Tackling the trillion dollar identity fraud crisis

June 2019 Home Security, Access Control & Identity Management

Fraud costs trillions of dollars to world economies annually. For consumers whose identity data has been stolen, the impact on their lives can vary from being a nuisance to financial and emotional trauma.

Worldwide, around 40% of consumers have been the targets of identity theft syndicates at least once. Worth trillions of US dollars annually, identity theft has historically been fairly easy to achieve – particularly for larger crime syndicates. As a result, businesses are buckling under the weight of fraud-related losses due to identity theft scams.

However, the 4th Industrial Revolution has enabled a combination of mobile phones, sophisticated 3D facial identity algorithms and systems linked to government ID bureaus, to make it possible to accurately identify and authenticate someone remotely. Businesses can now authenticate new or existing customers without them having to show up in person – the entire process is seamless, secure, remote and digital.

Lance Fanaroff
Lance Fanaroff

Lance Fanaroff, a director of iiDENTIFii, a company that provides a remote biometric digital authentication and automated on-boarding technology platform, says people want to be able to open a bank account without going into a bank or buy something without going to a shopping centre.

“It’s critical that an individual’s online identity is protected. We have built a technology platform that, using a mobile phone, can prove the identity of a person within 30 seconds and with an accuracy of 1 error in 10 000. The current ratio is about 11 inaccuracies per 100 using standard biometrics,” he says.

Using a mobile phone and an official identity document, the technology platform does four critical things:

• It proves that the person is alive.

• It matches the selfie the user has taken with the image on their ID document.

• The data is then extracted off the identity document – including the person’s name, surname and ID number.

• All the data is then matched with a facial biometric at an issuing authority or government department – Home Affairs, for example.

Says Fanaroff: “Using that golden triangle of identity, we can prove the individual is who they say they are. Only then do we onboard them.

“Through three-dimensional analysis, we can prove that the individual online is really alive. The depth of our facial recognition algorithms means we can recognise anyone from any region of the globe - we can handle on-boarding of all ethnicities.”

He says false accept and reject rate are also minimised. “The false accept rate is the risk that an organisation will onboard the wrong individual and enable identity theft. The false reject rate is when the correct person is dismissed and rejected. We have to balance fraud with friction by minimising both,” says Fanaroff.

Businesses can ensure that all consumers being enrolled are thoroughly vetted with digital identity verification technologies and that the transactions that pose the highest risk are gated with multi-factor authentication. These technologies will protect businesses and consumers from data theft and change the economics of fraud, so that it is no longer in favour of the criminals.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Child fingerprint identification solution
July 2019 , News, Access Control & Identity Management
Gavi, NEC, and Simprints to deploy world’s first scalable child fingerprint identification solution to boost immunisation in developing countries.

Read more...
Versatile electronic lock cylinders
July 2019, Salto Systems Africa , Products, Access Control & Identity Management
Fully integrated with the SALTO System’s Space and SALTO KS platforms, the new Geo range of electronic cylinders are compact in size, making them a suitable solution for almost any type of door.

Read more...
SIA talks open APIs at ID4Africa
July 2019 , Editor's Choice, Access Control & Identity Management, Integrated Solutions
Pioneering industry-first open standards initiative from the Secure Identity Alliance assures interoperability for sovereign ID programmes and promises to eliminate vendor lock-in.

Read more...
Small business solutions with ­Access in a Box
July 2019, Impro Technologies , Editor's Choice, Access Control & Identity Management, Products, Commercial (Industry)
Access in a Box is specifically designed for small businesses, or businesses with only a few entry points such as gyms, medical practices or retail stores.

Read more...
IDM in a factory environment
July 2019, ZKTeco , Industrial (Industry), Access Control & Identity Management
There are many variables that need to be considered when an industrial company needs identity security but workers are hard to identify.

Read more...
National Home Security Month awards
July 2019, Yale Security (SA) , Home Security, CCTV, Surveillance & Remote Monitoring
National Home Security Month (NHSM) aims to create awareness around the importance of good home security, and how we can ensure our homes and families remain safe.

Read more...
Top ten tips to stay safe
July 2019, Yale Security (SA) , Home Security, Security Services & Risk Management
Yale Security offers Hi-Tech Home Security reader a few tips to help ensure your home remains a safe haven.

Read more...
Critical vulnerabilities in smart home controller
July 2019, Kaspersky Lab , Home Security, Cyber Security
Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities.

Read more...
Managing visitors effectively and responsibly
June 2019, Powell Tronics, IDEMIA , Vox Telecom, Technews Publishing , Access Control & Identity Management
Managing access for visitors has always been something of a balancing act between keeping unwanted people out, and letting authorised people in. Particularly in a business environment, it is also crucial to make guests feel welcome and safe.

Read more...
Foresight means secure offices
June 2019, Bosch Building Technologies , Commercial (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Read more...