ITU DFS BSA Application Challenge Participation Guidelines
ITU DFS BSA Application Challenge Participation Guidelines
Participation guidelines
Table of Contents
1 Introduction ............................................................................................................................................... 2
2 Terms and Conditions of Participation ....................................................................................................... 3
3 Problem Statement .................................................................................................................................... 4
3.1 Tasks for Participants ..................................................................................................... 6
3.2 Implementation Guidelines ............................................................................................ 6
3.2.1 Task 1: Develop or utilize their own existing DWA ...................................................................... 6
3.2.2 Task 2: Integrate Passwordless Login Authentication for user login ............................................ 7
3.2.3 Task 3: Passwordless Authentication for Access Control ............................................................. 7
3.2.4 Task 4: Passwordless Authentication for Payment Transactions .................................................. 8
4 Phases of the Challenge ............................................................................................................................. 8
4.1 A: Launch and Registration ............................................................................................. 8
4.2 B: Induction Bootcamps.................................................................................................. 8
4.3 C: Competition ............................................................................................................... 9
4.4 D: Evaluation.................................................................................................................. 9
4.4.1 Preliminary Evaluation ................................................................................................................ 9
4.4.2 Jury Evaluation ............................................................................................................................ 9
4.4.3 Evaluation Criteria ..................................................................................................................... 10
4.5 E: Showcase and Award ................................................................................................ 12
4.5.1 Promotion: ................................................................................................................................ 13
4.5.2 Awards and Certificates:............................................................................................................ 13
5 Resources for participants........................................................................................................................ 13
6 Governance Structure .............................................................................................................................. 13
6.1 Challenge Management Board ...................................................................................... 13
6.2 Jury Panel .................................................................................................................... 13
7 Open Source ............................................................................................................................................ 14
8 Code of Conduct....................................................................................................................................... 14
9 Benefits .................................................................................................................................................... 14
9.1 Benefits for participants ............................................................................................... 14
9.2 Special Benefits for certain sponsor categories .............................................................. 14
10 Contact Information ................................................................................................................................. 14
1 Introduction
The ITU BSA Application Challenge (hereinafter the “Challenge”) aims to promote the utilization of Blockchain
Secure Authentication (BSA) in digital financial services applications to address existing insecurities in
authentication processes within DFS. The Challenge motivates developers to cultivate skills necessary for
deploying BSA authentication, advocating the replacement of conventional passwords with more robust
authentication protocols grounded in blockchain technology.
Reach: The first edition of the Challenge will focus on attracting developers and regulators on strong
authentication DFS applications using Blockchain Secure Authentication.
• Timeframe: The Challenge consists of the following stages:
A. Launching of Application and ITU Circular: 1st week of April
B. Registration for application challenge starts: First week of April – 30 April 2024
C. Induction Bootcamps: Weeks of 13 May, and 20 May, and 24 June 2024
• 14 – 15 May 2024 08:00–11:30 CEST
• 16 – 17 May 2024 14:30–17:00 CEST
• 24 June 2024 08:00–09:30 CEST (Q&A session)
• 24 June 2024 14:00–15:30 CEST (Q&A session)
D. Competition: 13 May 2024 – 1 August 2024
E. Evaluation:
• Preliminary evaluation: Second week of August
• Jury Evaluation: September 2024
F. Results:
• Awards: 13 October 2024
• Showcase: 14 – 24 October 2024
• Teams comprising 1 to 5 members solve the problem statement with 4 Tasks on Blockchain Secure
Authentication.
• Problem statement: In today's digital landscape, where safeguarding data is paramount, the reliance on
passwords as the primary authentication method poses a significant challenge. Despite their widespread use,
passwords often represent a weak point in cybersecurity, vulnerable to various attacks such as phishing, brute
force, and credential stuffing. Many individuals opt for simplistic passwords, reuse them across different
platforms, or neglect to update them regularly due to the complexity of managing multiple credentials. This
behavior heightens the susceptibility of digital financial services (DFS) accounts and systems to unauthorized
access and breaches. Hence, it is essential to explore, develop, and embrace innovative authentication
technologies and strategies like multi-factor authentication (MFA), biometrics, and blockchain secure
authentication (BSA) to fortify cybersecurity defenses, elevate user experience and trust in digital platforms,
and address the global password dilemma.
