• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

Asia’s Digital ID Technology Developments Gain Pace

December 10, 2018 By CybersecurityMarket.com

The recent spate of data breaches—including a flaw in Google+ that led to its shutdown and the reported hacking of 120 million Facebook users’ data—have highlighted the abuse of digital identity.

While having a digital identity brings convenience, the challenge is to ensure that individuals have full control and protection of their data. Technologies for safeguarding digital identities have quickly emerged in the U.S. and Europe, but developments have been slow in Asia due to its diverse language mix and cross-racial facial features, says Real ID’s CEO Chong Han Ping.

Real ID, whose partners include Alibaba-backed SenseTime, recently launched its screening and face-learning technology. Its AI and blockchain technology shortens the onboarding and KYC (Know-Your-Client) process for remittance transactions by as much as 90% and significantly reduces human error, says Chong.

“Multi-language verification is rare, and we have focused our efforts on building partnerships in different markets to improve our language-learning and OCR technology as well as to shorten machine-reading time,” he adds. OCR is the recognition of printed or written text characters by a computer.

Real ID, whose employees include former data scientists and machine-learning experts from Tencent, China National Research Centre, and Nanyang Technological University, is in talks with authorities in India, Thailand, Philippines, and Indonesia to build a regional digital ID ecosystem for frictionless cross-border business.

Real ID adopts SenseTime’s facial recognition technology, which is empowered by liveness detection, face matching and machine learning to eliminate any deception. The use of blockchain technology ensures that records cannot be altered retroactively without the consensus of the network. A combination of both on-chain and off-chain transactions also allows verification results to be audited by different parties, without the need to reveal underlying identity information. For further security, the data is backed by validators who are authorised to issue a trust statement on behalf of the user.

Real ID has invented a unified model for creating, collecting, verifying, accepting, and authorising digital identities, which will establish a self-regulating ecosystem that connects users, merchants, and certification bodies, Chong explains. The company projects that its model can reach over 10 million users in the region in the next five years.

Related

Filed Under: Cybersecurity Market

Footer

Recent Posts

  • A defense-in-depth approach is critical to reduce email risk
  • The Global Cyber Innovation Summit (GCIS), 27-28, 2022, Baltimore, Maryland
  • Hackers have broken into dozens of Russian institutions
  • The 13th Annual Billington CyberSecurity Summit, September 7-9, 2022, Washington Convention Center
  • Black Hat Announces Keynote Speakers for Black Hat Asia 2022 Hybrid Event, May 10–13 2022, Marina Bay Sands, Singapore
  • ISACA Conference North America 2022 hybrid event, 4-6 May 2022, New Orleans, LA
  • The third edition of the Barcelona Cybersecurity Congress (BCC), May 10-12, 2022, Barcelona
  • The Official Cyber Security Summit in Miami on April 7, 2022
  • Black Hat Europe 2021 Announces Keynote Speakers & Releases Full Event Schedule, November 8-11, 2021, ExCeL London
  • Cyber Cartels, Ransomware, AI, & Cryptocurrency Among Cyber Trends Explored at Billington Cybersecurity Summit, October 6-8, 2021

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT