表紙
市場調查報告書
商品編碼
986058

移動支付安全性:主要機會,供應商策略,市場預測:2021-2025

Mobile Payment Security: Key Opportunities, Vendor Strategies & Market Forecasts 2021-2025

出版日期: | 出版商: Juniper Research Ltd | 英文 | 商品交期: 最快1-2個工作天內

價格
  • 全貌
  • 簡介
  • 目錄
簡介

本報告調查和分析了移動支付安全市場中的機遇和挑戰,重點介紹了移動數據保護和支付認證的現狀和未來展望,考慮了供應商策略,基準和生物識別支付,提供了包括行業在內的系統信息。基準預測。

目錄

詳細策略/競爭

第1章移動支付安全性:威脅情況

  • 簡介
  • 生態系統概述
  • 移動欺詐趨勢

第2章移動支付數據保護

第3章移動支付數據保護:競爭形勢

  • 簡介
  • 供應商分析/瞻博網絡研究排行榜
  • 支付數據保護動搖器
  • 供應商資料等

第4章移動支付認證

  • 簡介
  • 未來生物識別技術的發展
  • 法規/標準/COVID-19因素的影響
  • 身份驗證問題

第5章移動支付認證:競爭狀況

  • 簡介
  • 供應商分析/瞻博網絡研究排行榜
  • 移動支付認證動搖器
  • 供應商資料

詳細數據/預測

第1章移動支付安全性:威脅情況

  • 簡介
  • 生態系統概述
  • 移動欺詐趨勢

第2章預測先決條件/調查方法

  • 簡介
  • 生物特徵識別預測的先決條件
  • 令牌化預測的先決條件

第3章生物識別預測

  • 生物識別:簡介
  • 非接觸式生物識別支付
  • 生物識別遠程支付

第4章令牌化預測

  • 令牌化:簡介
  • 非接觸式標記
  • 遠程令牌化
目錄

Juniper Research's latest ‘ Mobile Payment Security ’ research provides an exhaustive analysis of the opportunities and challenges in this dynamic market to date. The research highlights the current status and future outlook for both mobile data protection and payment authentication, including the impact of regulation and industry standards. It also provides valuable insights into vendors' strategies, via two Juniper Research Leaderboards on data protection and payment authentication.

The Mobile Payment Security research also provides industry benchmark forecasts for tokenisation and biometrically authenticated payments; supplying key metrics for both in-person and remote transactions, split by transaction type covering:

  • Tokenisation
    • Contactless Payments
    • Remote Payments
  • Biometrics
    • Fingerprints
    • Facial Recognition
    • Iris Scanning
    • Voice Biometrics

This research suite includes:

  • Deep Dive Strategy & Competition (PDF)
  • 5-Year Deep Dive Data & Forecasting (PDF & Excel)
  • Executive Summary & Core Findings (PDF)
  • 12 months' access to harvest online data platform

KEY FEATURES

  • Sector Dynamics: Analysis of key trends and primary challenges across the payment security space; highlighting the impact of:
    • The COVID-19 pandemic
    • Tokenisation regulation and standards
    • Biometric remote payments
    • The evolution of biometric modalities
    • Hardware evolution and considerations
  • Juniper Research Leaderboards : Provided for the payment data protection and authentication sectors, with attendant heatmap-based scoring of 26 key players:
    • BioCatch
    • Braintree
    • Carta Worldwide
    • Daon
    • Duo
    • EdgeVerve
    • Fingerprints
    • Fiserv
    • Fujitsu
    • G+D
    • HYPR
    • IDEMIA
    • ImageWare
    • iProov
    • Mastercard
    • MeaWallet
    • Micro Focus
    • Nuance
    • Okta
    • Protegrity
    • RSA
    • Shift4
    • Stripe
    • Thales
    • Trustonic
    • Visa
  • Interviews: Five leading mobile payment security vendors interviewed, including:
    • Fiserv
    • G+D
    • Okta
    • Thales
    • Trustonic
  • Benchmark Industry Forecasts: Including forecasts for the size and growth of tokenisation, biometric POS payments and remote payments, as well as different modalities. All forecasts are split by the following 19 countries; creating an extensive resource for stakeholders:
    • Australia
    • Brazil
    • Canada
    • China
    • Denmark
    • France
    • Germany
    • India
    • Japan
    • Mexico
    • Netherlands
    • Norway
    • Portugal
    • Saudi Arabia
    • South Korea
    • Spain
    • Sweden
    • UK
    • US

KEY QUESTIONS

  • 1. How is the use of biometrics in mobile payments changing?
  • 2. What forms of tokenisation will be dominant in the future of the market?
  • 3. Which markets will have the strongest adoption of mobile security practices, and why?
  • 4. What impact will new regulatory requirements and standards have on payment security practices?
  • 5. Who are the leading players in mobile transaction security, and what are their strategies?

