Welcome!

News Feed Item

New Strong Authentication Specifications Dedicated to Payment and Access to Services, across All Channels, Released by Natural Security Alliance

The Natural Security Alliance has released the newest specifications for its world first strong authentication standard.

The standard defines a strong authentication method, for payment and access to services, across all channels (e.g. home, store, branch), without compromising security or privacy. This authentication method combines local biometric verification, a personal device and wireless technology, and can be implemented into various form factors, including a smartcard, micro-SD Card, mobile phone, secure element and token.

The latest specifications are the result of a working group of key retailers, banks, vendors and payment specialists involved in Natural Security Alliance since 2008 and represent 180 man-years of development.

The newly released core specifications define the architecture and the different components required to enable a transaction based on a wireless acceptance device (WAD) used by an acceptance user (e.g. a retailer) and a wireless personal device (WPD) used by an individual user.

Previous specifications have been successfully tested in a 6-month consumer pilot carried out in France, which gave more than 900 customers the opportunity to test the first implementation of the Natural Security standard for proximity payments. The trial clearly showed that the public both accepted and adopted this biometric authentication method for proximity payments – with 94% of participants saying they were ready to use this means of payment for all purchases in superstores and smaller shops.

This standard is based on a unique combination of wireless technology, local biometric verification and personal device:

  • a personal device stores applications and data used to authenticate the user, resolving problems related to privacy and avoiding the use of biometric databases. The standard can be implemented into various form factors, including smartcard, micro-SD Card, Mobile Phone Secure Element and token.
  • wireless communication technology (current IEEE 802.15.4 and Bluetooth Low Energy planned) spares users the need to physically handle this device.
  • biometrics replaces or complements PINs so a transaction can only take place when both the user and the device are present.

This standard defines the architecture and the different components required to enable a transaction based on a wireless acceptance device (WAD) used by an acceptance user (e.g. a merchant) and a wireless personal device (WPD) used by an individual user. The Natural Security standard defines the following core specifications:

  • The Natural Security General Description [CORE1 / V 2.3] provides an introduction and a general overview of the Natural Security technology. It also describes services that can be provided by the Natural Security technology.
  • The Wireless Personal Device (WPD) [CORE2 / V 2.4] specification describes the device used by the Individual User (e.g. a customer) to execute a WPD session. This document also describes the Personal Access Provider architecture, which is the Natural Security core application residing in any WPD.
  • The Wireless Acceptance Device (WAD) [CORE3/ V 2.4] specification describes the device used by the Acceptance User (e.g. a merchant) to execute a WPD session. This document also describes the transaction flow of a WPD session.
  • The Wireless Personal Area Network (WPAN) [CORE4/ V 3.02] specification describes a mid-range wireless communication protocol used to connect the WPD with the WAD. This protocol based on WPAN is defined by Natural Security.
  • The Wireless Biometric Intelligent Reader (WBIR) Protocol [CORE5 / v2-43] specification provides the functional description of a device integrating the main Natural Security components, thus simplifying the integration of the Natural Security solution in existing systems. This document also describes the protocol messages to be used by a “Controlling-Device”, such as a POS or a PC, to control a WBIR.

About Natural Security Alliance

The Natural Security Alliance is a global community of preeminent companies dedicated to accelerating the adoption and ongoing development of Natural Security Technology based solutions. The Natural Security Alliance is comprised of some of the most influential companies in world from the retail, banking, payment provider, and IT Communities. All Alliance members share a strategic commitment to delivering mission-critical authentication and payment solutions based on secure element, wireless and biometric technology. Visit www.naturalsecurityalliance.org for more information.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, will discuss how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technol...
If there is anything we have learned by now, is that every business paves their own unique path for releasing software- every pipeline, implementation and practices are a bit different, and DevOps comes in all shapes and sizes. Software delivery practices are often comprised of set of several complementing (or even competing) methodologies – such as leveraging Agile, DevOps and even a mix of ITIL, to create the combination that’s most suitable for your organization and that maximize your busines...
Struggling to keep up with increasing application demand? Learn how Platform as a Service (PaaS) can streamline application development processes and make resource management easy.
New Relic, Inc. has announced a set of new features across the New Relic Software Analytics Cloud that offer IT operations teams increased visibility, and the ability to diagnose and resolve performance problems quickly. The new features further IT operations teams’ ability to leverage data and analytics, as well as drive collaboration and a common, shared understanding between teams. Software teams are under pressure to resolve performance issues quickly and improve availability, as the comple...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, will draw upon their own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He will also discuss the implementation of microservices in data and applicat...
Join IBM June 8 at 18th Cloud Expo at the Javits Center in New York City, NY, and learn how to innovate like a startup and scale for the enterprise. You need to deliver quality applications faster and cheaper, attract and retain customers with an engaging experience across devices, and seamlessly integrate your enterprise systems. And you can't take 12 months to do it.
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
As you respond to increasing requests for new analytics, you need fast and flexible technology in your arsenal so that you can deploy the right workload to the right platform for the need at hand. Do you need self-service and fast time to value? Do you have data and application control and privacy needs, along with strict SLAs to meet? IBM dashDB™ is data warehouse technology powered by in-memory computing and in-database analytics that are designed for fast results, scalability and more.
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...