
Digital Deception
While AI has brought about many advantages in the way we do business, one repercussion has been the expanded attack surface that has given bad actors a new landscape for perpetrating fraud. One of the primary areas has been the utilization of AI and machine learning to create highly realistic deepfakes – something that appears real and genuine but is in fact a forgery. This includes generated images, videos and audio of documents and people that are used to trick ordinary people and the systems they rely on.
There are several characteristics that deepfakes depend on including realism and manipulation and numerous evolving advanced techniques such as Generative AI models. All of this is advancing at record speed, thus making this a serious issue that needs to be addressed.
Send download link to:

Digital Pound Experiment
The Bank of England have produced a Digital pound experiment report on the “Point-of-sale proof of concept”.
The purpose of this experiment was to assess the technical feasibility of using existing point-of-sale (POS) hardware, as currently used in the UK, to initiate digital pound payments. This involved a PoC that used EMV[1] standards to send payment instructions from smart cards to POS devices, and then to an application programming interface (the ‘BoE API’).
Consult Hyperion developed this PoC to help the Bank test digital pound payment initiation using existing POS hardware.

Identity Document Verification
Documents play a key role in confirming the identity of customers. In particular, official documents such as passports provide strong evidence to support a claim of identity being made by a customer.
In recent years there has been an explosion of digital Identity Document Verification solutions. This has been accompanied by recognition by regulators of the applicability of these solutions to regulated sectors such as finance and gambling. This has enabled the development of many mobile-first and mobile-only services, allowing customers to access services with great ease through their mobile devices.
However advances in artificial intelligence and machine learning present a challenge to some Identity Document Verification solutions – those that rely solely on capturing and analysing an image or video taken of a physical document. These solutions are increasingly susceptible to deepfake injection attacks and therefore the more robust chip-based solution, which rely on strong cryptography, provide a more secure approach. We have developed this market guide to identity document verification, that explores these issues, compares the approaches and providing practical advice on how to implement effective solutions. The guide was commissioned by Inverid.

Escaping the legacy mindset
For at least 15 years, vendors and analysts have been heralding the death of legacy systems, arguing they are end-of-life and no longer fit for purpose. Financial institutions (FIs) were told to migrate before it was too late; otherwise, their businesses would become obsolete due to the shiny new, modern technology cores their competitors would adopt.
Yet, this still hasn’t happened. Instead, we have become an industry of integrators, partnerships, and external hubs of complex spaghetti systems with multiple stakeholders that rely on payment orchestration layers and other integration wrappers. The rise of fintechs, multiple stakeholders, and niche players has also led to an unhealthily obsessed with front-ends, with a complete disregard for the core systems that drive it all, as FIs cater to consumer demands for immediacy at the expense of everything else.
In our latest white paper with Consult Hyperion, ‘Escaping the legacy mindset: How to approach modernising your payments ecosystem’, we take a step back to reevaluate the long-term. We examine the payments system architectures that FIs, banks and processors utilise today, highlighting their benefits, disadvantages and where they should sit in your tech stack. This is a must-read for any C-level executive or payments professional seeking to break free of legacy thinking and strive to build a future-proof ecosystem.
Send download link to:

Comparing Cloud Payment HSMs
Cryptographic HSM infrastructure is a costly although critical part of any payment system. Until recently it has been necessary for payments providers to manage their own Payment HSMs – involving both exacting physical security requirements and scarce cryptographic security expertise. These constraints have made it difficult, if not impossible, to migrate payment applications to the cloud.In response, the HSM industry has developed a number of Cloud Payment HSM offerings. These include ‘bare metal’ offerings which provide secure hosting but leave the management of the devices to the customer. Other ‘Payment Cryptography as a Service’ offerings provide more fully managed multi-tenant services.
Send download link to:

In this whitepaper you’ll discover supporting SCA on wearables is no harder than supporting SCA on Apple Pay.
Wearables and PSD2 SCA
In our latest whitepaper with Digiseq, we address the issue of SCA (Strong Customer Authentication) in Passive Wearables.
Rules are in place that affect the way banks and other payment services providers check that the person requesting access to an account or trying to make a payment is permitted to do so. The rules are intended to enhance the security of payments and limit fraud during this authentication process.
In the case of wearables and SCA under PSD2, the same secure rules apply. All electronic payments on – cards, mobiles, and wearables – are subject to Strong Customer Authentication (SCA). Issuers can either perform SCA on wearables themselves or delegate SCA to the wearable service supplier. If an issuer already connects to tokenisation schemes for Secure Element based devices such as those supporting Apple Pay®, then only minimal further technical integration is required to support the latest generation of passive wearables.

What exactly is The Metaverse?
A survey of more than 3,000 adults in China, the United States and the United Kingdom found that while three-quarters of them had heard of the metaverse, only 15% said they could explain the concept of the metaverse to another person (and half of them were probably wrong). Those same people, when asked about their main concerns about this metaverse that they didn’t understand, put children’s privacy first and highlighted a number of other data protection, privacy and safety issues.
Those answers are a challenge to us in two ways: First, how can we explain what the metaverse is and secondly how can we give organisations and individuals confidence in it, as a place to do business by making both privacy and security part of the infrastructure?
A good place to begin is to ask what exactly the metaverse is.
Send download link to:
Model behaviour - is your payments processor the right fit?
In the world of payments processing, the SaaS delivery model remains the undisputed champion in terms of popularity. However, it is widely unknown that not all SaaS models are created equal: in fact they vary significantly in their capabilities based on the payments platforms powering them.
"It is imperative for an FI to understand the technology that underpins their processor, otherwise it may find itself pinned under this technology in the future."
Many FIs are unaware that the options to outsource span more than picking between the SaaS model they are on and the entirely different model of PaaS that they might not be ready for.
In our latest white paper with Compass Plus, we explore the capabilities and variations of processing service delivery models, how they differ and how an FI can select the most appropriate model – and processor – for its product portfolio.
Send download link to:

The value of designed in security
The way we interact with financial institutions, merchants, entertainment, government, etc has changed dramatically over time. Today’s marketplace is increasingly digital, and the mobile phone is now the preferred way to access the digital services on offer. In the past, access to financial systems was limited to trained and vetted staff, through firewalls from security hardened devices. In the digital age, that access is now via mobile apps and APIs, operating on insecure and complex devices. From an IT perspective, we now have millions of unmanaged devices connecting to our enterprise. The question CSO’s & CIO’s now need to ask is are their systems secure? How do they secure the systems and apps they deploy in order to provide access to their core services? This paper examines the mobile app security landscape, how the threats are evolving, and how designed in security is essential in the face of these threats.
Data: The Key to Inclusive Digital Identity
In this paper we consider the issues that face many regulated and high value services in finding an optimal way to check the identity of customers. These issues affect financial services, insurance, car rental, online gambling and more besides. The paper explains why current identity checks often fail and shows how through alternative data sources and emerging digital identity solutions will help address these pain points – both improving the customer experience and reducing fraud.
Send download link to:

Total Cost of Ownership Analysis: Shared Platforms vs Bespoke Design-Build Fare Collection Systems
The last 10 years have seen a technology shift in fare collection system architecture, predominantly in North America, although this trend has been accelerating in other regions. This shift has seen significant growth in the number of transit agencies procuring ticketing systems that are multi-agency, Software-as-a-Service (SaaS), Shared Platform solutions moving away from tailored systems built specifically for the agency. One of the claimed benefits of moving to a Shared Platform approach is the cost savings available for the agency.
In this White Paper, Consult Hyperion looked at eight transit agencies of varying sizes in the United States that have recently undergone procurement of a new fare collection system, in order to review the costs and assess the potential cost savings for agencies from following a Shared Platform approach over the traditional Bespoke Design-Build.
Send download link to:

Central Bank Digital Currencies in Europe
Consult Hyperion and Norfico were commissioned by EACHA – The European Automated Clearing House Association to produce this in-depth whitepaper on Central Bank Digital Currencies.
The whitepaper is based on research, insights from EACHA’s members and from hands-on experience from ongoing CBDC projects.

The Paypers Financial Crime and Fraud Report 2022
The Financial Crime and Fraud Report 2022 showcases the innovation and development of the best practices and instruments used by financial institutions in their fraud prevention activities, to improve the digital onboarding process of their customers while fighting against financial crime.
Mobile Voting enabled by technology
This paper explores how technological developments will enable more secure remote electronic voting systems, and specifically mobile voting systems to be built.
Send download link to:

The European Payments Landscape in 2030
Send download link to:

Payments are hard
Send download link to:

Technical Due Diligence – Evaluating People, Processes and Technology
Send download link to:
Compass Plus – Future Ready Payments Platforms
Payments platforms sit at the core of a financial institution’s business; a financial institution’s ability to compete by offering new products and services is determined by the flexibility and extensibility of its payments platform.
Send download link to:

DIACC Making Sense of Identity Networks
This DIACC white paper is based on research performed by DIACC member Consult Hyperion and developed in consultation with DIACC through a community review process, provides an objective and impartial comparison of identity networks. Considering the different types of identity networks that currently exist or are being developed, and using ‘Mary’ as an example, the paper presents a high-level framework with which to understand and assess them, offering guidance to those who are considering participating in such a network.

RCS and Payments
Whitepaper from GSMA, discussing RCS as a payments channel and its potential under PSD2 Strong Customer Authentication.

Digital Identity, 3DID: A model for Digital Identity
Digital identity is an area of strategic importance to many organisations. More people than ever are connected through multiple devices to the Internet. Higher value services, such as banking and healthcare, are being delivered digitally.
Send download link to:

Digital Commerce: Understanding the need for security and convenience in online payments
Digital commerce has seen significant growth over the last decade and continues to expand as more businesses create opportunities to interact with their customers in a digital channel.
Send download link to:

MaaS Payments: A Billion Dollar Opportunity
Across the globe, populations are migrating to cities, resulting in congestion and increased pollution. Overall we are travelling a lot less than we did 10 or 20 years ago, but the travel we are undertaking is mostly within cities.
Send download link to:

Open Banking lessons from PSD2: From Compliance to Innovation
PSD2 has been dogged by delays for multiple reasons but the original rationale – to improve competition and innovation – remains tantalisingly out of reach. To move beyond the first stage – compliance – to the second stage – innovation – we need to learn the lessons of existing payment schemes to determine what works and what doesn’t.
Send download link to:

Unleashing the Potential of Open Banking: An analysis of opportunities for payments in open banking and strategies for realising them
The Emerging Payments Association passionately believes that open banking will be a force for good and a driver of innovation, value and positive change in the payments industry.

The EPA’s Guidebook to Digital Identification and Authentication: A guidebook to help keep you and your customers safe in the digital world
Identification and Authentication are important processes that help to keep you and your customers safe in the digital world. They enable you to be confident that you know who your customer is, ensuring that they are entitled to access your service and can continue to do so securely and confidently.
Structured Risk Analysis (SRA) whitepaper
Send download link to:






