loader image
Close
  • Use Case
    • Banking and finance
    • E-commerce and retail
    • Telecommunications and media providers
    • Administration
    • Healthcare
    • Technology and IT
  • Types of activity
    • Account sharing and device sharing
    • Employee authentication
    • Hardware-free MFA/ 2FA for clients
    • Remote working
    • Compliance with PSD2, SCA regulations
    • Anti-fraud system
    • Detection of bots and remote desktops
  • Solution
    • Behavioural biometrics
    • Device Fingerprinting
    • PureSecure
    • MobileSecure
  • Knowledge zone
    • Onepgers
    • Presentations
    • E-book
    • Webinars
    • Video
  • News
    • Blog
    • Expert texts
  • Company
    • About us
    • About BIK group
    • Privacy policy
    • European union
  • Contact
  • Use Case

    Banking and finance

    E-commerce and retail

    Telecommunications and media providers

    Administration

    Healthcare

    Technology and IT

    Account sharing and device sharing

    Employee authentication

    Hardware-free MFA/ 2FA for clients

    Remote working

    Compliance with PSD2, SCA regulations

    Anti-fraud system

    Detection of bots and remote desktops

  • Solution

    Behavioural biometrics

    Device Fingerprinting

    PureSecure

    MobileSecure

  • Knowledge zone

    Onepgers

    Presentation

    E-book

    Webinars

    Video

  • News

    Blog

    Expert texts

  • Company

    About us

    About BIK group

    Privacy policy

    European Union Projects

  • Contact
  • English
    • Polski
    • English

  • Use Case

    Banking and finance

    E-commerce and retail

    Telecommunications and media providers

    Administration

    Healthcare

    Technology and IT

    Account sharing and device sharing

    Employee authentication

    Hardware-free MFA/ 2FA for clients

    Remote working

    Compliance with PSD2, SCA regulations

    Anti-fraud system

    Detection of bots and remote desktops

  • Solution

    Behavioural biometrics

    Device Fingerprinting

    PureSecure

    MobileSecure

  • Knowledge zone

    Onepgers

    Presentation

    E-book

    Webinars

    Video

  • News

    Blog

    Expert texts

  • Company

    About us

    About BIK group

    Privacy policy

    European Union Projects

  • Contact
  • English
    • Polski
    • English

Knowledge

What is Strong Customer Authentication and PSD2?

One thing that does not change is the expectation of changes to come.

What

European Banking Authority has released Payment Services Directive 2. It is an adaptation of the law to the current horizon of security threats to the customers in Europe. As of 13 January 2018 it replaces the directive 2007/64/EC. It will affect all of the citizens of the European Economic Area.

When

Payment Services Directive 2 will be enforced since 14 September 2019. The new push towards the security of customers gets mandatory on that date. There are trendsetting organisations that prepare to be compliant with the directive before the deadline.

Why

From our perspective, there are two goals of PSD2. Open the financial industry for interaction by opening the API’s. The other one is more important for us. Security of customers and their transactions will require Strong Customer Authentication (SCA) to minimise the number of frauds.

Strong Customer Authentication

Strong Customer Authentication is a new term that refers to the authentication of payments. That means there are new rules for all financial institutions that accept payments. Below we present three classic elements of authentication.

Something you know

  • Passwords
  • PIN’s
  • Sentences
  • Colours
  • Images or Icons

Something you have

  • Hardware Tokens
  • Hardware Smartcards
  • Scratch cards
  • Code books

Something you are

Biometrical traits such as

  • Fingerprints
  • Iris
  • Veins
  • Face
  • Behaviour

 

Text messages was the king

The most used method for authentication payments in Europe is by SMS code. According to PSD2, using text messages does not meet the requirements of Article 5 point 2 of PSD2 standard. Text messages provide neither integrity nor confidentiality of information that was sent to it with. There are multiple attacks such as SS7 or OpenBTS attacks that might further impact the security of the solution.