COMPANIES REFERENCED

  • Interviewed: Fiserv, G+D, Okta, Thales, Trustonic.
  • Case Studied: G+D, Starbucks, Thales.
  • Included in the Juniper Leaderboard for Payment Data Protection Providers: Braintree, Carta Worldwide, EdgeVerve, Fiserv, G+D, IDEMIA, Mastercard, MeaWallet, Micro Focus, Protegrity, Shift4, Thales, Trustonic, Visa.
  • Included in the Juniper Leaderboard for Payment Authentication: BioCatch, Daon, Duo, Fingerprints, Fujitsu, G+D, HYPR, IDEMIA, ImageWare, iProov, Nuance, Okta, RSA, Stripe, Thales.
  • Mentioned: 3dcart, Acuant, African Banking Corporation, Aion, AirBnB, Allegacy Federal Credit Union , AllPay, Amazon, American Airlines, American Express, Amex Express, Amtrak, Andreessen Horowitz, APAC, Apple, Authasas, Avaya, Axepta BNP Paribas, Axis Bank, Bancolombia, Bancorp, Bank Liberty, Barclays, BeyondTrust, BigCommerce, BioSec, BlackBerry, Booking.com, Boomi, Bromium, BT, CapitalG, Central Bank, Cerner, Cisco, Citi, Citrix, Cleveland Clinic, CloudPay HCE, Cornercard, D&B (Dun & Bradstreet), Deliveroo, Dell, Delta, Deutsche Bank, DiData, DiPocket, Discover Financial Services, Dubai Economy, Dubai Police, Emirates NBD, EMK Capital, Entrust Datacard, Epic, Equity Bank, eServGlobal, ETH Zurich, Europay, Experian, Facebook, FIDO Alliance , Financial Conduct Authority, First Data Processing, Fitbit, ForgeRock, Garmin, General Catalyst, Genesys, Github, Global Processing Services, Google, Grab, GSMA, HackerOne, Harbortouch, HealthCare First Credit Union, Hewlett-Packard, HomeSend, Horizon Investments, HPB, HPE, IBM, ICICI Bank, Ideakapital, ImageWare, ImageWare, Index, Indie Hackers, Infosys, ING Bank, Ingenico, Instagram, Invuo Technologies, IR, iTunes, Kaspersky, Kavado, KB Kookmin Bank, KB Star Banking, KDB Bank, Keycloak, Kickoff, Konsentus, Korean Bank, Kotak Mahindra Bank, Kount, LG, Lighthouse Network , Lloyds Banking Group, Lyft, Magento, Mayo Clinic, McDonald's, McKesson, Modulr, Mogo Inc, MoshiMoshi, NBT Bank, Netcetera, Neural Networks, New York Community Bank, NHS, NICE, NIST (National Institute of Standards and Technology), Nok Nok Labs, Ondot,Systems, OpenCart, OpenTable, Oxbury Bank, PalmSecure, Pannovate, Paris School of Business, Payable, PayCentral, Payfare, PayPal, Paystack, PCI SSC (PCI Security Standards Council), Ping Identity, Pivotal, Plaid, Pocket, Portland Local 8 Federal Credit Union, Postbank, Rackspace, RakBank, Ravelin, RCBC, RSA, RSA Security, RunKit, SafetyDetectives, SAIC Venture Capital, Salesforce, Samsung, Santander, SAP, Scio Security, Seamless, Secure Identity Alliance, SecureWorks, Sequoia Capital, Shinhan Bank, Shopify, ShopWare, ShopWired, Siemens, Sionic Mobile, SkyTab, Smartlink, Snowflake, Sodexo, Softonic, SoftPos, Spreedly, Staley Credit Union, Standard Bank, State Bank of India, STG (Summit Technology Group), Sunshine State Systems, SurveyMonkey, Swatch, Synchrony, Teapot, Telefónica, Telegram, Telstra, Telstra, The Guardian, Thrive Capital, Tiger Global Management, Tink, T-Mobile, TOTEMS, Touchtech, TransferWise, Treatwell, Truelayer, TRUSTDOCK, TymeBank, Uber Eats, UCL (University College London), Unicef, UnionPay, UniSwap, United Bank Card, Venmo, Verifast, Verifi, Verint, Verizon, Virtustream, Vocel , Vodafone, W2 Global, W3C, WhatsApp, White Label Alliance, Windows, WooCommerce, Xcelera, Yodel, YouGov, Yubico.

