Using Piometric fingerprint in Identity verification in bank transactions using mobile phone

Using Piometric fingerprint in Identity verification in bank transactions using mobile phone

As the world is increasingly becoming a more digital society, managing passwords for many people has become a serious problem. Important financial institutions such as banks need to develop bio metric fingerprints to authenticate users of mobile banking services in the context of balancing insurance and ease of use.

For banks, one of the main objectives of the shift towards digital services is to modify the procedures used to conduct online banking operations towards simplicity in order to improve the services provided to the user. One of the obstacles in this regard is the process of verifying the password required to access the bank account of the customer via mobile phone. Achieving balance is difficult as there is a need to improve access to accounts due to increased data penetration and theft, with greater ease of use for applications.

The main problem with this is the existence of many services that can be used to obtain mobile phone related to bank accounts, which requires the use of many passwords, which may be difficult to remember all and remember which is used in any of those applications and so in Within five years each user will have more than 200 accounts that need passwords, which will be a real challenge for users of online banking accounts as well as all the financial services that can be obtained through the Internet. In order to solve these problems, a more serious solution has been taken to these accounts It is a single password for all applications used by users to access their accounts, which easily threatens to penetrate those accounts where hacking any of them will be hacked all of them because the use of different passwords increases the level of perceived protection and security of those accounts with the relative ease of use and use Advanced technology for generating more complex and dynamic passwords enhances the security of these accounts and reduces the chances of penetration. This technology also allows saving passwords to access accounts, which represents a safer option and also more complicated for the user Yen.

According to a research study conducted by Telesign, it was found that 73% of adults in the United States and the United Kingdom use the same password for everything. In addition, more than half of consumers (54%) uses five or fewer passwords across their entire online lives, while only 22% use three or less. The study also found that 47% of consumers rely on a password that has not been changed for five years.

The fact is that the problem is that even with the best systems and password authentication there is no reliable standard. Especially in light of the evolution in the use of online banking services, which led to users need to create additional passwords when you forget the basic password, which requires additional burdens and hardship on the user

Keywords alternative password:

Response by banks and credit unions should not receive the criteria that are considered passwords are the only way to insure. So, first, we need to determine which means ensure the security and reliability of users and protect sensitive information? In this regard, we find many alternative methods that are used to achieve reliability and security for users on their accounts. It is known that the traditional username / password. Is the most understandable and reliable method for most users. This method may be less secure because of the way passwords are set up and restored when forgotten, which is often a very complex issue to use.

Traffic phrases: often more secure than passwords, and it is easy to remember. The only problem here is that they need more typing which can be difficult when using a mobile phone. Traffic has been used since the establishment of bank statements online services.

Dual Authentication: After the username / password is validated, a unique code or URL is either emailed or written to someone trying to sign in. Google This option, which works used as long as the user's phone nearby.

Social login: Uses a third party service or application with Facebook, LinkedIn or Twitter. While easy to use, your user needs a social media account, and social media trust does not work in an environment that may block social media sites

Biometrics: Using fingerprints, retina scans, face recognition, voice recognition and more is where it seems to be more credible. While the vast majority of advances in this field are in laptops, computer peripherals, etc.

Connected devices: It is the use of a device that is connected to another such as a mobile phone to connect to the bank via the Internet (or similar) and actually authenticate a person. For example, use a mobile phone to authenticate the use of the computer in online banking

Regardless of the procedures, we need to reduce the problems that occur when you log in to their accounts. While there are many options there is no specific way generated on its own in the digital age and can be considered a specific criterion in this regard, the question here is that Users want to feel safe when they access their online accounts and want to feel secure about their data because if we do not have the means to authenticate data and make sure that access data is secure and secure, customers will lose confidence in the whole system.

Switch to bio metric fingerprint:

According to a report by Deloitte, many users of online banking services have switched to biometric fingerprinting on mobile phone. The report found that 31% of those aged 18-24 are opposed to 8% Who are over the age of 65 The report indicated that by the end of 2017 there will be one billion users of the biometric fingerprint in the verification of personal access to bank accounts via mobile phone

The large banks use biometric fingerprinting system to check customers' access to their online accounts in order to improve security and reduce the chances of penetrating bank accounts of their customers and access to their personal data, as it is difficult to imitate the fingerprint and on the other hand It is easy to use it. Apple Mobile has been a pioneer in this regard since it has been provided with this feature for some time, which makes it easier to use the bank account over the Internet and can be expected to end the use of digital passwords in a few years, while the footprint system introduced biometric M Access to bank accounts using biometric fingerprints on the mobile phone made it possible to carry out money transfers and conduct bank transactions using it and asked for the use of passwords when transferring funds or paying bills. Some banks also use the site tracking system with biometric footprint to ensure that the user is the owner In a 50-page report on digital banking safety standards, the use of the biometric footprint mediated this study. The study showed that most banks tended to rely on biometric fingerprinting to provide The study focused on the use of personal identification technology on page 31 of the report. Safety and identity depend on the balance between security and identity. Six out of every seven banks have used biometric fingerprint authentication when dealing with a bank account on a mobile phone while fewer English banks have used the face, eye or voice recognition system.

Most service providers in the United States and Australia have completed a personal authentication system using a biometric footprint when dealing online with a mobile phone. The system has completed the use of an eye fingerprint, where an image is taken of the customer's eye using the mobile phone when preparing his bank account on the phone Which protects the user's data and ensures his identity when accessing the bank account.

要查看或添加评论,请登录

Prof. Hossam Elshenraki的更多文章

  • Smart Homes and IoT (Looking ahead)

    Smart Homes and IoT (Looking ahead)

    The technological development that accompanied the end of the twentieth century and the beginning of the twenty-first…

    4 条评论
  • Face recognition systems

    Face recognition systems

    an introduction The mind can identify the faces we see and we can know if we have met this person before or not, but in…

  • "Smart Contracts and Blocking Technology" Towards more reliable and less risky contracts Dr. Hossam Mohamed El Shenaraki (Professor of Information Sec

    "Smart Contracts and Blocking Technology" Towards more reliable and less risky contracts Dr. Hossam Mohamed El Shenaraki (Professor of Information Sec

    Smart contracts: self-executing contracts with the terms of the agreement between the seller and the buyer are…

  • Fraud via Internet

    Fraud via Internet

    Fraud crimes are not recent, they are impregnated in the past, but they are crimes whose images, patterns, methods and…

  • How Terrorist Groups Recruiting Youth

    How Terrorist Groups Recruiting Youth

    One of the most important aims of terrorism is to bring about the terror and panic in the hearts of as many people as…

  • Cyber War & Security Measures

    Cyber War & Security Measures

    There have been major developments in recent years in the techniques used and the consequent uses that required similar…

  • cyber security and the digital wealth

    cyber security and the digital wealth

    Cyber security touches the security of the digital and cultural wealth of people, organizations and countries. The…

  • The requirements to Shift To the E-Justice System

    The requirements to Shift To the E-Justice System

    The transition to e-litigation requires a shift in the system of litigation from the traditional system that has been…

  • Protecting data in Smart Cities

    Protecting data in Smart Cities

    By Dr. Hossam Morsy Smart technologies can help cities deal with emerging challenges, in terms of technical innovations…

    1 条评论
  • Cloud computing and Big data

    Cloud computing and Big data

    By:Dr. Hossam Nabil The massive collection of data by using the technology and services that are use to extract the…

社区洞察

其他会员也浏览了