Interviews
Q&A: THE IMPACT OF ENVIRONMENTAL CONDITIONS ON BIOMETRIC AUTHENTICATION.
Published
7 months agoon
By
admin
Joël Di Manno, Authentication & Biometrics Laboratory Service Line Manager and Abdarahmane Wone, Biometrics & AI Researcher at Fime.
User adoption of biometric authentication has accelerated in recent years, yet some users are still cautious. Fime is exploring ways to innovate on biometric evaluation to help solution providers to launch reliable and high-performance products. In this interview, Stéphanie Pietri, Communications Director at Fime, speaks to Joël and Abdarahmane about their scientific paper to learn more on the impact of environmental conditions on fingerprint systems performance.
Stéphanie Pietri: What is biometric authentication?
Joël Di Manno: Biometric authentication solutions utilize a person’s physical or behavioural characteristics, such as their fingerprint, face, or keystroke dynamics to verify their identity. Using biometric characteristics to authenticate someone provides a high level of security because these traits are unique to that person. It also provides a good user experience, as there is no need to remember long passwords. This can provide consumers with easier routes to make a payment or access a service.
However, the adaptability of biometric solutions can present challenges, as different conditions have the potential to increase false acceptance or rejection rates. This means that there is the potential for security to be compromised if non-genuine users can be verified, or the user experience will be impacted if genuine users cannot.
SP: What type of environmental conditions can influence biometric authentication?
Abdarahmane Wone: One of the challenges of biometric solutions is that environmental conditions can alter their performance. For example, if someone is using a facial recognition solution, changes in lighting or the background can influence its performance. Similarly, fingerprint systems can be affected when environmental conditions like temperature and humidity change, because the texture of fingerprints alter accordingly. This change can mean that the fingerprint does not match the reference fingerprint that was recorded during enrolment and therefore is not verified.
These environmental changes impact the performance, security, user experience and the trust of biometric systems. It is also important to note that not all biometric systems are impacted in a similar way. However, while we know that there is an impact, very little research has been done to assess the performance of biometric systems in different climatic environments.
SP: What did Fime do?
AW: To find out more about these impacts, Fime undertook some research to understand how humidity and temperature changes affect the performance of fingerprint systems. We tested the performance of three different third-party fingerprint authentication matchers in different climatic conditions. The aim was to see how accurate the algorithms were at matching the fingerprint samples taken during enrolment. The performance of the biometric systems was evaluated in six different conditions made up of a combination of two different temperatures and three different humidity environments. The different humidity and temperature environments were created using climatic chambers. After signing consent forms regarding European GDPR regulation, more than one thousand fingerprint images were collected from 17 volunteers.
SP: And what was the impact of these environmental factors on biometric authentication?
AW: We observed that all of the algorithms performed better when the environment was less humid. Importantly, we saw that the three algorithms were all impacted differently by temperature and humidity changes, demonstrating that the impact of environmental factors is not consistent across biometric solutions.
Also, the environmental conditions of the enrolment of the fingerprint samples made a difference. The algorithms all performed better when the environmental conditions were the same as those during enrolment of the fingerprint samples. Again, we saw that the three products were all impacted differently when the verification was done in an environment different to the enrolment environment. While two of the products differed less than 1%, the third product differed by 24%. This shows that the product could present high security risks and/or a bad user experience for consumers. This study highlights the importance of a comprehensive enrolment guide for vendors and users, to decrease the impact of environmental conditions as much as possible.
SP: What can be done to mitigate the impact of these conditions on biometric authentication systems?
JDM: Fime has now developed a process and identified parameters to evaluate environmental impact, thanks to the research project. The results of this research demonstrate that environmental conditions can have differing degrees of impact on biometric authentication systems. Therefore, testing the performance of biometric solutions in different environments, including different conditions between enrolment and verification, could prevent real-life issues. Certification schemes could introduce this aspect into their evaluation programs to ensure security in various conditions and decrease variance between different biometric solutions.
Biometric solution vendors can use this evaluation during their own quality assurance processes. By performing testing in this area, they can fine-tune solutions to mitigate the impact of environmental conditions. This will verify that their products can be deployed globally and will perform well in different climates. By taking these factors into consideration, they can enhance the trust, security, performance and user experience of their solutions. This may give them the ability to outperform competitors who are not considering the impact of environmental factors when developing their solutions.
Interviews
How MFA can protect the financial sector from the unprotectable
Published
2 weeks agoon
June 21, 2022By
admin
The financial sector has long been a primary target for threat actors. However, the unique infrastructure of core financial systems means these critical resources often fall outside the scope of standard security solutions.
Multifactor authentication (MFA) is one such solution. We ask Yiftach Keshet, Director of Product Marketing at Silverfort, what are the limitations of traditional MFA to the finance industry, and what can be done to start protecting these unprotectable core systems.
Q: What are the security challenges with traditional MFA?
Multifactor authentication (MFA) has become something of a default secondary line of defence against credential theft. Requiring users to input two or more verification factors in addition to their username/password combination makes it much more difficult for threat actors to simply access the network with credentials stolen through phishing or a previous breach.
However, the system is far from perfect and presents several challenges. One issue is that MFA is rarely fully supported by legacy banking infrastructure or command-line access to servers and workstations.
Kerberos and NTLM, two of the most common authentication protocols in on-premises environments, don’t support MFA. As such, an attacker that has infiltrated the network and managed to obtain user credantials will be able to access critical servers without going through the MFA process.

