Application of FIDO2 and PAD Level 2 for Digital Banking

Publish date:

Digital Trust • Banking Security

A practical approach to strengthening authentication, preventing biometric spoofing, and aligning with evolving compliance requirements for Mobile Banking, Internet Banking, and high-risk user journeys.

Executive Summary

Mobile-ID proposes a unified digital authentication layer for banks, combining Trusted Hub FIDO2 Server, Trusted Key FIDO2 Client/Authenticator SDK, and Face Match + PAD Level 2. The objective is to reduce reliance on traditional OTP, enhance resistance against phishing and deepfake attacks, and establish a foundation for a controlled transition toward passwordless banking.

Phishing-resistant authentication
Face Match + PAD Level 2
Policy-driven step-up
Audit-ready trust orchestration

Digital banking is facing a dual pressure: simplifying the customer experience while simultaneously strengthening security to prevent phishing, account takeover, biometric spoofing, and increasingly sophisticated fraud. In this context, authentication models heavily reliant on traditional OTP are exposing growing limitations in terms of security level, authentication evidence quality, and operational efficiency.

Mobile-ID’s approach does not treat FIDO2 as merely a new login feature. Instead, it is positioned as a Digital Trust Layer that can be reused across multiple channels and risk journeys, from everyday login to high-value transaction confirmation, device reactivation, and identity data changes.

Why do banks need to upgrade the authentication layer now?

Regulatory frameworks for digital banking are shifting from simply requiring “authentication” to demanding “strong authentication with device control, application control, provability, and auditability.” According to this direction, banks need a solution that not only handles login but also covers device changes, reactivation, identity updates, and transactions with abnormal signals.

In particular, when facial biometrics are used as a security factor for critical journeys, simple face matching is no longer sufficient. Systems require an additional layer of Presentation Attack Detection (PAD) Level 2 to enhance resistance against photo attacks, replay attacks, video injection, deepfakes, and other advanced spoofing techniques.

Security pressure Phishing, social engineering, malware, SIM swap, and account takeover are becoming increasingly complex.
UX pressure Customers expect faster login and transaction approval with fewer steps.
Compliance pressure Banks require stronger authentication with higher-quality evidence and better audit support.
Operational pressure A unified trust layer is needed across Mobile Banking, Internet Banking, and back-office systems.

What are the biggest challenges of OTP and soft OTP?

SMS OTP and soft OTP still play roles in many legacy systems, but this model relies on shared secrets per session or per transaction. This makes OTP an attractive target for phishing, SIM swap, social engineering, and malware attacks targeting end-user devices.

From a banking perspective, the three biggest limitations are fraud risk, user experience, and the quality of authentication evidence. In dispute scenarios, banks often need stronger proof that the legitimate user, on a legitimate device, actually approved the action.

What makes FIDO2 different for digital banking?

The core differentiator of FIDO2 lies in its device-bound asymmetric key model. The private key is securely stored locally on the user’s device, while the public key resides on the authentication server. This significantly reduces phishing risks while improving the quality of authentication evidence.

In Mobile-ID’s proposed architecture, FIDO2 is used not only for login but also for step-up authentication, transaction confirmation, and high-risk re-verification journeys. This enables a gradual transition toward passwordless banking aligned with each channel’s readiness.

Component Role Banking Application
Trusted Hub FIDO2 Server Orchestrates FIDO2/WebAuthn, manages credential lifecycle, challenge, assertion, attestation, and audit trails. Acts as a trust broker for Mobile Banking, Internet Banking, back-office, and high-risk journeys.
Trusted Key FIDO2 Client SDK for Android/iOS Integrated into banking apps for credential registration, authentication, and transaction signing. Used for new devices, login, step-up, and transaction confirmation.
Trusted Key FIDO2 Authenticator SDK for Android/iOS Enables banks to control authenticator experience and policy. Suitable for bank-branded authenticators with lifecycle and UX control.
Face Match + PAD Level 2 Facial authentication combined with biometric anti-spoofing. Applied for device change, factor reset, identity updates, and high-value transactions.
Policy / Risk Orchestration Decision-making based on user context, device, behavior, and limits. Determines when to use standard login, step-up, or FIDO2 combined with PAD.

