SlideShare a Scribd company logo
1 of 26
Download to read offline
IDENTITY-AS-A-SERVICE IN
A MOBILE WORLD
Cloud Managementof Multi-Modal Biometrics
§  Headquarters in San Diego, CA
§  Offices worldwide (US, Canada, Germany, Mexico)
§  Over 15 years of experience in biometric identity management, law enforcement,
border control, airport security, biometric smart-cards, military, intelligence, and
more…
David Harding
Chief Technology Officer & Vice President
dharding@iwsinc.com
ImageWare®
Systems, Inc.
IWS Has Been the Pioneering
Force and Established Innovator
in biometric security for over 15 years, with a strong
installed-base, providing advanced solutions to:
§  San Bernardino County Sheriff’s Department
§  U.S. Department of Veteran Affairs
§  Country of Mexico¹
§  LAX – Los Angeles World Airports
§  Arizona Department of Public Safety
§  Canadian Air Transport Security Authority
§  New South Wales Police (Australia)
¹Indirect via a prime contractor partnership
“KILL THE PASSWORD:
WHY A STRING OF
CHARACTERS CAN’T
PROTECT US ANYMORE”
Wired Magazine Recently Ran the Headline....
MOBILE DEVICES ARE EVER-PRESENT
AND ARE REPLACING THE PC
“Almost 40% of Americans used smart mobile devices for
banking and purchases”
– Source: Federal Reserve 2012
“Android devices are expected to almost triple over 5
years, while iOS could grow about 140%”
– Source: Gartner Group 2013
– Source: U.S. Federal Reserve Bank 2014
6
“Among consumers who do not use mobile financial
services, the principal reasons cited for not using the
services are perceptions of limited usefulness and
benefits, and concerns about security.”
SECURITY REMAINS THE BIGGEST CONCERN
Cloud Computing and
The Pervasive Growth
of Smart, Mobile
Devices
has made secure
identity authentication an
absolute necessity.
And an essential reality.
THAT REALITY IS
MULTI-MODAL BIOMETRICS.
8
MULTI-MODAL BIOMETRICS UNITES
MULTIPLE BIOLOGICAL TRAITS TO
SECURELY CONFIRM AN IDENTITY
Face
Hand Geometry
Signature
DNA
Voice
PalmFinger Veins
Iris
Fingerprint
Behavioral
Retina
MULTI-MODAL BIOMETRICS OFFERS
A GREATER LEVEL OF SECURITY
Single-modal biometrics, historically
and effectively, have serviced a defined
and limited-size populous and situation.
Multi-modal biometrics can be used
together and/or singularly based on
the situation and environment.
THE U.S. GOVERNMENT CONFIRMED MULTI-
MODAL BIOMETRIC IDENTITY MANAGEMENT
AS THE ONLY WAY TO MOVE FORWARD.
FBI, Dept. of Defense, Law Enforcement, International Civil Aviation
Organization, Homeland Security Presidential Directives 5 & 12
Multi-Modal Biometrics Will Become as
Ubiquitous as Smartphones
Mobile devices are the
perfect biometric
capture device.
We have them with us.
They give us access
to services and data
anywhere anytime.
Issues to Mobile Biometric Adoption
§  Match-on-Device vs. Match-in-Cloud
§  Scalability
§  Reliability
§  Security
§  Modality Selection
§  Maximizing Identity Verification Services
§  Ease of Use
Match-on-Device
Susceptible to:
§ Theft of biometric enrollment
§ Replacement of biometric enrollment
§ Reverse engineering of biometric template
(“hill-climbing attack”)
Does not support:
§ Enroll once, use on many applications
and devices
§ Duplicity check for enrollment verification
§ Transfer of biometrics to new devices and/or
applications
Does not scale and is not trusted!
Match-in-Cloud
§  Single, secure biometric enrollments for each modality
§  Single, trusted source for biometric identity verification
§  Device independent – enroll once, use on any device
§  Service and application independent
§  Use the right biometric for the situation and environment
§  Use multiple biometrics for “high-confidence” required
transactions and to prevent “spoofing”
What’s Needed to Make it Work?
A real-time, high performance, highly
scalable, multi-modal, biometric
database
Must support today’s technology as
