Page 42 - Implementation of Secure Authentication Technologies for Digital Financial Services
P. 42

7  IMPLEMENTATION EXAMPLES OF STRONG AUTHENTICATION SYSTEMS

            This section contains examples of strong authentica-  dent’s latest demographic and photograph informa-
            tion systems that cover DFS use cases. The examples   tion using an e-KYC User Agency (KUA) public key
            also  illustrate  mechanisms  related  to  the  authenti-  and subsequently forwards the encrypted response
            cation assurance phases of ITU-T Recommendation    to KUA. On receiving the encrypted response, the
            X.1254.                                            KUA decrypts the data using their own private key
                                                               and returns an eXtensible Markup Language (XML)
            7�1  Use case: Enrolment and Account opening       with seven pieces of data - name, address, date of
            The examples presented for the Enrolment use case   birth,  gender,  phone  number,  e-mail  address  and
            describe how previously-established identity infor-  photograph, this eliminates collecting photocopy of
            mation can be used to create new service accounts   Aadhaar letter from resident.
            and to satisfy KYC requirements. The key aspect in   Some of the benefits of Aadhaar-based eKYC are
            the examples is that the person has been enrolled   described below:
            previously with an authority: their identity informa-
            tion collected, verified and stored. This stored iden-  •  Activation – there is no requirement for filling up
            tity information is then available for later presenta-  of Customer Application Form (CAF) and submis-
            tion to service providers, controlled by the person’s   sion of photograph along with Proof of Identity
            authentication to release that identity information.  (POI) and Proof of Address (POA) documents.
               Use of digital sources of identity information for   •  Secure process – customer’s data is fetched from
            not-in-person KYC and account opening is both        central UIDAI server in encrypted format and not
            convenient for the person but also presents risks    stored on any of the Point of Sale (POS) terminals
            for impersonation. Therefore, use of using strong    except for the company’s server.
            authentication mechanisms is recommended.          •  No document copy or photograph is required –
                                                                 this gives additional confidence to the custom-
            7.1.1   Example: Aadhaar eKYC                        ers as they don’t need to submit any documents
            eKYC service allows resident to authorize Unique     which  can  be  later  misused  by  the  retailers  for
            Identification Authority of India (UIDAI) to share   pecuniary gains.
            electronic version of Aadhaar information (demo-   •  Extremely  quick  activation  –  as  against the tra-
            graphic information and photo only) with the explicit   ditional process for activation of SIM card which
            authentication of the resident. In eKYC service, UIDAI   could take between 12-24 hours, the SIM card is
            encrypts the eKYC response data containing resi-     activated in very short time once the form gets



            Table 3 – Digital Financial Services Use Case Examples


             Authentication Assur- DFS Use Cases           Use case examples
             ance Phase
             Enrolment         Account opening (Section 8.1):  •  Aadhaar eKYC (Section 8.1.1)
                               •  eKYC                      •  Sierra Leone National Digital Identity and Credit Platform –
                               •  Credit checks               Kiva (Section 8.1.2)
                                                            •  K-FIDO Enrolment (Section 8.1.2)
                                                            •  Zug eID – Ethereum Blockchain-based Digital ID (Section
                                                              8.1.4)
                                                            •  FIDO Enrolment (Section 8.1.5)
                                                            •  Healthcare provider user enrolment (Section 8.1.6)
             Authentication    Access a Digital Financial Service  •  Alipay fingerprint payment (Section 8.2.1)
                               (Section 8.2):               •  Aadhaar authentication (Section 8.2.2)
                               •  Storing Funds             •  K-FIDO Authentication (Section 8.2.3)
                               •  Buying                    •  Healthcare provider Next-Generation Authentication (Sec-
                               •  Paying Bills                tion 8.2.4)
                               •  Sending/receiving funds   •  SK Telecom - Mobile Connect Authentication (Section
                               •  Borrowing                   8.2.5)
                               •  Saving
                               •  Insuring Assets and Risks



           40    Implementation of Secure Authentication Technologies for Digital Financial Services
   37   38   39   40   41   42   43   44   45   46   47