Welcome!

News Feed Item

New Strong Authentication Specifications Dedicated to Payment and Access to Services, across All Channels, Released by Natural Security Alliance

The Natural Security Alliance has released the newest specifications for its world first strong authentication standard.

The standard defines a strong authentication method, for payment and access to services, across all channels (e.g. home, store, branch), without compromising security or privacy. This authentication method combines local biometric verification, a personal device and wireless technology, and can be implemented into various form factors, including a smartcard, micro-SD Card, mobile phone, secure element and token.

The latest specifications are the result of a working group of key retailers, banks, vendors and payment specialists involved in Natural Security Alliance since 2008 and represent 180 man-years of development.

The newly released core specifications define the architecture and the different components required to enable a transaction based on a wireless acceptance device (WAD) used by an acceptance user (e.g. a retailer) and a wireless personal device (WPD) used by an individual user.

Previous specifications have been successfully tested in a 6-month consumer pilot carried out in France, which gave more than 900 customers the opportunity to test the first implementation of the Natural Security standard for proximity payments. The trial clearly showed that the public both accepted and adopted this biometric authentication method for proximity payments – with 94% of participants saying they were ready to use this means of payment for all purchases in superstores and smaller shops.

This standard is based on a unique combination of wireless technology, local biometric verification and personal device:

  • a personal device stores applications and data used to authenticate the user, resolving problems related to privacy and avoiding the use of biometric databases. The standard can be implemented into various form factors, including smartcard, micro-SD Card, Mobile Phone Secure Element and token.
  • wireless communication technology (current IEEE 802.15.4 and Bluetooth Low Energy planned) spares users the need to physically handle this device.
  • biometrics replaces or complements PINs so a transaction can only take place when both the user and the device are present.

This standard defines the architecture and the different components required to enable a transaction based on a wireless acceptance device (WAD) used by an acceptance user (e.g. a merchant) and a wireless personal device (WPD) used by an individual user. The Natural Security standard defines the following core specifications:

  • The Natural Security General Description [CORE1 / V 2.3] provides an introduction and a general overview of the Natural Security technology. It also describes services that can be provided by the Natural Security technology.
  • The Wireless Personal Device (WPD) [CORE2 / V 2.4] specification describes the device used by the Individual User (e.g. a customer) to execute a WPD session. This document also describes the Personal Access Provider architecture, which is the Natural Security core application residing in any WPD.
  • The Wireless Acceptance Device (WAD) [CORE3/ V 2.4] specification describes the device used by the Acceptance User (e.g. a merchant) to execute a WPD session. This document also describes the transaction flow of a WPD session.
  • The Wireless Personal Area Network (WPAN) [CORE4/ V 3.02] specification describes a mid-range wireless communication protocol used to connect the WPD with the WAD. This protocol based on WPAN is defined by Natural Security.
  • The Wireless Biometric Intelligent Reader (WBIR) Protocol [CORE5 / v2-43] specification provides the functional description of a device integrating the main Natural Security components, thus simplifying the integration of the Natural Security solution in existing systems. This document also describes the protocol messages to be used by a “Controlling-Device”, such as a POS or a PC, to control a WBIR.

About Natural Security Alliance

The Natural Security Alliance is a global community of preeminent companies dedicated to accelerating the adoption and ongoing development of Natural Security Technology based solutions. The Natural Security Alliance is comprised of some of the most influential companies in world from the retail, banking, payment provider, and IT Communities. All Alliance members share a strategic commitment to delivering mission-critical authentication and payment solutions based on secure element, wireless and biometric technology. Visit www.naturalsecurityalliance.org for more information.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...