How should location fit into a mobile authentication strategy?

90% of legitimate logins happen at Trusted Locations, making location the strongest trust signal on mobile

Mobile authentication is challenging because it often forces app developers to choose between security and user experience. Today, most fraudulent transactions originate on mobile devices, but at the same time, mobile users are much more likely to abandon apps due to friction.

On mobile, making use of device, network and location data, can contribute directly to reducing friction during the authentication process, and detecting account takeover with ease. For example, working with Fintech customers we have seen more than 90% of logins to financial services Apps happen from a Trusted Location, a place that is frequently visited by the user like home or work. Understanding the user context makes it possible to to adjust authentication requirements based on associated risk levels, balancing fraud detection with user experience.

So how can we build secure and frictionless authentication solutions for mobile apps making use of location and device intelligence to understand user context?

Step 1: Identify the user's context

On mobile, the user's context can be identified by leveraging the data collected from the user's session, including device, network and location data. 

Device: Identifying the user's mobile device is the first important step in identifying the user’s context. A known device with good history is the first sign of trust. One challenge with device intelligence is that fraudsters are increasingly using tools and techniques, such as mobile emulators, to mimic devices. To be effective a fraud detection system should be able to detect mobile emulation and other device manipulation techniques.

Network: Network data is another type of data relevant to a user’s context. If the user is on a mobile network, the phone number can be frictionlessly verified using data provided by phone number intelligence companies, and if the user is on wi-fi, fraudulent activities can be mapped to specific networks. 

Location: Finally, the mobile device’s location data should be used to identify if the user’s current location is part of their normal behavior pattern. IP data is the least precise form of location data but can be sufficient depending on the use case. GPS, when available, is more effective. The main issue with IP location and GPS is that fraudsters use tools like VPNs, proxies, GPS spoofing apps, and mobile emulators to fake their location easily.

While there are other relevant data, these three categories of context data: device, network and location data, provide the strongest signals for mobile authentication.

Step 2: Define levels of risk based on the context data

Each category of user context data should be weighted dynamically as you verify each data’s efficiency at identifying legitimate customers from fraudsters. Here are some examples of different risk weighting combinations:

No alt text provided for this image

Step 3: Weigh the level of contextual risk with the level of transaction risk.

Now it's time to weigh the risk related to the transaction. This should be based on the financial and reputation risk of each transaction.

Examples of transactions that should be weighted differently:

No alt text provided for this image

Step 4: Define the level of friction introduced for each risk level

Once each variable has been weighted, it’s time to consider the different levels of friction appropriate for each risk level. Keeping friction low is essential. A bad review in the App store or Reddit could be more damaging than fraud’s direct financial costs.

No alt text provided for this image

Step 5: Measure and optimize with context data

After implementing the first version of weighting for the context data, you should continuously monitor the results and adapt accordingly. Every business is different and attracts different types of users and fraudsters. Your weighting should be based on the level of risk and friction, as well as the precision of the solution and its cost.

Fraudsters are continually retooling and changing their techniques. Any fraud prevention solution needs to evolve similarly to detect emulator attacks, location spoofing, SIM swaps, BOTs, and other evolving techniques. Attackers constantly improve and add to their toolkits, and fraud prevention solution providers, like Incognia, need to improve their defenses continually. It's a never-ending war against fraudsters, but we’ve got your back.

_____________________________________

To learn more about risk-based authentication using Incognia read more here>>

Júlio S.

Inovador Líder em Ciberseguran?a | Virtual CISO & CTO | LLM security | Gen A.I Security | Artificial Intelligence security | Especializado em Solu??es de DevSecOps, AppSec e Infosec

3 年

Good stuff!?

回复
Mitul Parmar

Co-Founder & CEO @ Mint, the new standard for US crypto events

3 年

Good stuff André

要查看或添加评论,请登录

André F.的更多文章

  • Introducing the Incognia Frontline Report: Gig Economy Edition

    Introducing the Incognia Frontline Report: Gig Economy Edition

    It’s a wild time in the gig economy fraud space. Fraud is draining millions from gig economy platforms.

    1 条评论
  • ELF: The Persistent Signal Fraudsters Can’t Erase

    ELF: The Persistent Signal Fraudsters Can’t Erase

    Let’s acknowledge the obvious: Fraudsters don’t typically stop after a single infraction. They often commit as many…

    1 条评论
  • Continuous verification should actually be continuous

    Continuous verification should actually be continuous

    Continuous verification should actually be continuous. It sounds pretty straightforward, but many companies don’t treat…

  • Fraud prevention needs a collaboration power-up

    Fraud prevention needs a collaboration power-up

    Many platforms deal with their fraud problems in isolation. They’re not collaborating with other platforms to better…

    2 条评论
  • Don't fight fraud with your offline brain

    Don't fight fraud with your offline brain

    Why do many companies default to selfies for user verification?” When I got this question recently, it helped me…

    5 条评论
  • Just let them commit fraud

    Just let them commit fraud

    Predicting whether a user will commit fraud can be really tough. You may be better off just letting them do it.

    1 条评论
  • Fraudster Intel: How they find vulnerabilities to exploit

    Fraudster Intel: How they find vulnerabilities to exploit

    How do fraudsters find their exploit points? Looking to forums and chat groups tells us—they test. To help you picture…

    4 条评论
  • Lessons from a fraudster

    Lessons from a fraudster

    I don’t admire fraudsters. But I do respect their persistence.

    1 条评论
  • More data isn’t always better

    More data isn’t always better

    In fraud prevention, the problem is usually not a lack of data. We have so many signals available to us, they’re coming…

    1 条评论
  • Closing the fraud prevention time gap

    Closing the fraud prevention time gap

    What’s the “time gap” in the world of fraud prevention? It’s the time between the emergence of a new threat and the…

    7 条评论

社区洞察

其他会员也浏览了