Didyou know

Biometrics - Fingerprint Scans, Retinal Scans, Voiceprints, DNA Matching, Facial Recognition, and more.

The use of biometrics is very effective as a tool to authenticate a person’s identity. The problem is that it is very expensive to implement and requires the consumer to have equipment to produce the authentication. For today’s marketplace it is very unlikely that this type of fraud technique will be implemented in any kind of mass scale. If you have a defined set of consumers who constantly make purchases you may entertain this option. But more than likely you are in a very high-risk regulated sector if you are entertaining this fraud-prevention technique. For example, the pharmaceutical sector would be well suited.

Merchants may still have “application fraud” in which the account is set up in the fraudster’s identity with their biometric readings. Also, biometrics are very expensive to implement and are a very small-scale type of solution. They require the consumer to have specialized equipment to perform the authentication check. Most solutions still store authentication data on hard drives that could be hacked. Additionally, a lot of devices give the option of defaulting to a password instead of biometric authenticaiton.

 

subscribe to newsletter

 

 

Biometricstechnique overview

Biometrics are used to verify a person’s identity by a unique physical attribute that distinguishes that individual from any other person. Common physical elements used (but not limited to) are fingerprints, retinal scans, voiceprints and DNA match. Key considerations when implementing or buying this functionality include:

  • Are the merchant’s consumers setting up accounts?
  • How will the merchant collect the initial biometric data from their consumer?
  • What type of equipment will the consumer need to perform the check?
  • Are the devices portable, or will they only work on the one system they are installed on?
  • How do they work for MOTO?
  • What happens if the system cannot authenticate and it is the real consumer?
  • What are the insult rates of the solution?
  • Who supports the consumer in getting the technology to work?
  • Hardware compatibility issues.

How does it work?

These devices compare a stored image or value that is calculated by the unique characteristics of the consumer with the value they use when they make a purchase. For example, with fingerprints they may be counting the number of identical points from a pre-saved image of the consumer’s thumb.

 

How do you use the results?

These tools can be implemented in a number of different ways. The merchant could send their consumer the device and have him or her install it upon registering with the merchant’s solution provider. Then when the consumer attempts to make a purchase, the system would do a validation and pass the information on to the merchant.

Another method is to have the device perform the authentication and produce a one-time-use number for the purchase, like a disposable credit card number. In some cases the device actually performs the authentication as a means for gaining access to the site or material for making a purchase.

AdditionalResources

  • OVERVIEW OF ECOMMERCE FRAUD PREVENTION TECHNIQUES.

    A core curriculum course providing an introduction to 30 plus fraud prevention techniques; what they are, high level discussion on how to employ them and big picture considerations for using them.

  • Ecommerce Fraud Moving from Tools to Solutions.

    This session covers what constitutes a fraud solution and categorizes the many types of third party fraud tools. The course outlines the common terminology of fraud solutions and describes the capabilities needed to implement a fraud solution.

  • Introduction to Ecommerce Fraud Fundamentals.

    Provides participants foundation level knowledge about the theories, best practices and terminology surrounding electronic payment fraud. Presented in a standard format covering the history of eCommerce Fraud, consumer fraud, merchant fraud, fraudster motivation, fraud trends, identity verification and phishing.

keynotes