Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Smart Card Security Xufen Gao CS 265 Spring, 2004 San Jose State University.
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Lecture 6 User Authentication (cont)
1 Security in Wireless Protocols Bluetooth, , ZigBee.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Information Assurance Management Key Escrow Digital Cash Week 12-1.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Security Awareness: Applying Practical Security in Your World
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Database Key Management CSCI 5857: Encoding and Encryption.
Authentication Approaches over Internet Jia Li
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Secure Electronic Transaction (SET)
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
DB Security, Nov 11, Database Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay.
Securing the World’s Information Andre Brisson – Stephen Boren Whitenoise Laboratories Inc. Dynamic Identity Verification & Authorization.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Biometric for Network Security. Finger Biometrics.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
1 Example security systems n Kerberos n Secure shell.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Outline The basic authentication problem
Security, Social and Legal Issues Regarding Software and Internet
IEEE CyberTrust workshop
Uses Uses of cryptography Lab today on RSA
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
G061 - Network Security.
Presentation transcript:

Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co Inventors 2006 Narrated

The Problem Rampant credit card and Identity Theft The Approach Use of Identity Management keys in a non-cryptographic context by association of a unique key to a unique account Immediate malfeasance detection – Dynamic Identity Verification and Authentication [DIVA] Immediate revocation Compatibility This technique can be used independently. It can be used in conjunction with existing PKI approaches to add an additional layer of protection and by enabling theft detection and immediate revocation capability.

The credit or debit card is initially issued to the user and contains a random 1k chunk of data generated from the users unique key. The card has write-back capacity. The server has all the pertinent user, key and offset information. The users card does not have the offset. The users card does not have its private key so the key can never be stolen. The Secure Process the credit card has write back capacity db at bank server for processing transactions a separate db at bank server with unique WN distributed keys for each and every card holder The goal is to make each and every transaction unique

1.The WN keys are highly random and unpredictable. There were no randomness failures against the NIST test suite. It is impossible for a thief to guess or break. 2.The offsets are never transmitted or written to the card so they cant be stolen. The users private keys is never written to the credit card. The keys are kept on a separate bank server db than the cardholder information to keep the offset separate from the key. The keys can be kept at the bank in an encrypted state. They can be encrypted either with Whitenoise or AES. 3.Each transaction becomes a unique event because the 1k chunk of data is updated on every transaction. 4.Cards can easily be refreshed or updated by going to a web site and having a new chunk of data written to the card. This eliminates the majority of card replacement which is expensive. Secure Characteristics

Andres WN Key – etc. A B C Step 5 – The offset is updated to then beginning of the next 1k chunk of data, and finally this new 1k chunk of data is written back to the card for the next use. The Secure Process A = Client card B = Bank database C = WN Key database (separate from offset) Step 1 – A purchase is made and the card A is run through a swipe. The first level authentication PIN number is entered and the transaction begins. Step 3 – The offset is noted and the 1k chunk of data is compared between the server DB and the card. Step 4 – If the 1k chunk of data matches up between the card and the server, the transaction is processed. Step 2 – Another level of authentication is verifying that the serial number on the card is the same that is listed at the bank db.

Let us imagine a crook has managed to double swipe your card and capture all of the information on the card including the random chunk of key data. There is no offset to capture. There is no key to capture. This assumes that a thief can break the user MS.net2 robust password that has a brute force odds of being broken of 1 in 80 trillion. This also acknowledges that there is NO key and NO offset information that can be stolen. Only the card number and the random chunk of data is available to a thief. There are only two possible outcomes!

1.The legitimate owner uses his/her card first, the chunk of random key data is updated on the legitimate card. The thief then uses the stolen card and it wont process because the 1k chunk does not match between the stolen credit card and the server. The account is immediately disabled. 2.The thief uses the stolen card first successfully. The next time the card holder uses their card the transaction is refused because the stolen card has been updated, the offset on the server database has been updated, but NOT chunk of data on the legitimate card. Theft has been identified. The account is immediately disabled. We know where the theft occurred because of the previous transaction. Either Or Outcomes Assume the thief can make a copy of a client credit card and somehow has broken or captured the password.

Securing the Worlds Information 100 % Theft Prevention

Credit Card companies like AMEX are already issuing smart cards to combat theft. If credit cards and debit cards are simply manufactured with chips that have unique identifiers or unique serial numbers burned into the chips, then theft prevention can be 100% effective. Smart Cards and unique identifiers

Bank Key, Private Key and Piracy Prevention USER CREDIT CARD PRIVATE KEY The user private key is securely stored at the bank vault - it is never transmitted electronically. The user key is not ever on the user credit card. This key is not used cryptographically but rather is a Random Number Generator. (Keys are enormous but storage is easy. See multiplicity in our technical presentation) The private key is unique for each credit card and account. The serial number on the client card is used as a seed to set the initial offset and create unique private key associated with a specific credit card. This serial number is used with the Bank Application key to decrypt the clients private key during a transaction. Private Key pre-authenticated distributed key is never given to the credit card holder. It is kept securely by the bank. It has never been transmitted electronically. It is never given out. It never leaves the banks control. Private keys can be kept encrypted to prevent internal malfeasance at the bank with WN or AES. Serial number on chip/device etc. The smart credit card has a unique serial number [NAM, identifiers..] burned onto its chip Bank Application Key This can be a unique key for the bank or credit card company and is used to decrypt the user credit card private key in order to generate the appropriate random strings of data for transaction authentication.

Credit Card Theft Stopped Dead in its Tracks! The credit card transaction is initiated. The server reads the cards unique serial number. The first authentication step is simply to compare this serial number with the device serial number associated with the account. It then uses this serial number with the NEVER transmitted bank key at the server to decrypt the credit card account private key in order to generate and compare the random chunks of data At the bank server, the application key will be able to decrypt and use private key if the serial number is correct. The identical corresponding random chunk of data is regenerated from the offset for comparison. A pirated or copied key will be copied to another medium/media with a different serial number or without a serial number at all The bank application key will be unable to decrypt the credit card Private key for the comparison of random data. The server recognizes the illegal attempt and immediately disables the account. Should the thief make it this far, the random chunk of data between the card and the server must still match 100% before the transaction continues

Scotia Bank Secure Network Server 1. Server reads serial number from existing smart card. 2. Server generates unique key and unique starting offset associated with that specific card and updates itself with UID, starting offset, key info, encrypts private key with application key. This all stays at the server. The server sends the first chunk of random data to the card. New credit card Coming in from the cold 1.Expand secure credit card networks in 2 steps electronically 2.Secure legacy distributed smart credit cards – MFG acceptance is helpful 3.Persons can add password for access and two factor authentication