards committee in India published a report in 2009 advising
                    that the use of fingerprint recognition may present challenges for people engaged in manual labour .
                                                                                                        12
                    This is particularly relevant in developing economies where a large proportion of the population resides
                    in a rural environment. In Africa, rural communities constitute 46 per cent of the total population .
                                                                                                     13

                   Examples:      Safran , Crossmatch 2
                                       1

                   1   http:// www. morpho. com/
                   2   http:// www. crossmatch. com/



               3.2.4   Mobile phone technologies

               Mobile penetration has seen continued growth with more than 4.7 billion unique subscribers recorded in
               2015 globally , up from 3.6 billion at the end of 2014 . As increases in data connection speeds converge with
                          14
                                                           15
               the proliferation of new capabilities on personal devices, the use of the mobile phone for authentication is
               becoming increasingly important. In particular, the use of the SIM is of specific interest within DFS due to its
               ubiquity within the target market and its capacity to securely store cryptographic keys. Assuming use of the
               SIM is readily accessible, the technology could enable a user’s control over a digital identity without the need
               for an additional form factor.
               However, the secure hardware in the SIM is typically controlled by mobile network operators (MNOs), and
               as such, commercial relationships may need to be established before utilisation of its capabilities for digital
               identity. Furthermore, in models which involve the use of a 3  party controlled secure element, access is
                                                                    rd
               ultimately subject to the conditions of the controlling party, which are often regulated by local data protection,
               and privacy rules. This can present both limitations and opportunities for the scope of any services offered.





               12   https:// authportal. uidai. gov. in/ static/ role_ of_ biometric_ technology_ in_ aadhaar_ authentication. pdf
               13   http:// www. geohive. com/ earth/ pop_ urban. aspx
               14   http:// gsmamobileeconomy. com/
               15   http:// gsmamobileeconomy. com/ GSMA_ Global_ Mobile_ Economy_ Report_ 2015. pdf



                                                                                                       43
   52   53   54   55   56   57   58   59   60   61   62