well as tomorrow’s
Must scale to support large
populations
Must support anonymous verification
GoCloudID™
– The Scalable, Cloud-based,
Biometric, Identity Management Platform
§  Reliably manages access to biometric enrollment & verification
§  Can be used as an end-to-end or modular solution
§  Offers full and anonymous identity management
§  Conveniently enables applications on all mobile devices
§  Deployment is rapidly integrated, flexible & scalable
§  Operates as a multi-tenant system
§  Web portal is customer/partner provisioning
§  No start-up costs
§  Pay-as-you-go and scale-as-you-need
The Only Multi-Modal CloudID SaaS/PaaS License
and/or Subscription Service Today
IWS’s Patented Biometric Engine®
2.0,
the backend database of GoCloudID, delivers revolutionary capabilities
§  Enrollment, identity & verification management of
unlimited population sizes
§  Hardware & algorithm independent processing
§  Compatibility with all biometric products
§  Future-proof, plug-n-play flexibility
§  Full and anonymous biometric identity verification
§  Software development kits
License and/or subscription service offering
as part of GoCloudID™
IWS’s Patented GoMobile Interactive™
The Cloud-Based, Interactive, Push Messaging Server for Mobile
§  Pushes interactive messages to mobile devices
§  Customized message workflows and integrated
biometric identity authentication
§  Software development kits for rapid integration
§  Server
§  Mobile applications
§  Enables in and out-of-band identity
authentication
License and/or subscription service
offering as part of GoCloudID™
Making it Work in the Real World / Example -
Out-of-Band Authentication
Out-of-Band Authentication uses a mobile
device to verify the identity of someone who
is attempting to access data or services
Biometrically enables:
§  Website logins
§  HTML5 mobile applications
§  Mobile wallet and credit card transactions
§  Loan applications
§  Anytime you need to verify an identity
Steps to Biometric Verification Using a
Mobile Device using Out-of-Band
Three factors:
§  What you have
§  What you know
§  Who you are
Steps to out-of-band identity verification:
§  Invoke the device (push message)
§  Capture credential(s) and/or biometric(s)
§  Verify the identity in the cloud and notify
the service
IWS’s GoVerifyID Mobile Application
Turn-key, Out-Of-BandAuthentication Using a Mobile Device
§  Mobile application for iOS and Android
devices
§  Receives authentication push messages
from GoMobile Interactive
§  Collects requested biometric(s) and securely
sends them to the cloud for identity
authentication (GoCloudID)
§  No mobile application coding required
License and/or subscription service
offering as part of GoCloudID™
How it Works
1. Online or offline purchase
2. Authenticate
3. Push the message
request to authenticate
the identity
5. Biometric(s) are
submitted for
authentication in the cloud
6. Identity verified
7. Transaction approved!
4. Capture biometric(s) for
authentication in the cloud
Example 2: pillphone® transforms medication compliance
with mobile technologies & patient engagement
caregiver
provider pharmacy
pillphone® is an Enterprise level FDA cleared mobile
communication platform that:
§ Connects patient with healthcare providers
§ Promotes interactive communication
§ Ensures medical compliance with personalized reminders
§ Integrates with medical supply chains
§ Empowers disease management and wellness education
Cleared
patient
It’s secured with multi-modal biometric enabled
identity management and interactive push
messaging to ensure patient verification.
THE TREND IS IN MOTION.
The future of identity authentication is multi-modal
biometrics.
Using Cloud and SaaS, adding scalable, biometric
identity management and out-of-band authentication to
mobile applications has never been easier or more cost
effective.
SECURING YOUR FUTURE

