SlideShare a Scribd company logo
What is Frictionless Authentication?
Bahaa Abdul Hadi is an Identity Management expert and regularly shares his
experiences with his audience through his blogs. This time he discusses about
Frictionless Authentication.
For a seamless transaction, free from additional authentication steps, frictionless
authentication is the way to go. Using the 3DS (3D secure) protocol, frictionless
authentication allows transactions with low fraudulent risk to occur seamlessly.
Now transactions from card and digital devices can happen within seconds. Due to
reduced friction, the chances of cart abandonment are extremely low.
Frictionless Authentication Process
According to Bahaa Abdul Hadi, frictionless authentication process happens as follows:
● The merchant puts out a request for authentication along with device and
transaction data.
● The protocol for 3D secure assesses the risk of transaction by the issuer. Based
on this, the 3D secure gauges the requirement for a challenge.
● If the transaction is reported as “high risk”, the issuer has the right to demand
more steps for authentication.
● Frictionless authentication occurs if the transaction is deemed “low risk”.
● After the transaction authentication, the merchant receives an approval. From
there on, the transaction can be carried out normally.
Risk-based Assessments
Each transaction is scrutinized properly to look for potential risks. To make this
assessment, the 3D secure protocol checks many factors, such as –
● The status of the customer – whether they are new or existing.
● The total value or amount of the undergoing transaction.
● Information of the device on which the transaction is occurring.
● The transaction history of the merchant or customer.
● The behavior history of the merchant or customer.
Securing Frictionless Authentication
Suppose the transaction is labelled as “high risk”. In that case, a customer will have to
go through additional authentication steps. This can be done in two ways: two-factor
authentication or biometrics. Sometimes, both ways can be implemented.
When the customer clears both the steps, the transaction is considered secure. This is
because a hacker or fraudster would not be able to access the biometric data or
one-time password of the cardholder.
Frictionless Authentication Benefits
Apart from increasing the speed of transaction and offering protection, frictionless
authentication has many other advantages. Some of them are:
● Less risk of fraud – a fraud might get hold of the cardholder’s details. However,
they will not have information regarding the biometrics and OTP (one-time
password).
● Easy compliance – With the help of 3D secure, you can easily comply with
Strong Consumer Authentication (SCA) and PSD2 regulations.
● Protection during chargeback – the liability of a fraud transaction falls upon the
cardholder and not the merchant. This offers protection to merchants from losing
money.
● More authorization rates – the use of 3D secure can increasing authorization
rates by 10 per cent.
Thank you for your interest in Bahaa Abdul Hadi blogs.
Bahaa Abdul Hadi

More Related Content

Similar to What is Frictionless Authentication_ - Bahaa Abdul Hadi.pdf

Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
Danail Yotov
 
Biometric Fusion Impact on Finance Sector.pdf
Biometric Fusion Impact on Finance Sector.pdfBiometric Fusion Impact on Finance Sector.pdf
Biometric Fusion Impact on Finance Sector.pdf
Bahaa Abdulhadi
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Ecommerce HUB
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
Akash588342
 
All You Need To Know About Third Party Payment processing
All You Need To Know About Third Party Payment processingAll You Need To Know About Third Party Payment processing
All You Need To Know About Third Party Payment processing
itio Innovex Pvt Ltv
 
Credit card processing highrisk gateways
Credit card processing   highrisk gatewaysCredit card processing   highrisk gateways
Credit card processing highrisk gateways
highrisk gateways
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
SafeDeposit
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
Vlad Petre
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usa
CMR WORLD TECH
 
Payment gateway[1].pptx
Payment gateway[1].pptxPayment gateway[1].pptx
Payment gateway[1].pptx
MurtazaMughal13
 
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
Drysign By Exela
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
BUSINESS SOFTWARES & SOLUTIONS
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
Andris Soroka
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
Eddie Cohen
 
Firearm Credit Card Processing.pdf
Firearm Credit Card Processing.pdfFirearm Credit Card Processing.pdf
Firearm Credit Card Processing.pdf
ElectronicTransfer
 
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
DigitalSignatureGurg
 
moneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdfmoneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdf
Roshini5096
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
 

Similar to What is Frictionless Authentication_ - Bahaa Abdul Hadi.pdf (20)

Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Biometric Fusion Impact on Finance Sector.pdf
Biometric Fusion Impact on Finance Sector.pdfBiometric Fusion Impact on Finance Sector.pdf
Biometric Fusion Impact on Finance Sector.pdf
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
All You Need To Know About Third Party Payment processing
All You Need To Know About Third Party Payment processingAll You Need To Know About Third Party Payment processing
All You Need To Know About Third Party Payment processing
 
Credit card processing highrisk gateways
Credit card processing   highrisk gatewaysCredit card processing   highrisk gateways
Credit card processing highrisk gateways
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usa
 
Payment gateway[1].pptx
Payment gateway[1].pptxPayment gateway[1].pptx
Payment gateway[1].pptx
 
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
 
Firearm Credit Card Processing.pdf
Firearm Credit Card Processing.pdfFirearm Credit Card Processing.pdf
Firearm Credit Card Processing.pdf
 
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
 
moneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdfmoneypadthefuturewallet-120428154013-phpapp02.pdf
moneypadthefuturewallet-120428154013-phpapp02.pdf
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 

More from Bahaa Abdulhadi

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
Bahaa Abdulhadi
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
Bahaa Abdulhadi
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
Bahaa Abdulhadi
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
Bahaa Abdulhadi
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
Bahaa Abdulhadi
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
Bahaa Abdulhadi
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
Bahaa Abdulhadi
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
Bahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
Bahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
Bahaa Abdulhadi
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
Bahaa Abdulhadi
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
Bahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
Bahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
Bahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
Bahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
Bahaa Abdulhadi
 

More from Bahaa Abdulhadi (20)

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

What is Frictionless Authentication_ - Bahaa Abdul Hadi.pdf

  • 1. What is Frictionless Authentication? Bahaa Abdul Hadi is an Identity Management expert and regularly shares his experiences with his audience through his blogs. This time he discusses about Frictionless Authentication. For a seamless transaction, free from additional authentication steps, frictionless authentication is the way to go. Using the 3DS (3D secure) protocol, frictionless authentication allows transactions with low fraudulent risk to occur seamlessly. Now transactions from card and digital devices can happen within seconds. Due to reduced friction, the chances of cart abandonment are extremely low. Frictionless Authentication Process According to Bahaa Abdul Hadi, frictionless authentication process happens as follows: ● The merchant puts out a request for authentication along with device and transaction data. ● The protocol for 3D secure assesses the risk of transaction by the issuer. Based on this, the 3D secure gauges the requirement for a challenge. ● If the transaction is reported as “high risk”, the issuer has the right to demand more steps for authentication. ● Frictionless authentication occurs if the transaction is deemed “low risk”. ● After the transaction authentication, the merchant receives an approval. From there on, the transaction can be carried out normally. Risk-based Assessments Each transaction is scrutinized properly to look for potential risks. To make this assessment, the 3D secure protocol checks many factors, such as – ● The status of the customer – whether they are new or existing. ● The total value or amount of the undergoing transaction. ● Information of the device on which the transaction is occurring.
  • 2. ● The transaction history of the merchant or customer. ● The behavior history of the merchant or customer. Securing Frictionless Authentication Suppose the transaction is labelled as “high risk”. In that case, a customer will have to go through additional authentication steps. This can be done in two ways: two-factor authentication or biometrics. Sometimes, both ways can be implemented. When the customer clears both the steps, the transaction is considered secure. This is because a hacker or fraudster would not be able to access the biometric data or one-time password of the cardholder. Frictionless Authentication Benefits Apart from increasing the speed of transaction and offering protection, frictionless authentication has many other advantages. Some of them are: ● Less risk of fraud – a fraud might get hold of the cardholder’s details. However, they will not have information regarding the biometrics and OTP (one-time password). ● Easy compliance – With the help of 3D secure, you can easily comply with Strong Consumer Authentication (SCA) and PSD2 regulations. ● Protection during chargeback – the liability of a fraud transaction falls upon the cardholder and not the merchant. This offers protection to merchants from losing money. ● More authorization rates – the use of 3D secure can increasing authorization rates by 10 per cent. Thank you for your interest in Bahaa Abdul Hadi blogs. Bahaa Abdul Hadi