Yiftach Keshet
Alongside this, traditional MFA is usually deployed at the resource level. In a high-scale environment it practically means that full coverage of all resources with agents or proxies will never take place. Additionally, as businesses continue to grow their digital footprints, the resources required to deploy, configure and maintain MFA quickly increases. This can quickly become unmanageable, particularly in the financial sector where digital transformation has been a leading priority for the last few years.
As a result of these issues, core banking resources are often excluded from MFA protection. This greatly increases the organisation’s risk exposure, as threat actors that make it inside the network may potentially gain full access to critical systems with few effective checks or barriers.
Financial organisations need to change their approach to MFA if they are to close this critical gap in their defences.
Q: How can these challenges be overcome?
The shortcomings of traditional MFA can be overcome with a new model known as Unified Threat Protection. Rather than being applied individually at a resource level, this is an agentless, proxyless approach that natively integrates with the organisation’s Active Directory and Identity and Access Management (IAM) solutions. This means it can be uniformly applied to continuously monitor, analyse and enforce MFA policies across the entire environment.
Because all authentication requests are handled through the organisation’s IAM solution, directly integrating MFA at this point solves the coverage problem. Not only is it far easier to scale MFA as the organisation’s IT footprint expands, but an MFA layer can now also be applied to core banking infrastructure that was previously unprotected.
Q: What are the use cases for using MFA to improve safety practices for banking?
There are multiple financial use cases that stand to benefit from the Unified Threat Protection approach to MFA.
The first and foremost of these, is the access to the banking applications that don’t natively support MFA today. This new approach enables them for the first time to obtain the same level of secure access that modern SaaS applications have.
Remote access tools, for example, have become extremely important in the new world of remote and hybrid workforces. However, because standard MFA typically needs to be deployed individually to each endpoint, it is common to find many machines in the environment are not protected, creating a critical attack path for threat actors. The new agentless MFA model can be directly integrated with Active Directory, ensuring that all machines are equally protected, regardless of location.
In another example, admins at financial institutions typically use command-line tools such as PsExec, Remote PowerShell, and WMI for configuring, managing and troubleshooting machines in their environments. However, these same toolsets are exploited by threat actors to spread ransomware and achieve lateral movement. If the authentication protocol of command-line tools is not protected by MFA, attackers can use these tools to access and manipulate the system.
Again, the agentless and proxyless nature of the Unified Threat Protection model closes this gap as all core systems will require MFA, significantly slowing or even completely stopping any threat actor within the network.
Q: How a bank can bolster their cyber resiliency against ransomware with MFA?
Ransomware has begun to dominate the threat landscape in recent years. Financial organisations have a lot to lose, because a ransomware outbreak rampaging through their core systems could cripple the enterprise and cost millions in lost business and recovery efforts – even before factoring in legal and regulatory impact if customer data is compromised. File shares are a common method for accessing systems and propagating ransomware to increase its impact.
Traditional MFA has proven to be ineffective against the threat of ransomware, as it cannot be applied to file shares managed by a CIFS (Common Internet File System) authentication protocol. However, a Unified Identity Protection MFA can cover this gap as it can apply coverage through Active Directory, regardless of which protocols are being used.
Interviews
Finance Derivative Interview with James Burton senior director of product management at LexisNexis Risk Solution, Insurance, U.K. and Ireland
Published
2 weeks agoon
June 17, 2022By
admin
- What led you to move from the financial services sector to insurance?
I worked as a market analyst and global derivatives trader for three years then moved into banking for close to five years before a brief stint at a data and technology company. The switch to insurance came about for several reasons.
Firstly, the banking sector is relatively mature in its use of data and I could see how transformative data and technology could be for the insurance sector – I wanted to play a part in that.
Secondly, LexisNexis Risk Solutions was still a relatively new brand in the UK insurance market when I joined, although the business had a 40 year plus history in the U.S. The position of head of data analytics was a fantastic chance to work for a business with a clear vision to deliver innovative data and technology solutions to help insurance providers better understand risk.
Thirdly, I could see the massive potential of contributory data solutions in insurance so that the whole market has an opportunity to benefit. Obviously the more contributors you have on board, the more powerful the database becomes. Close to 100% of the motor insurance market is now contributing to our Motor Policy History Database and benefiting from digitised No Claims Discount proof. We intend to repeat this success with our claims database for home, motor and commercial.
- Are there parallels to be drawn between customer verification processes in banking and those now being used in Insurance?