What are other options

Hardware smartcards

File:OpenPGP card 2.0.jpg

src: https://en.wikipedia.org/wiki/File:OpenPGP_card_2.0.jpg

  • Secure
  • Expensive,
  • People tend to lose them,
  • Management is a pain for the organisation,
  • Poor user experience.
  • Price (avg 10-40 EUR/user)

Hardware tokens

src: https://www.flickr.com/photos/bassplayerdoc/6245647402

  • Expensive,
  • People tend to lose them,
  • Management is a pain,
  • Poor user experience.
  • Price (avg 20-200 EUR/user)

Software tokens

Android

src: https://freeotp.github.io/

  • Poor User Experience. You need to unlock your phone, find the app and then type the code.
  • Requires additional applications
  • Secret protection is often weak

Hail to the new king

Behavioural Biometrics is considered compliant with SCA requirement. On the EBA website we can read

” Vendors of biometric solutions represent recognition rates between 96 % up to 99 % which are excellent results and that justifies behavioral biometrics as a second factor to ensure strong customer authentication. Since behavior based characteristics are device independent, it ensures that the PSU is always protected regardless of the environment. ”

Digital Fingerprints is happy to meet the requirements and be the invisible factor of authentication.

Your human computer interaction

Result in the score that reflects certainty that it is you that use the credentials.

 

Sources:

  • PSD 2 directive 
  • More about SMS and PSD2

First bank in Poland to launch Digital Fingerprints
Next Article

Digital Fingerprints © Copyright 2022
Created by <code-One>

Use Case

Banking and finance
E-commerce and retail
Telecommunications and media providers
Administration
Healthcare
Technology and IT

Solutions

Behavioural biometrics
Device Fingerprinting
PureSecure
MobileSecure
About us
About group
EU project
Privacy policy
Contact

Digital Fingerprints S.A. ul. Żeliwna 38, 40-599 Katowice. KRS: 0000543443, Sąd Rejonowy Katowice-Wschód, VIII Wydział Gospodarczy, Kapitał zakładowy: 128 828,76 zł – opłacony w całości, NIP: 525-260-93-29

Biuro Informacji Kredytowej S.A., ul. Zygmunta Modzelewskiego 77a, 02-679 Warszawa. Numer KRS: 0000110015, Sąd Rejonowy m.st. Warszawy, XIII Wydział Gospodarczy, kapitał zakładowy 15.550.000 zł opłacony w całości, NIP: 951-177-86-33, REGON: 012845863.

Biuro Informacji Gospodarczej InfoMonitor S.A., ul. Zygmunta Modzelewskiego 77a, 02-679 Warszawa. Numer KRS: 0000201192, Sąd Rejonowy m.st. Warszawy, XIII Wydział Gospodarczy, kapitał zakładowy 7.105.000 zł opłacony w całości, NIP: 526-274-43-07, REGON: 015625240.

Zarządzaj zgodami plików cookie
Aby zapewnić jak najlepsze wrażenia, korzystamy z technologii, takich jak pliki cookie, do przechowywania i/lub uzyskiwania dostępu do informacji o urządzeniu. Zgoda na te technologie pozwoli nam przetwarzać dane, takie jak zachowanie podczas przeglądania lub unikalne identyfikatory na tej stronie. Brak wyrażenia zgody lub wycofanie zgody może niekorzystnie wpłynąć na niektóre cechy i funkcje.
Funkcjonalne Always active
Przechowywanie lub dostęp do danych technicznych jest ściśle konieczny do uzasadnionego celu umożliwienia korzystania z konkretnej usługi wyraźnie żądanej przez subskrybenta lub użytkownika, lub wyłącznie w celu przeprowadzenia transmisji komunikatu przez sieć łączności elektronicznej.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statystyka
Przechowywanie techniczne lub dostęp, który jest używany wyłącznie do celów statystycznych. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Przechowywanie lub dostęp techniczny jest wymagany do tworzenia profili użytkowników w celu wysyłania reklam lub śledzenia użytkownika na stronie internetowej lub na kilku stronach internetowych w podobnych celach marketingowych.
Manage options Manage services Manage vendors Read more about these purposes
Zobacz preferencje
{title} {title} {title}