Page 79 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 79

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition




                Technology           Type                    Application within DFS
                Social identity verification  Identification  The use of social media data including self-asserted data
                                                             and social graph to establish identity. The strength of such
                                                             an approach is unproven. It relies on sufficient data being
                                                             readable.

                1  Europay, Mastercard, Visa (EMV) is the set of standards for worldwide interoperability and acceptance of secure payment
                transactions.
                2  Host Card Emulation (HCE) has caused the payments industry to consider software approaches to EMV leveraging techniques
                such as white box cryptography. In these solutions, authentication credentials are usually tokenised to reduce the risk associated
                with the compromise of a credentials. Typically, the numerous measures including software hardening, and server side risk moni-
                toring are employed to ensure the overall residual risk is acceptable.
                3  Subscriber Identity Module
                4  A smart card is a device that includes an embedded integrated circuit that can be either a secure microcontroller with internal
                memory or a memory chip alone. The card connects to a reader with either direct physical contact, or with a remote contactless
                radio frequency interface.
                5  Physiological biometrics is the field of study related to the measurement of innate human characteristics such as fingerprints or
                iris patterns.
                6  Behavioral biometrics is the field of study related to the measure of uniquely identifying, and measurable patterns in human
                activities, rather than innate human characteristics.
                7  Risk-based authentication is a dynamic authentication system which takes into account the profile of the agent requesting access
                to the system or service in order to determine the risk profile associated with that transaction. The risk profile is then used to
                determine the complexity of the challenge required.
                8  TAN list – a printed list of codes from which the user is asked to select one, as a means of authentication. Used in the Danish eID
                system NemID (https:// www. nemid. nu/ dk- da/ om_ nemid/ sikkerhed/ teknikken_ bag_ nemid/ ).
                9  http:// kantarainitiative. org/
                10  http:// www. au10tix. com/ index. php/ products/ front- end- solutions/
















































                                                                                                       65
   74   75   76   77   78   79   80   81   82   83   84