James Burton
Yes, while insurance providers aren’t subject to all the same Anti Money Laundering and Know Your Customer regulations as lenders, the sector is experiencing high levels of fraud and this has driven innovations in data solutions to validate the applicant, customer or claimant is who they say they are, at speed, at each part of the customer journey. Solutions such as email address-based fraud risk scores and our unique customer identifier stem from identity solutions that have been used with success in the banking sector.
- How much have the new pricing rules in insurance changed the way insurance providers use data enrichment services?
Insurance providers must now ensure the consumer’s risk is assessed as accurately as possible and in-turn priced fairly, using the same processes and data the insurance provider would use at new business. As a consequence we are now seeing an increased demand for data enrichment at renewal. Crucially, insurance providers can now use one point of access to data enrichment rather than calling out to multiple data sources, to allow risk assessment at individual, asset, household and postcode level with intelligence delivered on all individuals associated with the quote in a single transaction.
- What do you believe have been the most exciting innovations in the insurance market in the past year?
The insurance market is constantly innovating in response to the changing needs of customers. The emergence of short-term insurance solutions is a good example and an area we are watching closely.
Clearly the more accurate and actionable data at your fingertips the better you can price a quote – whether for a day’s cover or a year – help customers mitigate risk or settle a claim.
The availability of Advanced Driver Assistance Systems data at quote has also been a big change for the motor insurance market. Having this data at a Vehicle Identification Number level gives insurance providers a much clearer indication of the risks associated with a specific vehicle. The availability of this data at the VIN level is a true industry first and one that only grows in importance and value as more cars come fitted with ADAS as standard.
- Fraud is being highlighted as a rising challenge for all parts of the financial services market – how do you think this will play out in insurance specifically and what are the possible solutions?
The pressure on household finances this year has been well documented and insurance providers are all too keenly aware of the environment this can create for fraud at application and claim. Aviva confirmed recently that it had identified fraud on more than 20,000 motor policy applications. Of these, ghost broking accounted for 15% of all the application fraud detected[i]. One of the tactics used by ghost brokers is to buy a cheap policy using fake details with the victim buying the policy listed as a ‘named driver’.
This scheme underlines the importance of validating the identity of named drivers to the same level as main proposers, exploiting the latest advances in swift, front-end fraud detection to flag any links to past fraud and highlight if the information provided for a quote may have been manipulated for a cheaper premium.
At claim, soon insurance providers will have access to a whole raft of data enrichment solutions to better understand risk, including highly granular claim history data gathered from across the market. This is set to provide a real step-change in understanding the risk of fraud at first notification of loss (FNOL).
- Affordability of insurance is going to be a key concern for the insurance market given the cost-of-living crisis – how can data help insurance providers in this regard?
The insurance sector will be looking at how it can offer greater flexibility and convenience to customers where payment options are concerned, particularly in the case of mandatory insurance. By bringing in insight on premium affordability based on credit data, as part of the quote process, insurance providers can help ensure customers get the correct insurance protection with the option to pay the premium in a way they can afford.
Ultimately, doing the right thing for customers comes down to ensuring you understand their needs as fully as possible at the point of quote and claim. In this way you can turn what is essentially a mandatory purpose into something individuals really value. Supporting insurance providers in this regard through data and technology is what we do all day every day.
[i] https://www.aviva.com/newsroom/news-releases/2022/05/insurance-claims-fraud-up-by-13percent-in-2021/
Magazine
Trending


Four ways traders can manage risk
By Dáire Ferguson, CEO at AvaTrade Understanding the markets in which you are trading is incredibly important to optimising...


