Biometrics growing in finance

October 2016 Financial (Industry), Access Control & Identity Management, Integrated Solutions

Biometric authentication, whether for financial transactions, time and attendance, or even logical authentication, has been growing steadily over the past few years. Of course, the uses of biometrics extends far beyond these few areas as we can see in the number of countries requiring biometrics for passports and tourism.

In the world of finance, an understandably slow-moving industry, biometrics has been growing steadily over the past few years in numerous areas, from client authentication, to employee authentication and transaction authorisations, and more. To find out what the state of biometrics is in the financial world, Hi-Tech Security Solutions asked Morpho South Africa’s Nicolas Garcia for some insights.

He notes that financial institutions, due to the nature of their business, always take longer than traditional businesses to adopt new technologies. They need to make sure that the technology they choose can integrate seamlessly into their current environment and the use of biometrics is no different. The process is in fact longer because biometrics can be used almost everywhere.

Fingerprint readers could be used for audit purposes in transaction validation, for example. Additionally, during the last phase of opening an account, the operator as well as the customer could be asked to present their fingers. Not only could the system verify their identity, but the audit trail would show that both were involved in the transaction.

Although not well publicised, for obvious security reasons, Garcia says there are several initiatives currently running in different financial institutions worldwide. “Africa in general and South Africa in particular are following this trend. The biometric technologies used depend on the business case, and are mainly fingerprint, facial recognition, and voice biometrics.”

While fingerprints are traditionally used for physical as well as logical access control for employees, banks are also now looking at using smartphones for voice recognition through calls and facial recognition via the embedded camera. He adds, “Mobility with biometric-embedded tablets and the integration of fingerprint readers in ATMs is also on the cards.”

Unbelievers still exist

When it comes to authentication, there are still those who say that fingerprint biometrics is not reliable because there are always people with ‘unreadable’ fingerprints and the criminal element is starting to figure out ways to steal or fool readers.

Garcia says that while fingerprints are the most convenient and adopted technology, like any technology, one must be aware of its strength and limitations. “In most of the cases, fingerprints work, but there are some conditions that make some fingerprints more difficult to use than others.

“If one fingerprint is not readable, there are still nine fingers that can be used. If no fingerprint can be read, it is then possible to add the use of a PIN code or card, or other biometric opportunities can be investigated.”

Facial biometrics has come a long way and it is now possible to authenticate yourself via your face. However, while the technology has improved dramatically, Garcia says financial institutions should adapt their security requirements based on the type of transaction.

“For instance, to check his balance, the customer could present his face. For more advanced transactions, like payments, two-factor authentication like face and fingerprint could be used. After a certain threshold, the transaction could also require a PIN code or another biometric verification, like iris verification.”

Whatever solution or combination of solutions one decides to use depends on the trade off you are prepared to make between security and convenience. The risks are self evident, and so are the solutions.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...