Remote user authentication

Slides:



Advertisements
Similar presentations
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Advertisements

M-PAYMENT SYSTEM (e–WALLET ).
Reaching Basic Financial Services to Rural India The Long & the Short of it.
The Impact of technology on the delivery of financial services Advancement in technology have had a profound effect on the delivery of financial services.
©2010 Galaz, Yamazaki, Ruiz Urquiza, S.C. "New Decree to facilitate tax compliance in México...[sic]". Digital Invoices. Control over deposits July 21,
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
A Survey of Risk: Federated ID Management in Cloud and Grid Computing Presentation by Andy Wood (P )
MIFOS TRAINING SLIDES. 2 KNOW YOUR CUSTOMER KNOW YOUR CUSTOMER It is the policy of (ENTER YOUR ORGANIZATION’S NAME HERE) to comply with the (ENTER REGULATORY.
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Identity verification in the private sector Chris Gration 30 March 2006.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Abcde Electronic Signatures and Certification Authorities Obligations, Liabilities and Responsibilities Michael Peeters Pinsent Curtis - UK.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Electronic Commerce Semester 1 Term 1 Lecture 18.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
AMLA 3 nd Annual BSA Conference BSA/AML HOT TOPICS October 4, 2013 Christopher Price Senior Compliance Manager, Regulatory Advisory.
The Challenges of Managing Microinsurance Schemes in Uganda Objective to analyze the challenges of managing micro- insurance schemes in Uganda. (i) Introduction.
Electronic identity management for eGovernment Conceptual framework and objectives Frank Robben General manager Crossroads Bank for Social Security Strategic.
1 Rethinking Branchless Banking in India Doug Johnson Centre for Microfinance.
Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Mexican Tax Administration Service Major Developments & Results September, 2006 Mexican Tax Administration Service.
Nixon P. Mahilum MABS Mobile Phone Banking Specialist Expanding E-Money Resellers in rural areas.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
September 11, 2001: Its Impact on the Insurance Industry.
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
Biometric for Network Security. Finger Biometrics.
OSIA Portal Project developing a portal for the future.
CROWNWeb FMQAI: The Florida ESRD Network. Introductions Oniel Delva, BA Communications Coordinator Renal RCT Team – Network 7 CROWNWeb.
Connecticut Interactive (CI) Customer Database Billing System (CDB)
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BANGLADESH Payza Account Verification: Bangladesh By Payza – Online Payment Processor.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
2 PSD2- C HALLENGES AND OPPORTUNITIES Pascale-Marie BRIEN– Senior Policy Adviser.
Biometrics in the Banking Industry
BaiRong Financial Information Services, Ltd. (100Credit.com)
FORGERY & FRAUD DETECTION USING BIOMETRICS Presented by: B.GOPINDRA(08TD1A0407)
Junli M. Awit, RN.  Enacted by President Bill Clinton in 1996  Title I of HIPAA protects health insurance coverage for workers and their families when.
UNHCR‘s Policy on the Protection of Personal Data of Persons of Concern - An introduction (October 2016)
Identity and Access Management
Mobile Banking – Risk Assessment
Health Insurance Portability and Accountability Act HIPAA 101
The Demand for Audit and Other Assurance Services
10 Patient Confidentiality and HIPAA
Facilitating trade and transport in a secure environment
BY GAWARE S.R. DEPT.OF COMP.SCI
State of e-Authentication in Higher Education Bernie Gleason
Cryptocurrency Mobile Wallet Development Company
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Cyber Issues Facing Medical Practice Managers
Computer-Based Processing: Developing an Audit Assessment Approach
Chapter 4 Law, Regulations, and Compliance
Simplifying and Securing Vendor Information
Other Sources of Information
ELECTRONIC PAYMENT SYSTEMS
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Articles of Association
Introduction to key terms and concepts of legal identity
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

Remote user authentication

Current state of remote authentication Amendment to provision of Federal Law #191 from 06/23/2016 Simplification of the process of opening bank account for companies Amendment to provision of Federal Law #115 from 12/30/2015 Introduction of the “simplified authentication” that can be used under limited number of circumstances Recent amendments to the Federal Laws are minor. There are limited number of ways to perform simplified authentication Recent changes in Federal Laws do not affect 22% of the population lacking bank accounts

Our proposal: Authentication using data from banks and telco’s Authentication using bank and telco data ESIA (ЕСИА) Slow rate of adoption and peneteration (only 15% of the population is covered as at beg. of 2016) People are required to visit ESIA office in person ID’s verification data cannot be used by outsiders (used exclusively by Public Service companies) Using partner network resources estimated coverage could reach 90% of the population Convenient way of authentication for users Banks and telco’s are motivated due to the payments coming from authentication procedures

Our proposal: Biometric authentication Simplified authentication procedure could be extended by the means of using biometry information: Helps to reduce degree of fraud risk Biometric authentication mechanism - usecase Person is applying for authentication services He sends the information required and provides his/her biometric data (photo, fingerprints, voice) Provided data is verified against the database (Immigraion service database for example) After the verification user is authorized in the system Положение об упрощенной идентификации  подразумевает, что сведения об идентифицируемом лице могут быть подтверждены и с помощью использования, например, системы ГИС, хранящий биометрические данные граждан Таким образом для введения подобной процедуры не требуется кардинальных изменений в законодательстве Simplified user authentication procedure reduces cost of rendering electronic services (banks, telco’s, public services) and leads to their higher penetration rate