Pro Tips To Consider Before You Decide To Refinance Your Vacation
Refinancing debt is when you attempt to apply for a new loan or debt instrument. The goal is to get...


The Rise of the Modern CFO: A Leader for the Information Age
Adam Zoucha, Managing Director, FloQast EMEA Financial management is one of the oldest professions in the world, and for...


Out of office, home and away, moving up, moving on; when security goes AWOL
Steve Bradford, Senior Vice President EMEA, SailPoint The financial services industry has one of the highest rates of insider...


Looking to the future: How the insurance sector can meet new customer demands
By James Harrison, Head of Insurance at Dun & Bradstreet It’s been over two years since the pandemic began,...


How IT optimisation can reduce costs and increase efficiency for businesses
by Alan Hayward, Sales and Marketing Manager, SEH Technology In today’s digital world, business success is centred around technology....


How Strong Customer Authentication can Prevent Cart Abandonment
Sham Careem, Telecom Solutions Consultant, Infobip In 2020-21, UK residents and businesses lost over £2.5bn to fraud and cyber-crime....


OneID® is now a certified Digital Identity Service Provider (ISP) under the UK Digital Identity & Attributes Trust Framework (DIATF)
OneID® is now a certified Digital Identity Service Provider (ISP) under the UK Digital Identity & Attributes Trust Framework (DIATF)...


Lack of corporate disclosures forces asset managers to cast a wide net for ESG data
Buy-side financial services firms using an average of close to ten ESG sources today More than seven out of...


Why mid-sized businesses are the driving force behind global B2B payment innovation
By Spencer Hanlon, Head of Europe, Nium Change is coming to global B2B payments, and it is being heavily...


Finance brands need a new approach in the Privacy-first era
By Richard Wheaton, UK MD of global data company fifty-five Trust is a brand value that pertains to every...


Why You Should Work on Your Financial Literacy
Ebo Aneju A lack of financial understanding plagues our society. Most people have very little understanding of finances, which...


A new beginning for financial services B2B marketing
Michael Richards, Managing Director, alan agency Financial services B2B marketing is dead. A bold statement with B2B ad spend...


Boosting Blockchain Security with Graph Technology
Dan McGary is Senior Sales Executive for Mid-Market Enterprise East at graph database leader Neo4j As blockchain-backed cryptocurrencies become...


Need a business broadband package? Here’s what you need to know
Author: Kerry Fawcett, Digital Director at Radius Payment Solutions Does your business have a broadband supply that is speedy,...


Double and triple extortion tactics cornering financial services organisations
By Ian Wood, Senior Director and Head of Technology, UK&I at Veritas Technologies Ransomware continues to keep those in...


How are Variable Recurring Payments set to revolutionise the future of banking?
Sean Devaney, Vice President of Banking and Financial Markets at CGI UK The adoption of Variable Recurring Payments (VRP)...


Energy Storage Represents Latest Investment Opportunity in the Clean Energy Transition
Alan Greenshields, Director of Europe, ESS Inc. The ongoing transition to clean energy has spurred new technologies, new markets and...


Innovate UK £25 million up for grabs: July deadline approaching
By Emma Lewis, Myriad Associates The latest instalment of Innovate UK’s SMART grant competition was launched in April and...


Is telephone Hot Desking really needed anymore?
By Simon Horton, VP of International Sales at Sangoma The world of work has totally transformed as we all...

Four ways traders can manage risk

Pro Tips To Consider Before You Decide To Refinance Your Vacation

The Rise of the Modern CFO: A Leader for the Information Age

Out of office, home and away, moving up, moving on; when security goes AWOL

Looking to the future: How the insurance sector can meet new customer demands

How IT optimisation can reduce costs and increase efficiency for businesses

RBI’s MASTER DIRECTION ON DIGITAL PAYMENTS SECURITY CONTROLS

EMV® 3-D SECURE: ENABLING STRONG CUSTOMER AUTHENTICATION

HOW TO SIMPLIFY IDENTIFICATION IN THE GLOBAL DIGITAL ECONOMY WITH THE LEI

EXEGER – CHANGING THE PERCEPTION OF POWER

FUTURE FX PROMO

FutureFX Profile
Trending
-
Finance4 days ago
Mass crypto adoption: are seamless card payments the missing link?
-
Finance3 days ago
Boosting Blockchain Security with Graph Technology
-
Business4 days ago
Is telephone Hot Desking really needed anymore?
-
Top 103 days ago
Energy Storage Represents Latest Investment Opportunity in the Clean Energy Transition