Identity Processor Secures IoT Systems

Slides:



Advertisements
Similar presentations
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Advertisements

1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
Online Security Tuesday April 8, 2003 Maxence Crossley.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Introduction To Windows NT ® Server And Internet Information Server.
Internet Security In the 21st Century Presented by Daniel Mills.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
E-Commerce Security and Authentication Details Jerry Post
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
SODA Archiving October 2013
Troubleshooting Windows Vista Security Chapter 4.
Encryption Objective 1: Explain data encryption procedures.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Module 9: Fundamentals of Securing Network Communication.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
IoT Cooperation Strategy
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
Reliable VPN Solutions IN IOT Environments
Chapter 7 - Secure Socket Layer (SSL)
TOPIC: HTTPS (Security protocol)
Palo Alto Networks Certified Network Security Engineer
Setting and Upload Products
Chapter 5 Network Security Protocols in Practice Part I
Web Applications Security Cryptography 1
Cryptography and Network Security
Grid Security.
Security Design.
Secure Sockets Layer (SSL)
Hardware Cryptographic Coprocessor
Web Services Security.
Uses Uses of cryptography Lab today on RSA
BY GAWARE S.R. DEPT.OF COMP.SCI
How to Check if a site's connection is secure ?
Tutorial on Creating Certificates SSH Kerberos
Security Barriers Asset Proper Access Attack Security System
WAP Public Key Infrastructure
IS3230 Access Security Unit 9 PKI and Encryption
Mobile Payment Protocol 3D by Using Cloud Messaging
Cryptography and Network Security
More about identity and authentication
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
CS691 M2009 Semester Project PHILIP HUYNH
Message Digest Cryptographic checksum One-way function Relevance
Network Security – Kerberos
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Platform Architecture
Transport Layer Security (TLS)
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Designing IIS Security (IIS – Internet Information Service)
Electronic Payment Security Technologies
Microsoft Microsoft Word 2016 Core: Document Creation, Collaboration and Communication (MOS )
COEN 351 Authentication.
Cryptography and Network Security
Presentation transcript:

Identity Processor Secures IoT Systems CPU Sensors & Actuators Identity-based Access Unencumbered by Passwords Unassailable Data Transactions Cryptochain Technology Identity Processor (IPU)

Transactions Today: Vulnerabilities Bob Foob Router ٠٠٠ Local Data Password Cracking Man-in-the- Middle Limited SSL Lifetime Replay Attack Counterfeit Site Data Theft Transaction Repudiation Imposter ID Theft Malware No Certificate Unknown Revocation Weak Authority Online Cashier Card Scanner Skimming Misappropriation Point-of-Sale

Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust

Cryptochain: Point-of-Sale Transaction Bob ٠٠٠ [1] Bob scans items for purchase at Foob Outlet’s Terminal 2 Foob Outlet Server [2] Bob’s smart-phone client scans Terminal 2’s label and sends an encrypted message to Foob Outlet through the cloud Router [3] The Foob Outlet server sends the encrypted message through the Cryptochain for decryption at Bob’s LTD server Foob 95030 PoS Terminal 1 Foob 95030 PoS Terminal 2 Foob 95030 PoS Terminal n

Cryptochain: Point-of-Sale Transaction Bob Foob Outlet LTDa1a LTDx8x ٠٠٠ Federated Apex LTDa2a LTDx7x [6] Foob Outlet server can now decrypt the message and authorize the transaction [4] Bob’s LTD server sends the decrypted message to Foob, absolutely authenticating both parties [5] The Federated Apex audits any federated credentials in the decrypted message for ownership and authorization

Today’s IoT System Password-based Security Connection-based Security Isolation-based Security Today’s IoT System

IoT System with Cryptochain Cryptographic Security Password-based Security Isolation-based Security Gateway IoT System with Cryptochain

IoT System With Cryptochain Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust Eliminated Bypassed Obsolete

Jonetix Identity Processor (IPU) Transient Identity Generator (TIG) Pseudo-Random Number (PRNG) Attestation Value Key Seeds Secure Zone Embedded in an AMD microprocessor (adds <1% to chip area) Key Derivation Function (KDF) Cryptographic Services Module (CSM) Control Unit (CU) Command Bus Addr/Data Bus

Identity Processor Features Chip-unique identity Chip-unique, high-entropy random numbers Cryptographic services Autonomous key management Hardware feature options enablement Secure backup in insecure storage Secure data sharing and backup for individual across devices Chip-unique identity Public, private, and secret identity keys Chip-level root-of-trust Cloning eliminated Chip-unique, high-entropy random numbers Cryptographic services Session key generation Encryption Decryption Attestation Hash functions Autonomous key management Eliminates external key initialization services and key management services Secure backup in insecure storage Secure data sharing and backup for individual across devices

IoT System with IPU Gateway Cryptographic Security IPU Gateway

IoT System With Cryptochain & IPU Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust Eliminated Bypassed Obsolete Chip-level

Jonetix Company Status Eleven provisional patent applications filed Two full patent applications filed One patent issued Working prototype hardware and software Server and client app transaction modules Encryption, decryption, and authentication modules Principal invitation and registration to trust domains Web one-click sign-on and one-click transactions RTL for Identity Processor components Several working demos Cryptochain: video surveillance, climate control, garage door control Identity Processor: TIG, PRNG, KDF, and CSM in FPGA development boards