Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Help File For User Creation Click the “Course” button for Creating/Add User.
Certificate Enrollment Process
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
WPKI available technology diagram and the business model
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
INFORMATION SYSTEMS SERVICES UNIVERSITY OF LEEDS Presentation to the UK e-Science Grid Workshop ‘Managing Access to Resources on the Grid’ e-Science Institute,
Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
S/MIME and PKI Dartmouth College PKI Lab. What Is S/MIME? RFC 2633 (S/MIME Version 3)RFC 2633 Extensions to MIME Uses PKI certificates, keys, and.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Internet Security for Small & Medium Business Week 6
PKI interoperability and policy in the wireless world.
Introduction Peter De Witte Information Security Officer for the IT Department Advisor for –Software Development –Infrastructure.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Building Security into Your System Bill Major Gregory Ponto.
The Distribution Online Vending Pilot Project Demo Testing Certificate Management Kennedy P Subramoney 23 July 2004.
User Certificate Application: ASGCCA. Agenda Introduction ASGCCA User Responsibilities Certificate application form RA verify identity of users User generate.
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
KISTI Grid CA Operation KISTI Supercomputing Center Sangwan Kim, Soonwook Hwang CA Operators Contact: Jan. 8, 2007.
The FAFSA on the Web Session Overview Redesigned FAFSA on the Web site New look and feel for PIN site Major changes and newly added enhancements, and.
Two-Factor Autentication myUTSA ID+ It takes two!.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
1 1 Patented QR code solutions James Wu We Simplify Security.
Certificate Security For Users Obtaining and Using Your Personal Certificate using the OSG PKI Kyle Gross – OSG Operations Support Lead Elizabeth Prout.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
Understand User Authentication LESSON 2.1A Security Fundamentals.
ArchPass Duo Presentation
CENTRALIZED AUTHENTICATION SERVICES THROUGH MOBILE PHONE
Public Key Infrastructure (PKI)
ESign Aashutosh.
DIGITAL SIGNATURE SERVICE
EDC Process Proposal Brian Brandaw Manager of IT Common Platforms
Authentication.
Jim Schaad Soaring Hawk Security
PKI Implementation at the University of Wisconsin-Madison
Organized by governmental sector (National Institute of information )
Public Key Infrastructure (PKI)
Secure Enterprise Technology Initiatives e-Provisioning Group
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
OpenCA Maria Lizarraga.
A short guide for using encryption keys and certificates in PEPPOL
جايگاه گواهی ديجيتالی در ايران
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
CS 465 Certificates Last Updated: Oct 14, 2017.
Installation & User Guide
SSL Decryption Explained
ACS Deployment Scenarios
Fed/ED December 2007 Jim Jokl University of Virginia
Certificate Enrollment Process
Install AD Certificate Services
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Building Security into Your System
PKI (Public Key Infrastructure)
September 2002 CSG Meeting Jim Jokl
National Trust Platform
Presentation transcript:

Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback

Demo

Overview - DigiNotar

Overview - Methics

Use cases ● Authentication (Fingerprint signing) ● Login to (web) applications ● Certificate requests (replaces USB token) ● VPN access ● … ? ● Digital Signatures (WYSIWYS) ● Sign s ● Electronic payment ● … ?

Enrollment ● Key generation ● On SIM (by user?) ● By CA or RA? ● Certificate creation ● CSR constructed based on public key and proof-of- possession by SIM (link to individual?) ● CSR then signed by CA ● Certificate accessible from “Home MSSP”

Trust from user POV ● Application Provider (AP) ● SIM (and phone?) ● Mobile Operator ● Provides SIM ● OTA/WIG server (for naive users) ● CA/RA

Feedback ● Good idea? ● Complexity? ● Usability? ● Other use cases?