{"id":4577,"date":"2013-10-17T14:16:00","date_gmt":"2013-10-17T14:16:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/touch-id-biometrics-and-kba-work-in-perfect-harmony\/"},"modified":"2013-10-17T14:16:00","modified_gmt":"2013-10-17T14:16:00","slug":"touch-id-biometrics-and-kba-work-in-perfect-harmony","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/touch-id-biometrics-and-kba-work-in-perfect-harmony\/","title":{"rendered":"Touch ID Biometrics and KBA Work In Perfect Harmony"},"content":{"rendered":"<p><span>There have been a&#13;<br \/>\nlot of rumors around the new iPhone feature, a fingerprint scanner, related to&#13;<br \/>\nidentity theft and fraud. This technology is supposed to improve security for&#13;<br \/>\nthe user, but its still under speculation by many. The fingerprint sensor&#13;<br \/>\nreads the users fingerprint in order to unlock and allow access to the phone.<\/span><span><\/span><\/p>\n<p><span>Biometric&#13;<br \/>\ntechnology is exciting on all fronts, from security to electronics, but its&#13;<br \/>\nnothing new. <span>Biometrics is defined as the&#13;<br \/>\nmeasurement and analysis of unique physical or behavioral characteristics (such&#13;<br \/>\nas fingerprint and voice patterns) especially as a means of verifying personal&#13;<br \/>\nidentity.<\/span><\/span><span>Biometric&#13;<br \/>\ntechnology is not limited to fingerprint and voice recognition.<\/span><span>The&#13;<br \/>\nuses of biometrics are abundant and can be very beneficial. <\/span><span><span><\/span><\/span><\/p>\n<p><span>So&#13;<br \/>\nthen the question is, are biometrics enough to verify and secure an identity?&#13;<br \/>\nWhile its convenient to unlock your phone with your fingerprint, how effective&#13;<br \/>\nis it within larger applications? Were sure consumers wouldnt feel secure&#13;<br \/>\nregistering a new online bank account or credit card with just their&#13;<br \/>\nfingerprint. There is also concern about whether or not biometric technology&#13;<br \/>\nalone can give organizations the confidence that their customers need to&#13;<br \/>\npartner with them.<\/span><\/p>\n<p><span>We never recommend&#13;<br \/>\nusing just one technology in a <\/span><a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\"><span>fraud prevention strategy<\/span><\/a><span>. The key to success is <\/span><a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/The-Power-of-Knowledge-Based-Authentication-In-Layered-Security.aspx\"><span>layered security<\/span><\/a><span>. When it comes to biometrics, we all want&#13;<br \/>\nto know: How is the fingerprint validated? What happens when a copied fingerprint&#13;<br \/>\nis used? What happens if the database of fingerprints gets hacked?<\/span><\/p>\n<p><span>With passwords, you&#13;<br \/>\ncan easily and quickly change them if an account is compromised. What about&#13;<br \/>\nyour fingerprint? You most certainly cant get a new one. Identity verification&#13;<br \/>\nand biometrics can work together by verifying initial verification and&#13;<br \/>\nauthentication. By utilizing the ability of <\/span><a href=\"https:\/\/www.electronicverificationsystems.com\/products\/knowledge-based-authentication.aspx\"><span>dynamic knowledge based authentication<\/span><\/a><span> (KBA) and out of wallet questions, you can ensure&#13;<br \/>\nthe identity of that fingerprint is who its supposed to be and not a fraudster.&#13;<br \/>\nThis process of layered security leads to faster approvals, as well as a more&#13;<br \/>\nsecure customer experience thats proven to prevent fraud.<\/span><\/p>\n<p><span>The use of <\/span><a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/Their-Voice,-Your-Identity--Proper-Authentication-in-Biometrics.aspx\"><span>biometrics<\/span><\/a><span> alone can be dangerous and will not be able to identify an individual&#13;<br \/>\nalone. Implement robust <\/span><a href=\"https:\/\/www.electronicverificationsystems.com\/products\/id-verification.aspx\"><span>identity verification<\/span><\/a><span> and KBA to sustain and enhance your fraud&#13;<br \/>\nprevention strategy. <\/span><\/p>\n<p><span><br \/><\/span><\/p>\n<p><span><\/span><\/p>\n<p><span>[Contributed by EVS&#13;<br \/>\nMarketing]<\/span><\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There have been a lot of rumors around the new iPhone feature, a fingerprint scanner, related to identity theft and fraud. This technology is supposed to improve security for the user, but its still under speculation by many. The fingerprint<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4577","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4577"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4577\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}