Page 46 - GS161202
P. 46

Education

     Multilayered authentication:
    challenges now, rewards later

By Evi Triantafyllides                                                     Pay's fingerprint authorization and Mastercard's
PAAY LLC                                                                   Selfie Pay) are heavily investing in such software.
                                                                           This trend is justified by the fact that inherent-
R emember when payment authentication was as                               based authentication is precise, as well as less er-
               simple as signing a check, the validity of which            roneous, more difficult to compromise and less
               was then confirmed by comparing it against …                time consuming for consumers than other meth-
               yet another signed document? The quest for a                ods.
less error-prone procedure has led to dramatic leaps in
precision, and the days of a single, simple authentication       Multilayered authentication, which involves using more
method are long gone.                                            than one type of authentication, is expected to play a part
                                                                 in bringing today's proliferating data hacks to a standstill.
With payment software development reaching unprec-               Pairing different authentication types is becoming
edented levels in the past years and a general evolution in      standard procedure, and two-factor authentication an
the fintech space, authentication is shifting to entail accu-    industry buzzword.
rate, sophisticated and multilayered procedures delivered
by diverse players within the payments chain.                    Authentication in the larger payments picture

Multilayered authentication                                      What does authentication mean in the grand scale of the
                                                                 payments arena? With MarketsandMarkets reporting a
Passwords, phone numbers, fingerprints, the name of your         19.7 percent annual increase in biometric authentication
father's great, great grandfather ? your entire DNA string       techniques, and with those expected to be valued at $10.8
please. In an effort to categorize the various authentication    billion by 2020, authentication is a space to pay attention
techniques that have come about, the generally accepted,         to, and one that will shape the future of how payments
three-tiered classification system has emerged. It includes      are done.
knowledge-based, ownership-based and inherence-based
authentication, described as follows:                            Moving away from the archaic, straightforward signature
                                                                 model has proven to be multifaceted and clunky, with
      •	 Knowledge-based: Authentication of this type            different authentication methods competing for legitimacy.
          relies on a "secret" piece of information a user       While there is no way to predict which authentication
          knows. Classic examples are PINs attached to chip      methods will become the norm, the path toward
          cards that are required at international POS sys-      sophisticated, manifold authentication is uncontestable.
          tems, passwords and personal details that can be
          answered as part of a "security questions" proto-      Eventually, rising costs of technology investments and
          col. This type of authentication can be criticized     escalating fraud levels will reach their peaks. Monetary
          on the basis that the information can be easily        investments will start to scale, and return on investment
          hacked, and providing it can be time consuming         will kick in, turning a double whammy of deficits into a
          for consumers.                                         double win of declining infrastructure costs and decreased
                                                                 fraud. Additionally, fraud liability will shift away from
      •	 Ownership-based: This is linked to something            customers and merchants (who will now be doing their
          the customer owns. Even though ownership-              share by participating in authentication programs), and
          based-authentication methods are safer since           accountability will increasingly fall upon card brands,
          hacking cannot be done on a collective level, the      banks and the devisors of authentication programs.
          drawback is that they are inconvenient for users,
          who always need to have the "authenticator" with       Indeed, what now seems to be a messy mix of varied
          them. Examples include showing a passport or us-       authentication tools should be appreciated as efforts
          ing your mobile phone for a specific action; recent,   towards securing a more profitable, protected payments
          more complex developments include QR codes             future.
          and RSA tokens.
                                                                 Evi Triantafyllides is the Marketing Director at PAAY, a software solution
      •	 Inherence-based: Often termed biometrics, this is       that qualifies e-commerce transactions at lower interchange rates and
          the latest, most technologically advanced authen-      shifts liability for e-commerce fraud away from merchants, to the card
          tication. It entails a process whereby customers       issuers. Evi was the first full-time employee at PAAY. She is responsible for
          themselves are the authenticators. Ranging from        the company's marketing, and at the same time focuses on ISO relations
          fingerprints to face or voice identification, biomet-  and partnerships. Find out about PAAY at www.paay.co or reach out to
          rics is steadily becoming the name of the game,        her directly at evi@paay.co.
          with indications this trend will soon prevail. Tech
          and payment giants alike (examples being Apple

46
   41   42   43   44   45   46   47   48   49   50   51