V1 HIT 08 Multi factor mobile with camera phone FV copy - Hitachi Security...

1
MOBILE AUTHENTICATION WITH CAMERA PHONE FV VEINID © Hitachi Europe Ltd. 2018 . All rights reserved. The problem now for service providers is how to deploy standardised authentication tools in their Apps across the two main mobile platforms that doesn’t compromise privacy regulations and protects against identity theft. Hitachi’s next generation solution based on the award-winning finger vein authentication technology, aims to contribute to a safer and more secure society. To speak to us about how our solutions can be part of a multi-factor program for securing the mobile channel, contact us at [email protected] The goal of the service provider is to “know your customer”. Hitachi’s solution addresses this by performing the authentication in conjunction with the service provider. It means that the authentication step stays clearly in the control of the service provider. See how it works below. It can be used by any device equipped with a digital camera (smart phone, tablet, laptop etc.) to easily authenticate users by their finger vein patterns in a fast, simple transaction. As Apple Pay was established as a payment tool, the optional use of Touch ID and Face ID instead of passcodes meant millions were seamlessly transitioned over to biometric authentication. Step 1 User presents their fingers. Step 2 Device captures the image. Step 3 Finger regions segmented. Step 4 Finger Vein patterns extracted. Step 5 Encrypted multi finger authentication. Step 6 Customer authenticated. Matching With deep knowledge of cybersecurity, biometrics and banking security, and having the related tools that secure many enterprises, Hitachi is able to ensure that fast and flexible user authentication can be served up in the safest and most practical way. The growth in the use of biometrics in the mobile channel and the innovation towards using different biometric modalities shows no signs of slowing down. Apple were first with their Touch ID fingerprint sensor. The release brought claims about how the security could be compromised, but generally, the technology was great in speeding up access to the device. After capturing an audience of several hundred million users who had quickly got used to the idea of a Touch ID to open and authenticate transactions, Apple made the transition to Face ID. With Face ID boasting a far higher accuracy rate than Touch ID, it was a no brainer for Apple to move to face recognition. ACCURACY GOOD POOR GOOD POOR ACCURACY

Transcript of V1 HIT 08 Multi factor mobile with camera phone FV copy - Hitachi Security...

Page 1: V1 HIT 08 Multi factor mobile with camera phone FV copy - Hitachi Security …digitalsecurity.hitachi.eu/wp-content/uploads/2018/10/... · 2018-10-05 · Hitachi’s next generation

MOBILE AUTHENTICATION WITH CAMERA PHONE FV

VEINID

© Hitachi Europe Ltd. 2018 . All rights reserved.

The problem now for service providers is how to deploy standardised authentication tools in their Apps across the two main mobile platforms that doesn’t compromise privacy regulations

and protects against identity theft.

Hitachi’s next generationsolution based on the award-winning finger vein authentication technology,aims to contribute to a saferand more secure society.

To speak to us about how our solutionscan be part of a multi-factor program for

securing the mobile channel, contact us at [email protected]

The goal of the service provider is to “know your customer”. Hitachi’s solution addresses

this by performing the authentication in conjunction with the service provider.

It means that the authentication step stays clearly in the control of the service provider.

See how it works below.

It can be used by any device equipped with a digital camera (smart phone,tablet, laptop etc.) to easily authenticate users by their finger vein patterns in a fast, simple transaction.

As Apple Pay was established as a payment tool, the optional use of Touch ID andFace ID instead of passcodes meant millions were seamlessly transitioned over to biometric authentication.

Step 1User presentstheir fingers.

Step 2Device captures the image.

Step 3Finger regions segmented.

Step 4Finger Vein patterns extracted.

Step 5Encrypted multifinger authentication.

Step 6Customer authenticated.

Matching

With deep knowledge of cybersecurity, biometrics and banking security, and having the related tools that secure many

enterprises, Hitachi is able to ensure that fast and flexible user authentication can be served up

in the safest and most practical way.

The growth in the use of biometrics in the mobile channel and the innovation towards using different biometric modalities shows no signs of slowing down.

Apple were first with theirTouch ID fingerprint sensor. The release brought claims about how the security could be compromised, but generally, the technologywas great in speedingup access to the device.

After capturing an audience of several hundred million users who had quickly got usedto the idea of a Touch IDto open and authenticate transactions, Apple made the transition to Face ID.

With Face ID boasting afar higher accuracy rate than Touch ID, it wasa no brainer for Apple to move to face recognition.

ACCURACY

GOODPOOR GOODPOOR

ACCURACY