From: Role of authentication factors in Fin-tech mobile transaction security
Feature | Technology used | Functions | References |
---|---|---|---|
Biometric | Finger-drawn signatures on touch devices Sensors, electro cardio gram, phono cardiograph, convolutional neural network (CNN), Electroencephalogram Fast identity online Swipe-V-lock Al m print-based key generation system voice recognition technology | Common spatial patterns (CSP) values, electrocardiogram (ECG) data for authentication, and conventional biometric methods were the significant elements in training the model. A classification method called linear discriminant analysis (LDA) was applied for specific user data collection. The server-based authentication approach uses the distributed management of compliance-based biometric data. Viable methods for banking security and authentication. Using a backdrop image to swipe the smartphone screen. Behavioural biometrics can secure mobile payments, improve usability, and stop fraud. When using biometrics for two-factor authentication, OTP is employed to strengthen the security of weak passwords. Information security now includes promising technologies like cryptology and biometrics | [50,51,52,53,54,55,56,57,58,59,60, 63, 70, 75,76,77, 92,93,94, 96, 100, 101] |
Password | Graphical passwords (G.P.s) Smartwatch worn | To further enhance the security of Fin-Tech applications, the route map is a map- and route-based G.P. Wrist movements are made by the cardholder while inputting a PIN or password, which is employed as an authentication factor. Strategies to encourage the usage of safe passwords are examined, and their implications are discussed. Users construct passwords according to trends and patterns. It thoroughly looks at how easily these real-world passwords may be guessed. Information is sent to a password manager | |
OTP | Image-based password System (IBPS) Time-based one-time password (TOTP) Embedded hardware OTP Linear congruential generator (LCG) Authentication code by hash algorithm Mobile identity Authentication mechanism | The second element for robust authentication after the password is OTP. To appropriately safeguard the system from unwanted third-party auditors, the system uses an automated blocker protocol (ABP) and time-based one-time password (TOTP) for cloud user verification. For instance, OTP is produced on the server and delivered to clients by SMS. Embedded hardware OTP generating device using dual tone multi-frequency (DTMF) signals for remote requests The OTP produced by LCG is not repeating, and it is difficult to predict the randomness. OTP is crucial for safe banking financial transactions. A more secure authentication method is the one-time password (OTP). It ensures that both entities are genuine throughout a single session | |
Q.R. code | Digital watermarking-a data Hiding technique The bank’s SPAQ website AES encryption algorithm | VQ-compressed code, which is utilized for picture authentication and print-and-scan, visual cryptography, code, and one-time PIN, is a significant tool (OTP). For safe financial transfers, a two-factor authentication protocol is used for a time-based one-time password (TOTP). Defend against phishing attacks. An extra layer of protection will be provided through the public critical infrastructure (PKI)-maintained, quick response (Q.R.) code security mechanism. Here, robust authentication is carried out utilizing Q.R. matrix barcodes, which have a large storage capacity for plain-text and encrypted data. Financial services are more secure using the integrated Q.R. code in the Adhere card and biometric authentication. W codes protect private data. High levels of convenience and security are achieved with visual authentication techniques | |
MAC and IMEI | Channel state information A secure hash algorithm (SHA) is a cryptographic hashing algorithm Address resolution protocol (ARP) International mobile equipment identity | Techniques of device identification employ this technology. The suggested technique can increase security regarding confidentiality duration and secrecy capability. The international mobile equipment identity (IMEI) uses the backstage covert automatic identifying form of authentication Algorithms for hybrid encryption algorithm (HEA) | |
A.I. and machine learning | Generalized algorithm A.I. and machine learning techniques | Prospects of artificial intelligence (A.I.) in security, outstanding challenges that require additional A.I. investigation, and machine learning techniques to identify fraudulent bank card transactions. One of the known methods for identifying credit card fraud has been created using behaviour analysis and machine learning techniques. It has been designed to detect fraudulent transactions using reinforcement learning, supervised learning, unsupervised learning, and parametric/non-parametric methods. Through A.I. and machine learning approaches, online fraud in e-Commerce and financial transactions is prevented and controlled. Approaches to authentication based on machine learning |