Page 35 - Implementation of Secure Authentication Technologies for Digital Financial Services
P. 35

ries, customers etc. without having to store Aad-  This type of transformation is warranted today
               haar number in their databases while not being   through a combination of multi-modal and contextu-
               able  to  merge  databases  across  agencies  thus   al controls that continuously and accurately protect
               enhancing privacy.                              user identity and privacy even if your online creden-
            c) Biometric locking                               tials are already compromised. Cognitive Continu-
               This service is meant to help users protect their   ous Authentication™ uses AIML and a combination
               biometric details from being misused in one way   of multi-modal and contextual controls that con-
               or the other. It is worth noting that many agen-  tinuously and accurately protect user transactions,
               cies require applicants to verify their details using   and identity and privacy. Pairing AI with a mixture
               the Aadhaar biometric authenticate facility. UIDAI   of Machine learning (AIML) can be used in the back-
               may enable an Aadhaar number holder to perma-   ground, learning the digital behavior of users within
               nently lock his biometrics and temporarily unlock   context. By taking a holistic approach to how some-
               it when needed for biometric authentication.    one transacts, AI can determine if a bad actor is try-
               All biometric authentication against any such   ing to initiate a fraudulent transaction.
               locked biometric records shall fail with a “No”   Cognitive Continuous Authentication™ starts col-
               answer with an appropriate response code. An    lection of intelligence pre-authentication, uses a rich
               Aadhaar holder shall be allowed to temporari-   set of contextual data instead of binary authenti-
               ly unlock his/her biometrics for authentication,   cation to deliver a new state of the art risk-based
               and such temporary unlocking shall not contin-  authentication with lower friction for the good
               ue beyond the time period specified by UIDAI or   actors and then most importantly a post authoriza-
               till completion of the authentication transaction,   tion continuous authentication that detects transac-
               whichever is earlier.                           tion anomalies leveraging the new controls including
               UIDAI can enable Aadhaar holders to remove such   the use of AIML.
               permanent locks at any point in a secure manner.  Figure 21 below shows the users journey in
                                                               Acceptto’s Cognitive Continuous Authentication™
                                                               which includes Pre-Auth Intelligence, Context Aware
            6�6   Cognitive Continuous Authentication          Risk Based Auth, and post-authorization Continuous
            The significant security, privacy and usability short-  Authentication
            comings of the current consumer identity manage-   When a user’s action seems off, AI can more read-
            ment systems in the financial sector require a para-  ily ping the application that something is “off”
            digm shift away from usernames, passwords and      about the current session.  An artificial intelligence
            other forms of temporal, binary and biometrics     system for intrusion and anomaly detection, such
            controls.                                          as Acceptto's Cognitive Continuous Authentica-

            Figure 21 – Acceptto’s Cognitive Continuous Authentication™



                                                                          Higher LOA            Privileged
                                                                           Requires             Transaction
                                                                           StepUP
                                                                         Authentication         Anomaly
                               Authentication via
               Transaction     Valid Credential          Passthrough
              Landing page
                            2
                                           4                                         Cognitive
                                                                               8                9
                                                                                    Continuous
                                                                                   Authentication TM
                                                           5a
                                   3                            6
                 1
                                                        5b
                                         Transaction                                   7
                                          Risk
                                         Assessment               Higher LOA
                         Pre-Auth Risk                             requires
                          Calculation                             Authentication
                                                       Higher LOA
                                                       Additional
                                                      Auth Needed

                                             Implementation of Secure Authentication Technologies for Digital Financial Services  33
   30   31   32   33   34   35   36   37   38   39   40