Digital Identity

Digital Identity is a further module in addition to Dynamic Profiling and the Behavioural Analysis modules, which are mainly based on the analytical processing of transaction and customer master data. The module Digital Identity analyses information and behavioural patterns of customers from web and mobile application, as well as from information from the devices of end-user via all digital channels, such as mobile phone, mouse, keyboard, gyroscope, etc..

The module expands the 360-degree analysis view of the customer within the holistic UYC (Understand Your Customer) approach and enables early detection and effective prevention of cybercrime, fraud, and "man in the middle" attacks in general. The module interacts effectively with the already established modules for risk-based profiling, behavioral analysis, and transaction monitoring.

Digital Identity

Digital Identity analyses behavioural, customer-specific information such as typing speed, mouse or touchscreen movements, gyroscope data, customer-specific dwell time, etc. In addition, technical information such as IP address, GEO location, operating system, language settings, etc. are taken into account. This information is continuously processed and analysed and stored in connection with the user's identity or independently. Such a combination of processing and analysis of customer digital interaction allows for very accurate user identification, detection of potential identity theft, and prevention of unauthorised user actions.

The main functionalities

  • Application of modern methods to extract behaviour-based data from end-user interaction with the device, such as typing speed, mouse or touchscreen movements, gyroscopic data, etc.

  • Use of technical information from the business application, such as session time, login time, GEO location, IP address, language settings, operating system information, etc.

  • Automated model generation based on the Prospero analysis platform DetectX®, including unsupervised and supervised learning, clustering, and customer segmentation based on the collected data.

  • Real-time integration with business applications, with rule and model execution through the payment interface.

  • Rule Designer: Expert-based rule creation based on extracted information, as well as extension of existing business rules.

  • Web-based AlertViewer for interactive querying of suspicious messages, distribution of tasks via freely definable workflows, monitoring of task completion, and creation of multidimensional customer-specific reports.

  • Integrated link analysis for visualising suspicious connections between transactions, persons, and companies - additional warnings for risky business relationships.

Added Value

  • Effective handling of the "Man in the Middle" problem - preventing unauthorised actions.

  • Preventive combating of cyber crime to reduce financial and reputation risk.

  • Protect the integrity of the customer and the bank.

Previous
Previous

Transactions Filter

Next
Next

Behavioural Analysis