What problems does PAD Level 2 solve that basic face match cannot?

Many banks have implemented facial recognition for onboarding or re-authentication. However, when facial biometrics become a security factor for financially impactful or identity-critical journeys, simple face matching is insufficient. The system must also defend against presentation attacks.

PAD Level 2 adds protection against spoofing techniques such as printed photos, video replay, masks, and deepfakes. This is critical in scenarios like device reactivation, account unlock, authentication reset, identity profile changes, or high-value transactions with abnormal signals.

Target architecture: from banking apps to a trust orchestration layer

The proposed architecture is designed for seamless integration with existing banking ecosystems. Front-end channels include Mobile Banking, Internet Banking, corporate banking, and journeys supported by back-office or contact centers. Behind them is the trust orchestration layer hosting Trusted Hub, policy engine, transaction approval, device binding, and Face Match + PAD Level 2.

The integration layer connects to IAM/CIAM, Core Banking, CIF, API Gateway, fraud engine, notification systems, and SIEM. On top is the operations and governance layer ensuring logging, audit trails, HA/DR, security monitoring, and audit readiness. This model clearly separates authentication, risk decisioning, and transaction execution across microservice boundaries.

Priority flows for initial implementation

1. Device registration and FIDO credential enrollment

Users authenticate via existing mechanisms or verified identity flows. The application checks device integrity and app version, then invokes Trusted Hub to initiate credential registration. The credential is bound to the account, device, and usage policy.

2. Daily login

The app or web channel sends an authentication request to Trusted Hub. Users authenticate locally via device biometrics or policy- compliant unlock methods. Trusted Hub verifies the assertion, returns the authentication result, and records a complete audit trail.

3. High-risk transaction confirmation

The risk or policy engine evaluates the transaction. When thresholds are exceeded or anomalies are detected, step-up authentication via FIDO2 is triggered. For more sensitive cases, Face Match + PAD Level 2 may be required before execution.

4. Identity or device changes

These are high-risk journeys. Mobile-ID recommends stronger re-verification than standard login, combining FIDO2, PAD Level 2, and additional policy checks, while ensuring sufficient evidence is stored for audit and dispute resolution.

Compliance mapping aligned with regulatory requirements

The proposal emphasizes a practical approach that simplifies compliance matrix creation and acceptance documentation. Mobile-ID’s model maps regulatory requirements to technical controls and operational processes.

Requirement Group Implementation Meaning Suggested Solution Mapping
Electronic transaction authentication Requires stronger methods than OTP with better evidence for login and transaction approval. Apply FIDO2 for login, step-up, and transaction confirmation.
PAD for facial biometrics High-risk face authentication requires compliant anti-spoofing capabilities. Integrate Face Match + PAD Level 2 within Trusted Hub.
Application and device control Apps must detect unsafe environments and apply protective measures. Combine Mobile-ID SDK with mobile app security and runtime integrity controls.
Application version control Outdated or insecure app versions must be blocked in sensitive scenarios. Implement version policies, minimum supported versions, and anti-downgrade mechanisms.

Implementation approach and roadmap

To align with real banking environments, Mobile-ID structures rollout into phased stages to control risk while delivering early value.

  • Phase 1 – Foundation & Compliance Baseline: assess current state, integrate Trusted Hub with mobile apps, internet banking, IAM/CIAM, and fraud engines; establish security baseline, logging, and monitoring.
  • Phase 2 – Strong Authentication for Key Journeys: extend FIDO2 to step-up authentication and transaction confirmation for priority journeys.
  • Phase 3 – PAD Level 2 for High-Risk Journeys: integrate Face Match + PAD Level 2 for device change, authentication reset, identity updates, and sensitive transactions.
  • Phase 4 – Enterprise Scale & Optimization: expand to Internet Banking and corporate banking, optimize performance, DR drills, and operational KPIs.

