Page 78 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 78

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               Appendix B: Identity technologies

                Technology           Type                    Application within DFS

                Europay, Mastercard, Visa   Authentication   EMV uses strong cryptographic security. This can be provided
                (EMV)  1                                     via a smart card, a secure element within a mobile phone or
                                                             potentially via a “hardened” app in a mobile phone.  2

                Subscriber Identity Module   Authentication  A GSM-compliant mobile phone’s SIM is a specialised smart
                (SIM) 3                                      card (qv), and offers a tamper-resistant cryptographic envi-
                                                             ronment. It can host apps created in the SIM Toolkit (STK)
                                                             environment, which can use encryption for transactions and
                                                             general communication. It can support communication over
                                                             any of the mobile phone’s network connections, including
                                                             mobile data, SMS, and USSD.

                Smart card 4         Authentication          Tamper resistance cryptographic hardware. Established and
                                                             recognised secure technology.

                Physiological biometric 5  Identification or authentication  For identification needs, multiple biometrics are necessary to
                                                             establish uniqueness.
                                                             By contrast, for authentication, a single biometric can provide
                                                             effective means of authentication of asserted identity.

                Behavioural          Authentication          The technology is less mature than physiological biometrics
                biometric 6                                  (qv), and more aligned to risk management than absolute or
                                                             explicit authentication.

                Mobile app           Authentication          Can be high security, depending on protection built into the
                                                             app.
                Risk-based authentication   Authentication   Like behavioural biometrics, RBA provides corroborating evi-
                (RBA) 7                                      dence for authentication rather than explicit authentication. No
                                                             standard way to measure performance.

                SMS                  Authentication          SMS used straight relies on mobile network encryption, which is
                                                             known to be weak. It needs to be augmented with application
                                                             security, implemented, for example in a mobile app or in a SIM
                                                             Toolkit app (see SIM), both of which can use SMS as the bearer
                                                             technology.
                Transactional access num-  Authentication    Access to physical list required but can be easily copied once
                bers (TAN List) 8                            access is obtained.
                OAuth                Authorisation           A protocol for providing access tokens (which may be tempo-
                                                             rary) to allow third party applications to access resources (data)
                                                             on behalf of the resource (data) owner.
                User Managed Access    Authorisation         A recently established standard that defines how a resource
                (U M A)                                      owner (e.g. an individual) can control access to their resources
                                                             (e.g. personal data) by third parties. The standard was devel-
                                                             oped by the Kantara Initiative 9. It builds on and extends OAuth
                                                             (qv).

                Scanning documents   Identification          Digital validation of documents using image processing; a rel-
                                                             atively new technology but thought to be robust. AU10TIX is a
                                                             leading vendor in this space 10.

                Credit reference agency data Identification  In developed markets this is a de facto method of establishing
                                                             identity. Can appear invasive, where knowledge-based ques-
                                                             tions are generated from credit data.
                Government registries  Identification        Usually viewed as authoritative. Anecdotally can often contain
                                                             significant numbers of fraudulent identities. Privacy will depend
                                                             on amount of data held and control of access to it.





                64
   73   74   75   76   77   78   79   80   81   82   83