• Motivation of participants: Participants will compete for prizes, ITU certificates and global recognition.
Participants will also gain value from the opportunities to learn about implementation of BSA. The solutions
from the top three participants will be showcased during World Telecommunications Standard Assembly
(WTSA) and winners will be announced at the ITU Global Standards Symposium (GSS) on 14 October 2024.
• Bootcamps: ITU will organize a series of online bootcamps webinars to explain the problem statements and
provide an online discussion forum to assist participants during the Competition Phase.
• Prizes: The Challenge offers a first prize of USD 5,000, a second prize of USD 3,000, and a third prize of USD
2,000, all sponsored by FNSV Co. Ltd (hereinafter “FNSV”).
• All events will take place online.
• Participants are encouraged to submit open-source solutions.
• Open source: The Challenge encourages the submission of open-source implementations to enable a broad
range of stakeholders to access the outcomes of the Challenge and continue collaborating with relevant
Challenge participants.
2
2 Terms and Conditions of Participation
2.1. The Challenge will be open to natural persons, groups of no more than 5 natural persons, and legal persons
from all ITU Member States (hereinafter “Participants”)
2.2. The following persons shall not be eligible for participation in the Challenge:
a. ITU personnel;
b. members of family or household of ITU personnel;
c. individuals holding an offer for future employment with ITU;
d. individuals employed by or related to members of the Challenge Management Board;
e. individuals employed by or related to members of the Jury Panel;
f. FNSV personnel;
g. members of family or household of FNSV personnel; and
h. individuals holding an offer for future employment with FNSV.
2.3. By entering the Challenge, Participants consisting of groups (of no more than 5 natural persons) shall sign an
undertaking confirming their agreement to designate and authorize one individual from among each group to
accept the disbursement of a prize on its behalf in the event such a prize is awarded to that group.
2.4. By registering for participation in the Challenge, Participants accept the Participation Guidelines, including
these terms and conditions.
2.5. ITU reserves the right to verify the eligibility of all Participants as well as the accuracy of their submitted
information. ITU also reserves the right to disqualify Participants if it reasonably considers that the information
they have provided and/or their Submissions do not comply with the terms, instructions and guidelines provided
in the Challenge website (https://zindi.africa/competitions/itu-digital-financial-services-blockchain-secure-
authentication-application-challenge), the Challenge online registration form, as well as the present terms and
conditions.
2.6. By entering the Challenge, Participants warrant that all information submitted by them is true, complete, and
up-to-date and that they are authorized to participate on behalf of their institutions/organizations (as the case
may be).
2.7. Participants acknowledge and agree that their participation in the Challenge is free of charge, but does not
entail any right to compensation of any kind or to reimbursement of any expenses incurred.
2.8. ITU will not provide any equipment or technical/communication infrastructure necessary to participate in the
Challenge.
2.9. The Challenge will be organized and administered by ITU. Participants will follow relevant instructions
available at: https://zindi.africa/competitions/itu-digital-financial-services-blockchain-secure-authentication-
application-challenge
2.10. Participants’ submissions must be provided in English.
2.11. Participants’ submissions must not: (a) violate the intellectual property rights of third parties; (b) be illegal
under applicable national laws and international law; and (c) depict or incite hatred, defame, abuse, harass, stalk,
threaten a specific person or social group, incite violence or conflict or otherwise violate the legal rights of third
parties (including those of privacy and publicity).
2.12. Participants’ submissions must be original unpublished works that are not currently under review by under
another challenge/competition or journal and must be solely owned by participants. Participants may only take
credit for their own original work. Where required, Participants shall add citations and give credits to others.
Plagiarism will result in immediate disqualification from the Challenge.
2.13. ITU shall not be responsible for any lost, late, corrupted, mutilated or misdirected Submissions, or
Submissions not received within the established deadlines.