DATA & INTERACTIVE FORECAST

Juniper Research's ‘ Mobile Payment Security ’ forecast suite includes:

  • Mobile biometric authentication payment devices, usage and transaction values, split by:
    • Contactless In-store Payments
    • Remote Payments
  • Biometric adoption and payment usage forecasts split by modality:
    • Fingerprints
    • Facial Recognition
    • Iris Scanning
    • Voice Biometrics
  • Tokenisation adoption and transaction volume, split by:
    • Contactless Tokenisation
    • Remote Tokenisation
  • Tokenisation value forecasts for each tokenisation channel, split by:
    • Single-use Tokens
    • Persistent Tokens
  • 5-year benchmark forecasts for key metrics by 8 key regions and 19 country-level splits including:
    • Australia
    • Brazil
    • Canada
    • China
    • Denmark
    • France
    • Germany
    • India
    • Japan
    • Mexico
    • Netherlands
    • Norway
    • Portugal
    • Saudi Arabia
    • South Korea
    • Spain
    • Sweden
    • UK
    • US
  • Access to the full set of forecast data of 101 tables and over 20,000 datapoints.
  • Interactive Excel Scenario tool allowing the user the ability to manipulate Juniper Research's data for 10 different metrics.

Juniper Research's highly granular IFxls (Interactive Excels) enable clients to manipulate Juniper Research's forecast data and charts to test their own assumptions using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

Deep Dive Strategy & Competition

1. Mobile Payment Security: Threat Landscape

  • 1.1 Introduction
    • 1.1.1 Definitions & Report Scope
  • 1.2 Ecosystem Outline
    • Figure 1.1: Possible Threat Channels
    • 1.2.1 Open Banking: A New Ecosystem Component
  • 1.3 Mobile Fraud Trends
    • 1.3.1 Social Media
      • Figure 1.2: Example of Social Media Fraud
    • 1.3.2 Rogue or Unauthorised Apps
    • 1.3.3 Data Exposure
      • Figure 1.3: Twitter, November 2020
      • Figure 1.4: Fake Update Notice for Electrum Wallet
    • 1.3.4 On-demand Services Platforms and Other Payment App Scams
    • 1.3.5 Fake Enrolment to Hijack Mobile Authentication/Payment Apps
    • 1.3.6 Synthetic Identity and Deepfakes - the Future of Verification and Authorisation Fraud?
      • i. Synthetic Identity Augmented Using Deepfakes.
      • ii. Use of Stolen Biometrics Information
        • Figure 1.5: Prices of Stolen Identities

2. Mobile Payment Data Protection

3. Mobile Payment Data Protection: Competitive Landscape

  • 3.1 Introduction
  • 3.2 Vendor Analysis & Juniper Research Leaderboard
    • 3.2.1 Vendor Assessment Criteria
      • Figure 3.1: Mobile Payment Data Protection Vendor Assessment Criteria
      • Figure 3.2: Juniper Research Payment Data Protection Leaderboard Heatmap
      • Figure 3.3: Juniper Leaderboard for Payment Data Protection Providers
    • 3.2.2 Vendor Groupings
      • i. Summary
      • ii. Established Leaders
      • iii. Leading Challengers
      • iv. Disruptors & Emulators
    • 3.2.3 Limitations & Interpretation
  • 3.3 Payment Data Protection Movers & Shakers
  • 3.4 Vendor Profiles
    • 3.4.1 Braintree
      • i. Corporate
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.2 Carta Worldwide
      • i. Corporate
      • ii. Geographical Spread
  • 2.1 Introduction
  • 2.2 Payment Orchestration and Service Layering
  • 2.3 Tokenisation
  • 2.4 PCI Contactless Payments on COTS or PCI CPoC
  • 2.5 EMVCo Dominance Shaping & Accelerating the Space
    • 2.5.1 EMVCo and IoT
    • 2.5.2 EMV, eCommerce & Interoperability
  • 2.6 P2PE (Point-to-Point Encryption)
    • 2.6.1 White-box Cryptography
  • 2.7 OIDC, FAPI, and Push Authorisation Request
  • 2.8 AI (Artificial Intelligence)
    • 2.8.1 Onboarding
    • 2.8.2 Transaction Behaviours
    • 2.8.3 Network Defences
  • 2.9 Open Banking and the Future of Payments
  • 2.10 Payment Data Protection Challenges
    • 2.10.1 Regulations and Privacy
    • 2.10.2 On-device vs Cloud Storage
      • i. On-device Security: TEE vs SE
    • 2.10.3 Identity
      • i. G+D Convego Service Broker
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.3 Fiserv
      • i. Corporate
        • Table 3.4: Fiserv Financial Snapshot ($bn), 2017-2019
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.4 Thales
      • i. Corporate
        • Table 3.5: Gemalto by Thales DIS Financial Snapshot, (€m), 2018-2019 (FYE 31st December) - Digital Identity and Security Segment Only
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.5 Giesecke+Devrient
      • i. Corporate
        • Table 3.6: G+D Financial Snapshot, (€m) 2018-2019 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.6 EdgeVerve
      • i. Corporate
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.7 Mastercard
      • i. Corporate
        • Table 3.7: Mastercard Financial Performance Snapshot ($m), 2017-2019
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.8 MeaWallet
      • i. Corporate
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.9 Micro Focus
      • i. Corporate
        • Table 3.8: Micro Focus Financial Snapshot ($m), FY 2018-2019
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
        • Figure 3.9: Micro Focus Strategic Partners
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.10 Shift4
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.11 Trustonic
      • i. Corporate
        • Table 3.10: Trustonic Financial Snapshot, ($m), FY2018-2019 (YE 31st December) £'000 (GBP)
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 3.11: Trustonic Solutions
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.12 Protegrity
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • Figure 3.12: Protegrity Partners
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 3.4.13 Visa
      • i. Corporate
        • Table 3.13: Visa Financial Performance Snapshot, ($m), FY2018-20120 (FYE 30th September)
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Visa Consumer Authentication Service
      • vi. Juniper Research's View: Key Strengths & Strategic Development Opportunities

