Page 79 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 79
ITU-T Focus Group Digital Financial Services
Technology, Innovation and Competition
Technology Type Application within DFS
Social identity verification Identification The use of social media data including self-asserted data
and social graph to establish identity. The strength of such
an approach is unproven. It relies on sufficient data being
readable.
1 Europay, Mastercard, Visa (EMV) is the set of standards for worldwide interoperability and acceptance of secure payment
transactions.
2 Host Card Emulation (HCE) has caused the payments industry to consider software approaches to EMV leveraging techniques
such as white box cryptography. In these solutions, authentication credentials are usually tokenised to reduce the risk associated
with the compromise of a credentials. Typically, the numerous measures including software hardening, and server side risk moni-
toring are employed to ensure the overall residual risk is acceptable.
3 Subscriber Identity Module
4 A smart card is a device that includes an embedded integrated circuit that can be either a secure microcontroller with internal
memory or a memory chip alone. The card connects to a reader with either direct physical contact, or with a remote contactless
radio frequency interface.
5 Physiological biometrics is the field of study related to the measurement of innate human characteristics such as fingerprints or
iris patterns.
6 Behavioral biometrics is the field of study related to the measure of uniquely identifying, and measurable patterns in human
activities, rather than innate human characteristics.
7 Risk-based authentication is a dynamic authentication system which takes into account the profile of the agent requesting access
to the system or service in order to determine the risk profile associated with that transaction. The risk profile is then used to
determine the complexity of the challenge required.
8 TAN list – a printed list of codes from which the user is asked to select one, as a means of authentication. Used in the Danish eID
system NemID (https:// www. nemid. nu/ dk- da/ om_ nemid/ sikkerhed/ teknikken_ bag_ nemid/ ).
9 http:// kantarainitiative. org/
10 http:// www. au10tix. com/ index. php/ products/ front- end- solutions/
65