Browse Definitions:
Definition

selfie pay authentication

Contributor(s): Trea Lavery

Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology. 

Selfie pay works by prompting the user to open an app when making a purchase on their smartphone, where they then take a picture of themselves. That picture is compared to facial recognition data stored in the app from a selfie that was either taken when the person created an account or submitted an official photo ID. This data allows the app to either confirm or deny the identity of the person attempting to make the purchase.

Like other biometric security methods such as fingerprint scanning, selfie pay authentication is more secure than traditional authentication methods like passwords or security tokens, which can be easily compromised or lost. A person's face or fingerprint is unique to them, and therefore cannot be copied; it is also more convenient because the user does not need to remember anything.

Sometimes selfie authentication is combined with other authentication methods in a multifactor authentication setup. Some applications that employ selfie authentication store facial recognition information on the user's smartphone, making possession of the phone itself a factor in the authentication process.

To prevent being duped by a 2-D photo or a video playback, many apps or websites which use selfie authentication require the user to in some way prove that they are a living being. Proof can involve requiring the user to blink or otherwise move when prompted or to take a video in which they move their head from side to side or bring the phone closer to their face to provide multiple angles, allowing the software to create a 3-D facial model.

Selfie authentication is currently being used by e-commerce companies to enable customers to purchase merchandise more conveniently, by taking a selfie to log in and confirm their payments. It is also being used by banks and other organizations to protect the security of financial records. Major organizations which have begun using selfie authentication technology include Amazon, MasterCard and Alibaba.

This was last updated in March 2017

Continue Reading About selfie pay authentication

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you think selfie authentication is a secure way to confirm a user's identity?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close