4. Mobile Payment Authentication

  • 4.1 Introduction
  • 4.2 Future Biometrics Development
    • 4.2.1 The Move to Behavioural Biometrics
    • 4.2.2 Facial Recognition by Default
    • 4.2.3 Voice Authentication and inclusion
    • 4.2.4 Fitting the Biometric to the Use Case
  • 4.3 Impact of Regulation, Standards and the COVID-19 Factor
    • 4.3.1 COVID-19 and PSD2
    • 4.3.2 3D Secure 2.2
    • 4.3.3 FIDO2 & WebAuthn
  • 4.4 Authentication Challenges
    • 4.4.1 Convenience vs Security: The Legs of the Swan
    • 4.4.2 Biometrics and Consumer Trust
    • 4.4.3 IoT Authentication
    • 4.4.4 Multiple Platforms and In-App Protection on mPOS and Beyond
      • Case Study: Thales EMV Tokenisation and the Thales Trusted Services Hub

5. Mobile Payment Authentication: Competitive Landscape

  • 5.1 Introduction
  • 5.2 Vendor Analysis & Juniper Research Leaderboard
    • 5.2.1 Vendor Assessment Criteria
      • Figure 5.1: Mobile Payment Authentication Vendor Assessment Criteria
      • Figure 5.2: Juniper Research Payment Authentication Leaderboard Scoring Heatmap
      • Figure 5.3: Juniper Research Leaderboard for Payment Authentication
    • 5.2.2 Vendor Groupings
      • i. Summary
      • ii. Established Leaders
      • iii. Leading Challengers
      • iv. Disruptors & Challengers
    • 5.2.3 Limitations & Interpretation
  • 5.3 Mobile Payment Authentication Movers & Shakers
  • 5.4 Vendor Profiles
    • 5.4.1 Fingerprints
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 5.4: Fingerprints Financial Snapshot, ($ ml converted from SEK M), 2018-2019 (FYE 31st March)
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.2 BioCatch
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.3 Daon
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 5.5: Typical DAON Component Architecture Showing Multi-channel Support
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.4 Duo
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.5 Fujitsu
      • i. Corporate
        • Table 5.6: Fujitsu Financial Snapshot ($bn), 2018-2019 (FYE 31st March)
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.6 HYPR
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 5.7: HYPR Passwordless Flow
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.7 IDEMIA
      • i. Corporate
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.8 ImageWare
      • i. Corporate
        • Table 5.8: ImageWare Financial Performance ($m), FY 2018-2019
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.9 iProov
      • i. Corporate
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.10 Nuance
      • i. Corporate
        • Table 5.9: Nuance Financial Snapshot, ($m), 2016-2018 (FYE 30th September)
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.11 Okta
      • i. Corporate
        • Table 5.10: Okta Financial Snapshot ($m), FY 2018-2020, YE 31st January
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
        • Figure 5.11: Okta Contextual Access Management Contexts
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.12 RSA
      • i. Corporate
        • Table 5.12: RSA Security Financial Snapshot ($m), FY 2018-H1 2020 (YE 1st February)
      • ii. Geographical Spread
      • iii. Key Clients & Strategic Partnerships
        • Figure 5.13: RSA Featured Partners
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities
    • 5.4.13 Stripe
      • i. Corporate
        • Table 5.14: Stripe Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths & Strategic Development Opportunities

