Innovation is Our Passion Online Banking Past, Present and Future.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
A Profile Of PKCS #11 V2.11 For Mobile Devices Magnus Nyström PKCS Workshop 2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
GOPAS TechEd 2012 PKI Design Ing. Ondřej Ševeček | GOPAS a.s. |
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
SSL Implementation Guide Onno W. Purbo
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
eToken PKI Client Overview
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Certificate and Key Storage Tokens and Software
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Authentication Approaches over Internet Jia Li
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June A Rev
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Masud Hasan Secue VS Hushmail Project 2.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Smart Card Technology & Features
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
1 1 Patented QR code solutions James Wu We Simplify Security.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Electronic Banking & Security Electronic Banking & Security.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Conveying Trust Serge Egelman.
Product Manager, Keon PKI
Using SSL – Secure Socket Layer
Secrets Between Just You and Me
Installation & User Guide
Presentation transcript:

Innovation is Our Passion Online Banking Past, Present and Future

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 2 Banks with no Online Banking facility Online Banking with username & static password for authentica- tion Banks issue certificates to the user which will be stored on the PC OR Banks issue an OTP token to Generate Dynamic password OR Banks issues a certificate stored inside Smart card or USB Token to every user Banks generate Dynamic password on every user’s Mobile Olden days10years ago5years agoNow and Future The Evolution

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 3 USER SSL guarantees the Online Banking accessed by users is real, not phishing Users can access the Online Banking service only with the username and password that a particular user know. The communication from IE browser or others to Online Banking server has been protected by SSL technology.  Internet Online Banking Router SSL Certificate  SSL service  Username,  Password,  Virtual Keyboard Online Banking now in India

Innovation is Our Passion  Username,  Password,  Virtual Keyboard  Internet Online Banking USER Router SSL Certificate  SSL service Drawbacks The existing SSL in Online Banking is a unidirectional SSL. Users can authenticate the server; on the contrary it can not. The username and password can be hacked easily. The high-risk activity such as fund transfer doesn’t have the user’s e-signature.

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 5  Use of Digital Certificates  For Normal users / Corporate Users, etc. This enabled the online user to use their digital certificates stored on their PC while making Transactions To mitigate the Drawback…

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 6  Weak Storage  The digital certificate, private key and public key are stored in the IE Browser or other browser of the PC.  All of these are easy to be exported to other workstation, including the private key.  The private key may be illegally hacked and used by method of exhaustion, no maximum number of password attempts. The System would not be 100% secure

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 7  Every user has a digital certificate as his/her ID card in the online banking system.  The digital certificate is stored inside a Smart Card or a PKI enabled USB Token.  The RSA key pair is generated inside the USB token, the private key is never exported.  The private key can be used only when the user knows the PIN of USB token.  Banks can set the maximum number of PIN attempts, for example 3 to 5 times.  The USB token gets automatically disabled when the user exceeds the maximum number of wrong PIN attempts. Finally an Ideal Solution – 100% Secure

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 8 Users have the bidirectional SSL authentication. It’s more secure. When doing login and transaction, users can make e-signature for the activities. Users don’t worry about the fraudulence of the password. The fraud can not do anything without the USB token. Up to now, users have two factors authentication.  I know who are you.  I know who are you too.  Yes, this is my signature.  I have the USBKey;  I know the PIN  PIN:******  I don’t have the USBKey. Can’t login. This solution satisfies…

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 9 What we provide? Our USB Key Product Suite

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 10 Specification Physical Characteristics 8-bit/32-bit processor, 32K/64K Byte EEPROM Cryptographic Standards PKCS#11 v 2.11, Microsoft CryptoAPI(CAPI)2.0, X.509 Cryptographic Functions Asymmetric key pair generation (RSA 1024/2048- bit),Symmetric key generation (DES, 3DES, AES), Onboard Random Number Generator, Onboard key generation, digital signing and encryption/decryption Cryptographic Algorithms Asymmetric Key Algorithms, RSA1024-bit, RSA bit; Symmetric Key Algorithms, AES, DES, 3DES Digital SigningRSA 1024-bit, RSA 2048-bit Hash AlgorithmsSHA-1, SHA-256, MD5 Operating system, Browser and Mail Windows 2000/XP/2003/Vista and 7 IE, Mozilla Firefox, Outlook, Thunderbird CommunicationPC/SC protocol; Mass Storage protocol; ConnectivityUSB 1.1/2.0 compliant, USB power Weight and SizeApprox. 8g, 78mm x 23mm x 9mm WatchKEY

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 11 Specification Physical Characteristics 32-bit processor, 32K Byte EEPROM, With Fingerprint sensor, Cryptographic Standards PKCS#11 v 2.11, Microsoft CryptoAPI(CAPI)2.0, X.509 Cryptographic Functions Asymmetric key pair generation (RSA 1024/2048- bit),Symmetric key generation (DES, 3DES, AES), Onboard Random Number Generator, Onboard key generation, digital signing and encryption/decryption Cryptographic Algorithms Asymmetric Key Algorithms, RSA1024-bit, RSA bit; Symmetric Key Algorithms, AES, DES, 3DES Digital SigningRSA 1024-bit, RSA 2048-bit Hash AlgorithmsSHA-1, SHA-256, MD5 Operating system, Browser and Mail Windows 2000/XP/2003/Vista and 7 IE, Mozilla Firefox, Outlook CommunicationMass Storage protocol; ConnectivityUSB 1.1/2.0 compliant, USB power Weight and SizeApprox. 8g, 78mm x 23mm x 9mm BioKEY

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 12 Specification Physical Characteristics 32-bit processor, 32K Byte EEPROM, With screen display and button press operations, Cryptographic Standards PKCS#11 v 2.11, Microsoft CryptoAPI(CAPI)2.0, X.509 Cryptographic Functions Asymmetric key pair generation (RSA 1024/2048- bit),Symmetric key generation (DES, 3DES, AES), Onboard Random Number Generator, Onboard key generation, digital signing and encryption/decryption Cryptographic Algorithms Asymmetric Key Algorithms, RSA1024-bit, RSA bit; Symmetric Key Algorithms, AES, DES, 3DES Digital SigningRSA 1024-bit, RSA 2048-bit Hash AlgorithmsSHA-1, SHA-256, MD5 Operating system, Browser and Mail Windows 2000/XP/2003/Vista and 7 IE, Mozilla Firefox, Outlook CommunicationMass Storage protocol; ConnectivityUSB 1.1/2.0 compliant, USB power Weight and SizeApprox. 20g-50g, 80mm x (25-43)mm x 10mm WatchKEY OCL

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 13 URpass  URpass™ is an innovative product combining secure online payment (& top-up) and contactless micropayment in a single device ++ Form factor:

Innovation is Our Passion © 2010 WATCHDATA TECHNOLOGIES PTE LTD 14 Thank You R. Srinivasan - Sales Director Watchdata Technologies (India) Pvt. Ltd #681, 6 th ‘C’ Main, 14 th Cross, J.P Nagar 3 rd Phase, Bangalore – For Further Details Please Contact K. Srinivasan - Technical Manager