CIOReview
| | DECEMBER 201919CIOReviewusage patterns of each user, which then becomes the identity blockchain of that user, which is the basis of an on-going user pattern over time rather than a simple event such as a PIN code or two-factor authentication. Once the identity of a person is learned, every time they perform a transaction on say, another blockchain, their identity blockchain can easily provide authentication and authorization and can make every transaction auditable. Additionally, in case of a lost or stolen smartphone, the fraudster can easily be identified because of the inconsistencies in their actions from that of the primary user.The identity blockchain is a significant step higher in offering security and authentication required in data transfer as well as financial transactions. The possibilities and application areas are limitless and revolutionary. Take, for instance, the scenario of financial transactions via ATMs. No organization has gone above and beyond to do away with event based transactions at ATMs with cards. BEN has not lagged behind either as one of its ventures deals with eliminating the use of transaction cards as well as biometrics. Instead, a futuristic, fraud-proof BEN compliant application will soon be able to leverage the on-going knowledge and historical record of the users' behavioural patterns to confirm any transaction request. "Given that blockchain is an immutable ledger, our identity blockchain verifies the identities of who enters or uploads any information. It goes beyond simple passcodes or key, and is rather an on-going stream of data that represents a person," adds Lucas. With Lucas' experience and expertise in security and sensors; and the collaboration of a talented team, the company is taking one vertical at a time with a storm, with its new version of blockchain-based identity protection and verification. BEN'S patented technology can be at the core of IoT applications and can offer an array of applications that can enable communication screening. BEN is looking at its big launch in the coming year and in that endeavour, has partnered with some behemoths in its field of work to expand their security, authentication, and validation capabilities.
< Page 9 | Page 11 >