Operating model, security, and integration

The solution is designed to be bank-grade, covering not only authentication functionality but also operational requirements such as HA/DR, audit trails, event logging, policy management, credential lifecycle management, fraud engine integration, and incident investigation support.

On the mobile layer, it can integrate with protections like root/jailbreak detection, anti-hooking, anti-repackaging, runtime integrity, and version control policies. On the backend, the Trust Layer centralizes authentication logic and evidence instead of distributing it across multiple channels or applications.

Business value for banks

Fraud risk reduction FIDO2 improves phishing resistance; PAD Level 2 strengthens biometric anti-spoofing.
Improved evidence quality Provides clearer audit trails for login, step-up, and transaction approval.
Enhanced UX Passkeys and device biometrics reduce friction and accelerate authentication.
Scalable foundation Enables gradual evolution toward passwordless banking and reusable trust services.

Why choose Mobile-ID?

Mobile-ID’s differentiation lies in offering a complete FIDO2 stack from client and authenticator to server, tightly integrated with policy engines, Face Match + PAD Level 2, and evidence layers tailored for banking environments. This reduces multi-vendor integration risks, increases consistency, and gives banks greater control over both user experience and risk management.

Rather than providing a standalone SDK or authentication server, Mobile-ID positions the solution as a scalable trust orchestration layer aligned with real-world banking operations in Vietnam.

Looking to build a modern trust layer for digital banking?

Mobile-ID can support banks in evaluating and implementing FIDO2, PAD Level 2, and policy-driven strong authentication aligned with existing architecture, risk appetite, and compliance goals.

Contact Mobile-ID

Community Discussion

Comments

Related Posts

FacialSense advanced facial authentication spoof detection aligned with ISO/IEC 30107-3

Biometric Identity & Presence FacialSense is introduced as a biometric platform designed to support multiple real-world use cases, including attendance tracking, presence management, visitor management, education, healthcare, hospitality, and mobile…

GoPaperless evolves into CLM/IAM—from a digital signing portal to a full agreement lifecycle management platform.

Agreement Lifecycle Platform Overview In many organizations, digital signatures only address the final “checkpoint” of a document. Greater value lies in controlling the entire journey of an agreement — from…

Post-quantum remote signing for long-term digital trust

Quantum-Safe Remote Signing Ecosystem Mobile-ID positions a Quantum-Safe Remote Signing ecosystem for contracts, digital dossiers, enterprise eSeals, and evidentiary records—designed for organizations that require legal validity, auditability, and long-term retention.…

Application of PQC Remote Signing via ASiC Container

Quantum-Safe Signing · Digital Dossier · ASiC-CAdES A practical approach to building high-trust electronic dossiers, preserving digital evidence, enabling multi-layer authentication, and laying the foundation for transitioning from traditional digital…

Trusted SIC – Unifying Remote Signing and Passkey for a standardized, secure and multi-CA digital signature experience.

Digital Trust · Remote Signing · Passkey Trusted SIC is positioned as a unified web-based digital signing interaction layer, integrating FIDO2/WebAuthn/SPC authentication with remote signing infrastructure and a multi-CA model.…

CheckID ET100 and VNeID – Unifying Identity, Consent, and Digital Trust Experience at the Transaction Counter

Digital Identity • VNeID • Digital Transaction Counter A practical implementation model that integrates CCCD card reading, facial authentication support, QR code display, and Level 2 VNeID consent orchestration into…

This website uses cookies

By clicking "Accept all", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.

Custom cookie preferences

These cookies are required for the website to function properly. They do not collect data for advertising purposes and cannot be disabled, as this would break the site's basic functionality.

Always active

These cookies remember your choices and settings to provide a more personalized experience, such as your selected language, dark/light theme, font size, region, or other customizations.

These cookies help us understand how visitors interact with the site. All data is fully anonymized and used solely to improve site performance, loading speed, and content quality—no personal identification.

These cookies enable us to show you more relevant ads on our site and across other platforms. They anonymously track your browsing behavior and prevent the same ad from appearing repeatedly.