Security by Your Own Device Keypasco AB, May 2015.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

BUSINESS PLAN Project Brief: Facilitating general public to have Cash-in-hand by converting mobile phone credit to cash. And transfering the credit to.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
Cloud Usability Framework
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Certificate and Key Storage Tokens and Software
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
- 1 - Gateway to Managed Payment Services Extending your Sales Channels Accept secure on-line internet payments Vision and Strategy YESpay E-Commerce.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
© JoyBrix Entertainment, Mobarm Group. All rights reserved.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Two Factor Authentication On Mobile, Solution for tomorrow? Nicolas Fort, Product Manager Solution for today !
CEO Roger Larsson. Decuma AB Founded Nov Founders Research in Computer Vision at Lund University Sweden Unique & patented technology (GIT) Key.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Online Parking System.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Company Profile. MerchantPro Express (MPX)  MerchantPro Express (MPX) is a credit card payments processing company, powered by industry leader First.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
Mexican Internet Association, AMIPCI The Mexican Internet Association (AMIPCI) was founded in It integrates the most influential.
1 1 Patented QR code solutions James Wu We Simplify Security.
Momail The fastest, smartest and most cost-effective mobile solution on the market today.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
Innovation is Our Passion Online Banking Past, Present and Future.
Electronic Banking & Security Electronic Banking & Security.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Team Spirit Company: LifeApps sp. z o.o. LIFE APPS LifeApps Sp. z o.o. is a mobile software development company focus on SAP technology. We have been.
Simple Energy Project Big Data in Microsoft Azure Enterprise Cloud Computing Platform We simplify Utilities processes.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Your Lack Of Visibility And Control Is Hurting Your Business Kyle York Chief Strategy Officer,
Windows App Development Company India
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
CLOUDENTIFY.
Mastercard Identity Check Mobile
CENTRALIZED AUTHENTICATION SERVICES THROUGH MOBILE PHONE
PRECISE BIOMETRICS CORPORATE PRESENTATION
Want to be secure? Eliminate passwords.
Business in a Connected World
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
October 27, 2016 EMV 3DS Seizing the opportunity to enhance security and deliver a great consumer experience September 22, 2018.
ShootersPost Sneak Peek
The Evolution of Money and Biometrics
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Getting Started.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Getting Started.
An introduction to CensorNet
Presentation transcript:

Security by Your Own Device Keypasco AB, May 2015

Keypasco was founded in 2010 by the founders of the company Todos, which was acquired by Gemalto in Todos has developed hardware tokens since 1987 for the e-banking market. Todos products are today still used by a large number of banks due to its good security. By 2010, 75 banks and 20 million devices had been delivered Our Previous Success Keypasco AB 2

Keypasco offers a Global network: Headquarter in Sweden Subsidiary in China Partners in China, Taiwan, Vietnam, Brazil, Russia and Turkey Pending partners in Japan, UAE, Poland, India, Malaysia, USA Today we have two live production customers; Gamania, and Wayi (online gaming), and 4 Banks are rolling out in June/July of The end-user base is 7.6M. Live evaluations and POC are today on-going with multiple financial and gaming companies in Russia, Poland, China, Vietnam, Brazil and Taiwan Keypasco founded2012 Keypasco Solution launched at RSA Conference Gamania goes live Wayi goes live E-Sun Bank + 3 banks Keypasco – the company Keypasco AB 3

2014 Keypasco was awarded the Product Innovation Leadership Award for Secure Authentication by Frost & Sullivan, which describes Keypasco as “a true pioneer of the 21 st century for mobile security”. “Recipients of this award represents the top ten per cent of their industry: the other ninety per cent just can’t keep up”. “Frost & Sullivan's independent analysis of the Secure Authentication market clearly shows that Keypasco is a game changer by developing a realistic solution that mitigates authentication spoofing while remaining practical to the user. “ An award-winning solution Official Press release: Frost & Sullivan Pressrelease & Award (21st July 2014) Keypasco AB 4

Source: Finansiell ID-Teknik BID AB 2014 When the user has a choice, the choice is Mobile Security BYOD Keypasco AB 5

Very few have good online security today, and those who have use expensive solutions (Hardware Tokens, PKI etc.). More and more move to Mobile and Cloud, but the security is falling behind! Our vision is to offer a software-based security solution for the Cloud, affordable for everyone! Security by Your Own Device! Our Vision Keypasco AB 6

2.Credit card fraud would not exist if your credit card can only be used where your are! 1.If the only way to access a Internet service is by using your devices (PC, tablet, mobile phone etc.); then none amongst the 10+ billion other devices on this planet can be used to access your Internet service. This is what Keypasco authentication solution is all about! Your username and password only works from your devices! Some simple ideas… Keypasco AB 7

1)The user login with the same login process as before. 2)The Keypasco client sends the Device Authentication and Geolocation to the Keypasco server. 3)If the user credentials is correct (only the ICP has this information, the user is anonymous in our system), and if Keypasco matches if the attempt is done from the right device and at the right place = then the login is OK. 4)If anything is a mismatch or risky - a push is sent to the end users mobile device to verify the new geolocation and the device authentication. Internet Username Password Device FP Geo-location UserID OK Bank, eCommerce Etc. End user Keypasco Keypasco AB 8 How does it work?

Multi-factor Solution User Credentials Geographical location (geolocationID) User equipment Device Authentication (FP) Software Risk Management Proximity Devices Keypasco AB 9

1Device Authentication and two-channel authentication: Utilizes the user’s own devices as unique authentication devices through a two channel structure. Patent approved in: Taiwan, Korea, Japan Patent pending in: US, EU, India, Brazil, China 2Dynamic URL: Authentication structure supporting Dynamic and flexible URL for multiple ICP to multiple IDP (ID Provider) through same Client/app Patent approved in: Taiwan Patent pending in: China, US, Japan, Korea, EU, India, Brazil 3Proximity: User’s own devices (wearable computing) in close proximity to each other as a unique identity to enhance security Patent pending in: Taiwan, China, US, Japan, Korea, EU, India, Brazil 4Central stored PKI solution: Only decrypted private key distributed to mobile app that is protected by device authentication. Patent is under registration in: US, Taiwan, China, Japan, Korea, EU, India, Brazil. Keypasco AB 10 Our Patents

PhishingMan in the MiddleMan in the BrowserMalicious Software Username & Password Not Safe At the start of the Internet One Time Password Not Safe 2002 Challenge/Response SafeNot Safe 2005 Public Key Infrastructure Safe Not Safe* 2013 Keypasco Product Solution Safe Not yet happened Estimated Year for Security Breach Authentication Solutions Online security threats * Depending on how the infrastructure is setup – usually an expensive solution. Keypasco AB 11 Security threats

Advantages with Keypasco Keypasco AB 12 For Internet Content Providers: Secure - continuous improvement Flexible - several levels of security Cost-efficient; fixed annual fee per active user – NO extra cost, such as SMS, logistics, education, replacements, helpdesk, storage, hardware upgrades, etc. Easy for mass roll out – no additional hardware Easy to integrate User is anonymous - Keypasco don’t handle sensitive user information For the end customers/users: No change in user behaviour Proactive improvement of security Easy enrolment Excellent user experience Secure BYOD No limit of associated devices We support all major devices and platforms

Security, Usability & Cost UserID + Password OTP HW tokens Keypasco Solution Keypasco AB 13

Thank you! Please don’t hesitate to contact us with any questions. Keypasco Keypasco AB 14