Application of bio-verification technology such as fingerprint, iris, facial, retina recognition
the place where the security are paramount, or it can be used in a variety of non-facing channels where security is relatively weak
Utilizing temporary data (Token) to prevent leakage of personal information
Network-based or gateway-based
For mobile payment, two-factor authentication(Pin number+ fingerprints) can be used