You are on page 1of 36

The Agenda

• Background Info
• Challenges
• Protection in Layers
• Solutions
• Factors to Consider
• Summary
• Conclusion

Introduction Solution Reasoning Action 1


The Essential Question

How can we implement innovative and


seamless biometric strategies to support
customer experience at the U.S. Bank?

Introduction Solution Reasoning Action 3


Deliver a Be the
unified Get better most
customer every day trusted
experience. choice

Introduction Solution Reasoning Action 4


Core Priorities

• Eliminating passwords while improving security


and user experience
• Accommodating every user
• Eliminating the “creep factor”

Introduction Solution Reasoning Action 5


Challenges

• What works in one channel may be useless in another


• 86 percent of respondents would consider leaving
their current financial institution if it was difficult to
access their account online.

Introduction Solution Reasoning Action 6


OUR SOLUTION

Introduction Solution Reasoning Action 7


LAYERED PROTECTION IS
MAXIMUM SECURITY

Introduction Solution Reasoning Action 8


Protection in Layers

User Strategy

Advanced
Business Strategy

Introduction Solution Reasoning Action 9


Applications

Web & Over the


Bank &
Mobile Phone in
ATM’s
Application Call Centers

Introduction Solution Reasoning Action 10


Personalization
Omnichannel Authentication
Iris Scanning

Facial Recognition

Finger Scanning

Introduction Solution Reasoning Action 11


Web & Mobile Application
Mobile Device
User end biometrics ranked
1. Iris Scanning
2. Fingerprint scanning
▪ Randomized combination
3. Facial recognition

Website
Fingerprint scanning
▪ Randomized combination

Introduction Solution Reasoning Action 12


Implementation

Desirability Feasibility Viability

Introduction Solution Reasoning Action 13


Over the Phone in Call Centers
Get directly transferred from
the mobile app
Authenticate prior to call

An automated notification is
sent to your mobile device

Introduction Solution Reasoning Action 14


Implementation

Desirability Feasibility Viability

Introduction Solution Reasoning Action 15


Bank Branches & ATM’s
Bank Branches
• Two-Image Visual Cryptography
• QR from mobile app is used to
authenticate with bank teller
• Static & Dynamic biometrics

ATM’s
• Limited ATM functionality
• Fingerprint scanner

Introduction Solution Reasoning Action 16


Implementation

Desirability Feasibility Viability

Introduction Solution Reasoning Action 17


FACTORS TO CONSIDER

Introduction Solution Reasoning Action 18


User Experience

Educate Customers

Solutions for people with Disabilities


• Variety of methods to authenticate

Warning message when using less


secure biometric options

Introduction Solution Reasoning Action 19


Protecting Banking Access in Rural America

In rural areas, making more loans available can help address


important economic and social issues.
Mobile ID Terminals

Introduction Solution Reasoning Action 20


Cost: Servers & Biometrics
Servers Average Monthly Total Number of Total
Cost States (that the company
conducts business in)
Average Servers (Cloud $1500 25
Computing) $345,000
User authentication Launch cost per Licensing cost per Maintenance cost Total per user
methods user user (year) per user (year)

Password <$0.05 N/A large banks $0.003 $0.5


build this function in-
house
Biometrics $0.014 $2-3 $0.003 $2-3

Introduction Solution Reasoning Action 21


Cost: ATM
Equipment/ Labor Cost per unit Number of ATM Total Cost
across America
Secugen Hamster Plus $75 ~5000 $375,000
(Fingerprint Scanner)-
Kiosk ~$500 ~5000 $2,500,000
Wifi Connection (Google $100 ~5000 $500,000
Wifi)
Labor Cost $165/ month ~5000 $825, 000

$3,375,000
Introduction Solution Reasoning Action 22
Risks
Risk Mitigation
Not all individuals Implementing random fingerprint reader, only requires a device
own a mobile with a camera to authenticate randomly selected fingerprints.
device
Inconvenient for Make set-up process simple (under 5 minutes), use algorithm in
customers to set-up the background to identify device capabilities and suggest best
authentication biometric option.

Lack of customer We will implement marketing strategy to raise further awareness


awareness

Introduction Solution Reasoning Action 23


Timeline
Short-Term Response 2019 2020 2021 2022
Biometric Development

Testing

Debugging
Launch

Educating Employees
Educating Clients

Long-Term Response 2019 2022 2025 2028


Machine Learning/ A.I.

Adaptive Authentication

Cloud Computing

Introduction Solution Reasoning Action 24


Summary

LAYERED PROTECTION IS
MAXIMUM SECURITY

25
Conclusion

Deliver a Be the
unified Get better most
customer every day trusted
experience. choice

26
ARENA

Thank You

Any Questions?

27
Appendix: Mass producing biometrics

28
Appendix: Biometric types
Size of Long Term Security
Biometrics Type Accuracy Cost
Template Stability Level

Facial Recognition Low High Large Low Low

Iris Scan High High Small Medium Medium

Fingerprint Recognition Medium Low Small Low Low

Finger Vein High Medium Medium High High

Voice Recognition Low Medium Small Low Low

Retina Scan High High Medium High High

29
Appendix: Fingerprint card purchasing

30
Appendix: BIPA
Biometric Information Privacy Act
Illinois, Washington, Texas
•Obtain consent from individuals if the company intends to collect or disclose
their personal biometric identifiers.
•Destroy biometric identifiers in a timely manner.
•Securely store biometric identifiers.

For now, it’s legal in 48 states for software to identify you using images taken
without your consent while you were in public. Texas and Illinois don’t allow it
for commercial use, but it’s legal nationwide for law enforcement. And even
when consent is obtained, it’s often done so in a way you may not be aware of:
in the fine print of Terms of Service agreements that people routinely don't
read.
31
Appendix: Fingerprint hacking
The Chaos Computer Club's biometric hacking team has announced a
successful attack on Apple's Iphone biometric fingerprint lock, using a
variation on the traditional fingerprint-cloning technique. CCC's Starbug
summarizes: "As we have said now for more than years, fingerprints should
not be used to secure anything. You leave them everywhere, and it is far too
easy to make fake fingers out of lifted prints."

"We hope that this finally puts to rest the illusions people have about
fingerprint biometrics. It is plain stupid to use something that you can´t
change and that you leave everywhere every day as a security token", said
Frank Rieger, spokesperson of the CCC. "The public should no longer be
fooled by the biometrics industry with false security claims.
32
Appendix: Security

Nearly half of U.S. bank customers would feel


secure using biometrics for authentication at a
bank branch, in one of the shifts in attitudes about
financial activity driven by digital habits, according
to new survery results announced by fintech firm
Fiserv.

33
Appendix: Rural America gone

34
Appendix: Hacking for fingerprints

35
Appendix: Dissatisfied reviews

36

You might also like