More Related Content

What's hot

Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDSECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDForgeRock
 
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachPriyanka Aash
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 

What's hot (20)

Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLDSECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
 
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 

Similar to Mobile Identity Authentication with Multi-Modal Biometrics

Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfJuan Ben
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationInvestorideas.com
 
Remote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideRemote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideFTx Identity
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
From Liability to Asset: How to Better Secure Enterprise Mobile Deployments
From Liability to Asset: How to Better Secure Enterprise Mobile DeploymentsFrom Liability to Asset: How to Better Secure Enterprise Mobile Deployments
From Liability to Asset: How to Better Secure Enterprise Mobile Deploymentskidozen
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 

Similar to Mobile Identity Authentication with Multi-Modal Biometrics (20)

ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdf
 
Loqr
LoqrLoqr
Loqr
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Remote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate GuideRemote Identity Verification: The Ultimate Guide
Remote Identity Verification: The Ultimate Guide
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
From Liability to Asset: How to Better Secure Enterprise Mobile Deployments
From Liability to Asset: How to Better Secure Enterprise Mobile DeploymentsFrom Liability to Asset: How to Better Secure Enterprise Mobile Deployments
From Liability to Asset: How to Better Secure Enterprise Mobile Deployments
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 

Mobile Identity Authentication with Multi-Modal Biometrics

  • 1. IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Managementof Multi-Modal Biometrics
  • 2. §  Headquarters in San Diego, CA §  Offices worldwide (US, Canada, Germany, Mexico) §  Over 15 years of experience in biometric identity management, law enforcement, border control, airport security, biometric smart-cards, military, intelligence, and more… David Harding Chief Technology Officer & Vice President dharding@iwsinc.com ImageWare® Systems, Inc.
  • 3. IWS Has Been the Pioneering Force and Established Innovator in biometric security for over 15 years, with a strong installed-base, providing advanced solutions to: §  San Bernardino County Sheriff’s Department §  U.S. Department of Veteran Affairs §  Country of Mexico¹ §  LAX – Los Angeles World Airports §  Arizona Department of Public Safety §  Canadian Air Transport Security Authority §  New South Wales Police (Australia) ¹Indirect via a prime contractor partnership
  • 4. “KILL THE PASSWORD: WHY A STRING OF CHARACTERS CAN’T PROTECT US ANYMORE” Wired Magazine Recently Ran the Headline....
  • 5. MOBILE DEVICES ARE EVER-PRESENT AND ARE REPLACING THE PC “Almost 40% of Americans used smart mobile devices for banking and purchases” – Source: Federal Reserve 2012 “Android devices are expected to almost triple over 5 years, while iOS could grow about 140%” – Source: Gartner Group 2013
  • 6. – Source: U.S. Federal Reserve Bank 2014 6 “Among consumers who do not use mobile financial services, the principal reasons cited for not using the services are perceptions of limited usefulness and benefits, and concerns about security.” SECURITY REMAINS THE BIGGEST CONCERN
  • 7. Cloud Computing and The Pervasive Growth of Smart, Mobile Devices has made secure identity authentication an absolute necessity. And an essential reality.
  • 9. MULTI-MODAL BIOMETRICS UNITES MULTIPLE BIOLOGICAL TRAITS TO SECURELY CONFIRM AN IDENTITY Face Hand Geometry Signature DNA Voice PalmFinger Veins Iris Fingerprint Behavioral Retina
  • 10. MULTI-MODAL BIOMETRICS OFFERS A GREATER LEVEL OF SECURITY Single-modal biometrics, historically and effectively, have serviced a defined and limited-size populous and situation. Multi-modal biometrics can be used together and/or singularly based on the situation and environment.
  • 11. THE U.S. GOVERNMENT CONFIRMED MULTI- MODAL BIOMETRIC IDENTITY MANAGEMENT AS THE ONLY WAY TO MOVE FORWARD. FBI, Dept. of Defense, Law Enforcement, International Civil Aviation Organization, Homeland Security Presidential Directives 5 & 12
  • 12. Multi-Modal Biometrics Will Become as Ubiquitous as Smartphones Mobile devices are the perfect biometric capture device. We have them with us. They give us access to services and data anywhere anytime.
  • 13. Issues to Mobile Biometric Adoption §  Match-on-Device vs. Match-in-Cloud §  Scalability §  Reliability §  Security §  Modality Selection §  Maximizing Identity Verification Services §  Ease of Use