2. Deep Dive Data & Forecasting

1. Mobile Payment Security: Threat Landscape

  • 1.1 Introduction
    • 1.1.1 Definitions & Report Scope
  • 1.2 Ecosystem Outline
    • Figure 1.1: Possible Threat Channels
  • 1.3 Mobile Fraud Trends
    • 1.3.1 Social Media
      • Figure 1.2: Example of Social Media Fraud
    • 1.3.2 Rogue Apps
    • 1.3.3 Data Exposure
    • 1.3.4 On-demand Services Platforms and Other Payment App Scams
    • 1.3.5 Fake Enrolment to Hijack Mobile Authentication/Payment Apps
    • 1.3.6 Synthetic Identity and Deepfakes - the Future of Verification and Authorisation Fraud?
    • 1.3.7 Synthetic Identity Augmented Using Deepfakes.
      • i. Use of Stolen Biometrics Information

2. Forecast Assumptions & Methodology

  • 2.1 Introduction
  • 2.2 Biometric Authentication Forecast Assumptions
  • 2.3 Tokenisation Forecast Assumptions
    • Figure 2.1: Biometric Authentication Forecast Methodology
    • Figure 2.2: Contactless Mobile Payment Tokenisation Methodology
    • Figure 2.3: Remote Mobile Payment Tokenisation Methodology

3. Biometric Authentication Forecasts

  • 3.1 Biometric Authentication - Introduction
    • Figure & Table 3.1: Total Smartphones Featuring Biometric Scanners, Installed Base (m), Split by 8 Key Regions, 2020-2025
    • 3.2.1 Available Biometric Authentication Modalities
      • i. Hardware Modalities
        • Figure & Table 3.2: Proportion of Biometric Smartphones Featuring Hardware-based Biometric Modality (%), Split by Category, 2020-2025
      • ii. Software Modalities
        • Figure & Table 3.3: Proportion of Smartphones Capable of Software-based Biometric Modality (%), Split by Category, 2020-2025
  • 3.3 Biometric Contactless Payments
    • 3.3.1 Contactless Biometric Authentication Adoption
      • Figure & Table 3.4: Total Number of Smartphones with Biometrics Used for Contactless Payments (m), Split by 8 Key Regions, 2020-2025
    • 3.3.2 Contactless Biometric Authentication Transaction Value
      • Figure & Table 3.5: Smartphones, Total Transaction Value, Biometrically Authenticated Contactless Transactions ($m), Split by 8 Key Regions, 2020-2025
  • 3.4 Biometric Remote Payments
    • 3.4.1 Remote Biometric Payment Authentication Adoption
      • Figure 3.6: Number of Smartphone Remote Payment Users Verifying Purchases via Biometrics (m), Split by 8 Key Regions, 2020-2025
    • 3.4.2 Remote Biometric Payment Authentication Transaction Value
      • Figure 3.7: Total Transaction Value, Biometrically Authenticated Remote Smartphone Transactions ($m), Split by 8 Key Regions, 2020-2025

4. Tokenisation Forecasts

  • 4.1 Tokenisation - Introduction
  • 4.2 Contactless Tokenisation
    • 4.2.1 Contactless Token Volume
      • Figure & Table 4.1: Number of Contactless Mobile Payments that are Tokenised per annum (m), Split by 8 Key Regions, 2020-2025
    • 4.2.2 Contactless Tokenisation Revenue
      • Figure & Table 4.2: Contactless Tokenisation Revenue per annum ($m), Split by Key Regions, 2020-2025
  • 4.3 Remote Tokenisation
    • 4.3.1 Remote Tokenisation Adoption
      • Figure & Table 4.3: Proportion of Remote Mobile Transactions Using Tokenisation (%), Split by 8 Key Regions, 2020-2025
    • 4.3.2 Remote Tokenisation Volume
      • Figure & Table 4.4: Number of Remote Mobile Payments that Are Tokenised per annum (m), Split by 8 Key Regions, 2020-2025
    • 4.3.3 Tokenisation Revenue
      • Figure & Table 4.5: Remote Tokenisation Revenue per annum ($m), Split by 8 Key Regions, 2020-2025