Skip to main content

POST Biometrics could be the nail in the plastic card's coffin

The combination o

FingoPay is cutting out the middlemen (the bank cards, the smartphones and smartwatches), to let you pay with – you guessed it – your finger.

From FingoPay: Move over Apple Pay, 'Blood Pay' is here

The use vein-scanning as the non-contact biometric.

xxx

I also told [the BBC], in the spirit of openness and integrity that is associated with the good name of Consult Hyperion throughout the civilised world, that we had been retained by Hitachi some years ago to carry out a study on the security of this product and its suitability for certain financial services applications.

From We'll be giving Barclays the finger next year | Consult Hyperion

xxx

xxx

Biometrics continue to advance in Japan with the news that Hitachi is teaming with Japanese issuer JCB to develop a biometric payment system based on its finger vein authentication technology that can be used as an alternative to cards and cash at the point of sale.

From Fingering suspects | Consult Hyperion

As you will see in this piece, I was sceptical about biometric identification at retail POS because back then the use of biometric authentication against a revocable token seemed like a much better solution to me.

2009

xxx

So, a plausible idea for son-of-chip-and-PIN, taking on board Max’s idea and merging it with our experiences gained implementing and doing security risk analysis for EMV schemes in a number of countries, might be as follows:

For micropayment, cash-replacement transactions: just wave the token (well, let’s say it, the mobile phone); For mesopayment, card-replacement transactions: enter the PIN, preferably into the mobile phone not the terminal, then wave the phone over the terminal; For megapayment, EFT-replacement transactions: enter the PIN, put the phone on the terminal and then put your finger in a vein scanner (such as the Hitachi system used in Japan).

This is a practical solution to the mass market use of biometrics, and you can make it work online as well by using challenge/response voice biometrics instead of vein scanning.

From The long and short of it | Consult Hyperion

xxx

Festival - put token on file for four days - use fingerprint - have it all deleted at the end

Comments

Popular posts from this blog

There is no excuse for not taking cards

So we went to the pub. For lunch. Seven of us. Say £20 per head. £100+ quid. Say £50 quid gross for the pub. Colleague goes to order food and drinks and pay at the bar. Apologetic barmaid comes over to explain that their “card machine” is down, so she can only accept cash. Under normal circumstances I would have simply walked out, feeling it wholly inappropriate to reward such a poorly managed establishment and, as a functioning actor in a capitalist economy, done my duty to depress their lunchtime takings. Here’s what we wanted to say: This is absurd. This is 2016 not 1916. Your card machine is down? Well, so what! Are you seriously telling me that mein host has no mobile phone number capable of registering for PingIt or PayM? That none of the staff or the pub itself have a PayPal account that I can send the money to? That neither the owners nor managers not contingency planners thought to tuck an iZettle behind the bar to use when the clunky and expensive GPRS terminal fails for o...

Financial Cryptography: Corda Day - a new force

Forum friend Ian Grigg, who I always take very seriously indeed on any such topic, wrote about Corda on his blog and concluded with a powerful statement. Bitcoin told the users it wanted an unstoppable currency - sure, works for a small group but not for the mass market. Ethereum told their users they need an unstoppable machine - which worked how spectacularly with the DAO? Not. What. We. Wanted. Corda is the only game in town because it's the only one that asked the users. It's that simple. From Financial Cryptography: Corda Day - a new force xxx It seems to me, however, what Ian is pointing to as the greatest strength of their approach is also the greatest weakness. A staple feature of unimaginative management consultants presentations about innovation is some variation on the statement by Henry Ford that if you had asked users what they wanted, they would have asked for faster horses coupled with some variation on the statement by Steve jobs that it was pointless ask...

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...