[09-17]customer identity verification-kyc know your customer

Random biometric authentication methods and systems


kyc security

Author:cdd experience    cdd financial crime

Keywords:+AI +powered +OCR,    sanctions compliance meaning,    aml due diligence checklist,    eidas requirements,    anti money laundering manual pdf,  identity verification software companies


Image-based liveness detection for ultrasonic fingerprints
A Biometric system recognizes an individual by measuring or analyzing his physical or behavioral body traits. In recent times, Facial recognition is one of the most commonly used biometric technology and is rapidly integrated in various applications such as security login or access to the buildings or surveillance etc. Facial recognition is also user friendly and cost effective solution than other technologies. Beside this, Face recognition system is also prone to the spoofing attacks such as placing photographs,playing video clips in front of camera and dummy faces.In order to guard the system against such spoofing attacks,liveness detection can be integrated into the system. Liveness detection in face recognition tests whether the face presented to the system is real face or a fake face.This paper presents the state-of-the-art of various liveness detection techniques in the area of face recognition technology along with their strengths and limitations.
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

Similar Articles