Logo

Site non disponible sur ce navigateur

Afin de bénéficier d'une expérience optimale nous vous invitons à consulter le site sur Chrome, Edge, Safari ou Mozilla Firefox.

adnews

Authentication: Voice Commerce launches KYC Secure

  • Voice Commerce launches KYC Secure associating Voice Commerce regulated payment systems (VoicePay and Cashflows) and ensuring voice signature verification prior to its registration in the federated database, VoiceTransact. This tool is particularly suited to m-payment transactions security and customer authentication. Customers' identity check is performed using his voice signature (which is a unique individual data).
  • Once associated with other authentication factors such as geo-localization (see below), a personal access code or personal data, this solution ensures mobile transactions security and customer identification, if needed, as is the case when opening a bank account or subscribing a credit product. To benefit from this solution, the customer/prospect provides his phone number to receive phone calls and enable his identification through recognition of his voice signature and additional four digits code.
  • Mobile phones are increasingly used in the field of transactions security, fraud prevention and authentication. For some players this trend is essential, it would in fact contribute to the taking off of some markets, notably the m-commerce.
  • If should be reminded that the use of customers' voice signature may be affected by environmental parasitic noises (proper voice recognition does depend on the background in which the transaction is being conducted). In addition, considering the constraints imposed by the CNIL in terms of private data protection, France still distrusts biometric technologies: this critical data must not be stored in centralised bases. In the case of hand vein network-based solutions, Banque Accord was authorised to perform a six months payment pilot test in April 2010 (the said data is only stored on the medium used for in the transaction context).
  • Using mobile phones in the authentication process is undoubtedly one of todays' key trends and raises a certain number of security issues. The customer can be identified using a different channel from the one through which the payment is processed. The ability to authenticate customers is however subjected to telecom network coverage (lack of network coverage or impossible connection in the given location).
See March-April and June 2010 watches