  • 14. Match-on-Device Susceptible to: § Theft of biometric enrollment § Replacement of biometric enrollment § Reverse engineering of biometric template (“hill-climbing attack”) Does not support: § Enroll once, use on many applications and devices § Duplicity check for enrollment verification § Transfer of biometrics to new devices and/or applications Does not scale and is not trusted!
  • 15. Match-in-Cloud §  Single, secure biometric enrollments for each modality §  Single, trusted source for biometric identity verification §  Device independent – enroll once, use on any device §  Service and application independent §  Use the right biometric for the situation and environment §  Use multiple biometrics for “high-confidence” required transactions and to prevent “spoofing”
  • 16. What’s Needed to Make it Work? A real-time, high performance, highly scalable, multi-modal, biometric database Must support today’s technology as well as tomorrow’s Must scale to support large populations Must support anonymous verification
  • 17. GoCloudID™ – The Scalable, Cloud-based, Biometric, Identity Management Platform §  Reliably manages access to biometric enrollment & verification §  Can be used as an end-to-end or modular solution §  Offers full and anonymous identity management §  Conveniently enables applications on all mobile devices §  Deployment is rapidly integrated, flexible & scalable §  Operates as a multi-tenant system §  Web portal is customer/partner provisioning §  No start-up costs §  Pay-as-you-go and scale-as-you-need The Only Multi-Modal CloudID SaaS/PaaS License and/or Subscription Service Today
  • 18. IWS’s Patented Biometric Engine® 2.0, the backend database of GoCloudID, delivers revolutionary capabilities §  Enrollment, identity & verification management of unlimited population sizes §  Hardware & algorithm independent processing §  Compatibility with all biometric products §  Future-proof, plug-n-play flexibility §  Full and anonymous biometric identity verification §  Software development kits License and/or subscription service offering as part of GoCloudID™
  • 19. IWS’s Patented GoMobile Interactive™ The Cloud-Based, Interactive, Push Messaging Server for Mobile §  Pushes interactive messages to mobile devices §  Customized message workflows and integrated biometric identity authentication §  Software development kits for rapid integration §  Server §  Mobile applications §  Enables in and out-of-band identity authentication License and/or subscription service offering as part of GoCloudID™
  • 20. Making it Work in the Real World / Example - Out-of-Band Authentication Out-of-Band Authentication uses a mobile device to verify the identity of someone who is attempting to access data or services Biometrically enables: §  Website logins §  HTML5 mobile applications §  Mobile wallet and credit card transactions §  Loan applications §  Anytime you need to verify an identity
  • 21. Steps to Biometric Verification Using a Mobile Device using Out-of-Band Three factors: §  What you have §  What you know §  Who you are Steps to out-of-band identity verification: §  Invoke the device (push message) §  Capture credential(s) and/or biometric(s) §  Verify the identity in the cloud and notify the service
  • 22. IWS’s GoVerifyID Mobile Application Turn-key, Out-Of-BandAuthentication Using a Mobile Device §  Mobile application for iOS and Android devices §  Receives authentication push messages from GoMobile Interactive §  Collects requested biometric(s) and securely sends them to the cloud for identity authentication (GoCloudID) §  No mobile application coding required License and/or subscription service offering as part of GoCloudID™
  • 23. How it Works 1. Online or offline purchase 2. Authenticate 3. Push the message request to authenticate the identity 5. Biometric(s) are submitted for authentication in the cloud 6. Identity verified 7. Transaction approved! 4. Capture biometric(s) for authentication in the cloud
  • 24. Example 2: pillphone® transforms medication compliance with mobile technologies & patient engagement caregiver provider pharmacy pillphone® is an Enterprise level FDA cleared mobile communication platform that: § Connects patient with healthcare providers § Promotes interactive communication § Ensures medical compliance with personalized reminders § Integrates with medical supply chains § Empowers disease management and wellness education Cleared patient It’s secured with multi-modal biometric enabled identity management and interactive push messaging to ensure patient verification.
  • 25. THE TREND IS IN MOTION. The future of identity authentication is multi-modal biometrics. Using Cloud and SaaS, adding scalable, biometric identity management and out-of-band authentication to mobile applications has never been easier or more cost effective.