
caller when, for example , the caller requests a secured
transaction, such as a sizable funds transfer, or sensi-
tive account/customer information. While the system
is running in the background, the agent may also
be asking the caller questions (knowledge-based
authentication). The combination of the factors pro-
duces the needed authentication. Bank Leumi, one
of the largest banks in Israel, has used this approach
for several years.
A method developed by Authentify, an American
solutions provider, is suitable for authentication
levels 3 and 4. It combines out-of- band voice authen-
tication with a Web session. The following variant is
used by VeriSign to authenticate applicants renew-
ing digital certificates. The system sends an email to
the applicant containing a link that in itiates the
authentication Web session. The system calls the tele-
phone num ber provided by the applicant and per-
forms speaker enrollment. The system then uses a
third-party telephone directory to obtain the phone
number for the applicant’s company, calls that num-
ber, and asks to be connected with the applicant.
When the applicant answers, the Web session displays
a randomly-generated sequence on the applicant’s
computer screen and the telephone session asks the
applicant to say that sequence and their name.
Electronic monitoring of community-released and
home-incarcerated offenders utilizes text-prompted
voice authentication. These systems place outbound
calls to registered telephone numbers of locations
where the offender is supposed to be (e.g., home, school,
work, or AA meetings). The calls are placed at random
times during the day and text-prompting is used to
reduce the chance that offenders will use tape recorders.
Challenge response is also used for remote authen-
tication employing other biometric mod alities. This
approach is used for employees, customers using net-
worked devices (e.g., ATMs), and for registered airline
travelers seeking to move quickly through security
lines. Applications that require higher levels of authen-
tication may request more than one fingerprint or
samples for multiple biometric modalities.
Other Biometrics
A growing number of deployments are using smart-
cards with fingerprint, face, iris, or finger/hand
vascular templates embedded in them. This include s
e-passport, national ID, and trusted traveler programs.
Matching is almost always done on the device or
centrally (Fig. 2). One large-scale deployment in pri-
vate industry is by ICICI Prudential Life Insurance
of India. Its smartcard contains a fingerprint as well
as the individual’s policy information. Some biometric
ATMs also use card-based storage.
Related Entries
▶ Biometrics, Overview
▶ Speaker
▶ Speaker Recognition, Standardization
References
1. Bosen, B.: Network Attacks: Analysis of Department of Justice
Prosecutions 1999 – 2006. Pleasanton, CA: Trusted Strategies
Ltd. (2006)
2. Authentication in an Internet Banking Environment (FIL
03–2005). United States Federal Deposit Insurance Corporation
(2004)
3. Guidance on Authentication in an Internet Banking Environ-
ment. United States Federal Financial Institutions Examination
Council (2005)
4. Q&A on Guidance on Authentication in an Internet Banking
Environment. United States Federal Financial Institutions
Examination Council (2006)
5. Health Insurance Portability and Accountability Act of 1996
(Public Law 104 191). United States Department of Health and
Human Services (1996)
6. Telecommunications Carriers’ Use of Customer Proprietary
Network Information and Other Customer Information (FCC
07–22A). Federal Communications Commission (2007)
7. Kuhn, D.R., Hu, V.C., Polk, W.T., Chang, S.-J.: Introduction
to Public Key Technology and the Federal PKI Infrastructure
(SP 800–32). National Institute of Standards and Technology
(2001)
8. Bolton, J.: E-Authentication Guidance for Federal Agencies.
(Memorandum M-04–04, Appendix p. 3) Office of Management
and Budget (OMB) (2003)
9. Burr, W.E., Dodson, D.F., Polk, W.T.: Electronic Authentication
Guideline (SP 800–63 v 1.01.2). National Institute of Standards
and Technology (2006)
10. Tilton, C., Young, M. (eds.): Study Report on Biometrics in
E-Authentication (M1/07–0185). American National Standards
Institute/International Committee for Information Technology
Standards (2007)
1126
R
Remote Authentication