Browse Definitions:
Definition

selfie authentication

Contributor(s): Trea Lavery

Selfie authentication is a form of biometric authentication that confirms a person's identity using facial recognition technology on a selfie taken by that person. Sometimes known as "selfie pay," selfie authentication is meant to replace traditional passwords or other authentication methods.

Selfie pay works by prompting the user to open an app when making a purchase on their smartphone, where they then take a picture of themselves. That picture is compared to data stored in the app of an original photo of that person, either taken when they created an account or from an official photo ID that they provided. This data allows the app to either confirm or deny the identity of the person attempting to make the purchase.

Like other biometric security methods such as fingerprint scanning, selfie authentication is more secure than traditional authentication methods like passwords or security tokens, which can be easily compromised or lost. A person's face or fingerprint is unique to them, and therefore cannot be copied; it is also more convenient because the user does not need to remember anything.

Sometimes selfie authentication is combined with other authentication methods in a multifactor authentication setup. Some applications that employ selfie authentication store facial recognition information on the user's smartphone, making possession of the phone itself a factor in the authentication process.

To prevent being duped by a 2-D photo or a video playback, many apps or websites which use selfie authentication require the user to in some way prove that they are a living being. Proof can involve requiring the user to blink or otherwise move when prompted or to take a video in which they move their head from side to side or bring the phone closer to their face to provide multiple angles, allowing the software to create a 3-D facial model.

Selfie authentication is currently being used by e-commerce companies to enable customers to purchase merchandise more conveniently, by taking a selfie to log in and confirm their payments. It is also being used by banks and other organizations to protect the security of financial records. Major organizations which have begun using selfie authentication technology include Amazon, MasterCard and Alibaba.

This was last updated in March 2017

Continue Reading About selfie authentication

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you think selfie authentication is a secure way to confirm a user's identity?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close