2.14. All participants will retain the intellectual property rights on the contents of their submissions. However, by
entering the Challenge, each participant grants ITU a limited, non-exclusive, global, royalty-free right and license
to use, reproduce, communicate, demonstrate, make available for public, display and distribute the content of the
submissions for ITU’s marketing, promotional, informational and educational or awareness purposes, via printed,
3
digital or online media, including ITU’s website. Participants shall represent that they have the legal right to grant
such license to ITU. Participants also permit ITU to use their names, likeness, video(s) and/or photograph(s) in
connection with the Challenge, in any media, worldwide, at no remuneration. Participants understand and agree
that the Organizers may also create content based on their updates, such as success stories, blog posts, photos or
social media postings which may be published on ITU’s websites, the Challenge website, as well as other
communication channels and made available to the public, at ITU’s discretion.
2.15. Participants may not use the ITU’s name, emblems or the logos of any its events in any online or offline
communication, without its prior written permission.
2.16. In addition to the terms of the general privacy notice of ITU’s website, the following terms shall apply with
respect to the collection and processing of Participants’ personal information by ITU and its subcontractors for the
Challenge:
a. Participants hereby provide their consent for the processing and storage by ITU of all contact
information submitted by them to ITU (hereinafter, the “Participant Data”), for the purpose of managing
their participation requests and enabling and facilitating their participation in the Challenge. Participants
acknowledge that, to the extent that it is necessary, ITU may pass such Participant Data to third parties
who assist ITU in the organization and management of the Challenge or provide Challenge-related
services on behalf of ITU. Prior to sharing Participant Data with third parties, ITU will satisfy itself that
such third parties afford appropriate protection with respect to the processing of personal information.
b. In the event the Challenge is hosted on a third-party platform, access and/or use of the respective
platform may be subject to additional terms and conditions as set out by that third party, including such
third party’s privacy policy. Participants are encouraged to review these terms and conditions prior to
deciding to participate in the Challenge.
c. ITU may also use the Participant Data to provide Participants with additional information in relation to
other upcoming ITU events which ITU reasonably believes could be of interest to Participants, and to
carry out surveys in relation to ITU events. Each participant may choose not to receive information related
to ITU events by unsubscribing from such communications, using the “unsubscribe” link.
2.17. By entering the Challenge, Participants agree to release and hold ITU harmless from and against any and all
claims, expenses, and liability, including but not limited to negligence and damages of any kind to persons and
property, infringement of trademark, copyright or other intellectual property rights arising out of or relating to
their participation in the Challenge and the contents of their submissions.
2.18. You acknowledge and agree that the Organizers are entitled to modify the content of the Challenge website
and/or the present terms and conditions and to abbreviate, modify, suspend, cancel or terminate the Challenge
(partially or in its entirety) without any obligation (present or future), by notifying you via an announcement at
the Challenge website (https://zindi.africa/competitions/itu-digital-financial-services-blockchain-secure-
authentication-application-challenge).
2.19. ITU reserves the right to make all final decisions regarding the Challenge.
2.20. Nothing herein shall be considered to be a limitation or a waiver of the privileges and immunities of ITU,
which are specifically reserved.
3 Problem Statement
The problem statement for the Challenge is as follows:
Bank A is embarking on a transformative journey in digital banking with the introduction of the Digital Wallet
Application (DWA) to be developed. This initiative prioritizes strong authentication methods to enhance customer
experience and ensure secure, seamless passwordless authentication using BSA across web and mobile platforms.
The DWA will facilitate convenient access to customer profiles and digital wallet services. Bank A is dedicated to
providing a secure and user-friendly digital onboarding process, enabling customers to access their accounts
anytime, anywhere.
Objective:
To develop or submit an existing fully functional digital wallet application that is compatible with both web and
mobile platforms, utilizing Passwordless BSA as the sole authentication method. Additionally, the same mobile
application will serve as the application’s authenticator for Passwordless BSA.
4
Key DWA Requirements:
1. Basic Functionalities:
a. UI/UX (including but not limited to home page, splash screen, intuitiveness of the application
flow, branding, functioning menus/buttons, overall visuals and aesthetics)
b. User account registration and account deletion
c. User account login and logout
d. Push notifications
2. Digital Wallet features:
a. Implement balance inquiry functionality allowing users to check their wallet balance.
b. Include a transaction history feature enabling users to view their past transactions.
c. Enable wallet-to-wallet transfers allowing users to send funds to other users' wallets.
d. Implement wallet reloading functionality enabling users to add funds to their wallets.
3. Passwordless Blockchain Secure Authentication (BSA) Authentication
a. Implement Passwordless BSA for 3 key components:
i. Login: Users must authenticate using BSA to access the digital wallet application.
ii. Access Control: Users must further authenticate to access restricted sections such as
the user profile and Account Balances page.
iii. Payment Transactions: BSA authentication is required before executing any wallet-to-
wallet transfers or wallet reloading actions.
b. Device Registration/Deregistration for BSA
c. Mobile application component to function as authenticator for BSA authentication.
Here is the outline of Digital Wallet Application (DWA)’s minimum expected functionalities, including but not
limited to the list below:
Participants have the freedom to exercise creativity and incorporate additional features into the DWA, as long
as they meet the minimum expected functionalities.
The following items will be provided to each participant:
i. BSA Web SDK and documentation
ii. BSA Mobile SDK and documentation
iii. BSA Documentation (APK Manuals, User Onboarding Manuals, Server Provision guidelines)
iv. FNSPay Demo application and documentation (for reference)
5
Notes for participants:
• For mobile application development, participants shall develop on Android platforms only.
• The BSA-integrated mobile application will serve as the application’s authenticator for Passwordless BSA.
• For the web and mobile application, participants can choose to either develop or utilize their own existing
DWA.
• Participants without infrastructure for the development of the DWA may request for server provision
after creating/joining a team.
6
Note: Participants who submit existing applications must ensure that the application includes the listed functions.
While additional functions are acceptable, the application must not lack any of the required features
(functionalities i-x).
Note: Participants are permitted to integrate passwordless access control authentication into additional functions
of the application; however, adherence to the above list of functions is mandatory.
7
3.2.4 Task 4: Passwordless Authentication for Payment Transactions
Objective
To successfully integrate passwordless BSA for payment transactions, the application is required to initiate an
authentication process before executing any transactions.
Criteria:
1. Payment Transaction Authentication
a. Implement passwordless BSA authentication (biometrics or passcode) for the execution of
payment transactions, such as:
i. Wallet reloads
ii. Wallet-to-wallet transfers
b. Restrict the reloading or transferring of wallet credits until the authentication process is
successfully completed.
c. Upon successful authentication, proceed with the complete execution of transactions.
d. Complete the authentication process in under 20 seconds, including application processing time.
e. Clearly display success and failure messages upon authentication.
Note: Participants are prohibited from utilizing real money or authentic payment gateways within the
application. Instead, they are required to solely employ virtual numbers resembling currency for all
transactions.
*Attention Participants: Please be aware that the Firebase Cloud Messaging (FCM) SDK creates a unique
registration token for each client app instance. It is crucial that this token is included in your JSON submission
and shared with ITU to facilitate integration with the BSA. See instructions on how to generate the key here
8
e) Pre evaluation requirements
f) Evaluation criteria
g) User access to Virtual Machine – Provided on request from participants
h) Documentation on the Web APIs and Mobile SDK
i) Manual Guide BSA/FNSPay APP (for reference)
j) A discussion forum for peer and expert interaction
The Bootcamp will be conducted through a series of webinars and the schedule can be viewed on
https://itu.int/en/ITU-T/dfs/seclab/Pages/challenge.aspx
4.3 C: Competition
During this phase, participants will concentrate on developing the solutions outlined in the problem statement.
Upon completion, teams must submit their applications/solutions as per the problem statement requirements,
along with the following additional materials:
a. The DWA mobile APK
b. The DWA web URL
c. Provide a comprehensive report in PDF format consisting of the following:
i. System Architecture
ii. Process Flows
iii. Application Manual or Guidelines
iv. Test Scripts with results
d. Provide a 5-10 minute video demonstrating the application functionalities and authentication
flow
e. Source Code to be submitted to a centralized GitHub repository.
ITU will also host a midterm bootcamp to gather feedback from teams and provide updates on their solutions to
the problem statement.
4.4 D: Evaluation
4.4.1 Preliminary Evaluation
ITU conducts an initial review to verify that each submission is complete. FNSV to conduct preliminary evaluation
to shortlist finalists for the final round. Preliminary evaluation will be assessed based on Sections A and B only.
4.4.2 Jury Evaluation
The Jury Panel will meet to evaluate the submissions based on the following criteria, categorized into three
sections: Section A, Section B, and Section C. Section B is further segmented into four subsections, B1 to B4.
The maximum total points achievable in this Challenge is 130 points, distributed as follows:
Maximum
Section Subsection
Points
9
Section B4: BSA Backend Integration 22
Example: To calculate the final score, let's consider Participant A who received the following scores:
a) Section A: 25 points
b) Section B1: 15 points
c) Section B2: 12 points
d) Section B3: 10 points
e) Section B4: 20 points
f) Section C: 14 points
Participant A's final score is determined by adding up the individual scores as follows: 25 + 15 + 12 + 10 + 20 + 14
= 96 out of 130 points. This translates to a percentage of 73%.
4.4.3 Evaluation Criteria
Below are the evaluation criteria, crafted to assess the effectiveness, user experience, and overall quality of the
BSA integration. This evaluation criteria are divided into sections: Section A, Section B, and Section C; Sections B
includes 4 subsections.
Section A: Task 1 - Develop or utilize an existing DWA
No. Item Aim Sub-Item
1.1 Login Page
1.2 Home Page
1.3 Logo
1.4 Branding
Encompasses the 1.5 Visuals & Aesthetics
overall design and 1.6 Navigation
functionality of the 1.7 User account registration
DWA. It evaluates the 1.8 User login
user interface (UI) 1.9 User logout
and user experience
1.10 User Deletion
Web and Mobile (UX) aspects,
1.11 BSA Device Registration
1 Application including the
1.12 BSA Device De-Registration
(35 Points) intuitiveness of the
1.13 Account Balance Inquiry
UI, the seamless flow
of the application, 1.14 User profile page
and the overall 1.15 Push notifications
functionality as a 1.16 Transactions history
digital wallet 1.17 Wallet reloads
application. 1.18 Wallet-to-wallet Transfers
1.19 Wallet-to-wallet Receiving
1.20 Responsiveness
1.21 Loading Time
1.22 Consistency
10
• Section B4 - assesses the integration aspect of the application
Section B1: Task 2 - Integrate Passwordless Login Authentication for user login
11
Transactions Presence of transaction authentication
4.3
Authentication when attempting to transfer credits
within the Functionality of transaction authentication
4.4
application, ensuring when attempting to transfer credits
that authentication is 4.5 Error Display Message
required before any 4.6 Authentication Speed
payment Inaccessibility before Transactions
transactions are 4.7
Authentication
made. Inaccessibility during Transactions
4.8
Authentication
a) The Jury Panel prepares a shortlist of the top 6 participants based on the above criteria.
b) Final Presentations:
• The top 6 teams will be notified by ITU two weeks before the presentation to the Jury Panel.
• Each team will need to prepare a PowerPoint presentation of 20 minutes duration to showcase their
work to the Jury Panel.
c) Finalization of Rankings:
• The Jury Panel finalize the results of the Challenge after the final presentations.
12
4.5.1 Promotion:
• Promotion of the challenge results and winning applications follows the announcement.
6 Governance Structure
NAME AFFILIATION
SECRETARIAT
13
7 Open Source
The Challenge encourages the submission of open-source implementations, based on (ITU) standards. Open-
source code will enable a broad range of stakeholders to access the outcomes of the Challenge and continue
collaborating with relevant participants.
8 Code of Conduct
All participants must adhere to the Code of Conduct To Prevent Harassment, Including Sexual Harassment, at UN
System Events (available at https://www.un.org/management/sites/www.un.org.management/files/un-system-
model-code-conduct.pdf).
9 Benefits
10 Contact Information
Email: [email protected]
Website: https://itu.int/en/ITU-T/dfs/seclab/Pages/challenge.aspx
Discussion board: ITU Digital Financial Services Blockchain Secure Authentication Application Challenge - Zindi
14