Fast IDentity Online – a new industry alliance formed to develop technical standards that enable Internet Services to use Simpler Stronger Auth solutions.

Slides:



Advertisements
Similar presentations
© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
Advertisements

Mobile Devices in the DoD
Selecting a Strong Authentication Solution Scott Mackelprang, V.P. of Security Digital Insight.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Course: e-Governance Project Lifecycle Day 1
The team - currently 25 people
Not Built On Sand. IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
FIT3105 Smart card based authentication and identity management Lecture 4.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Private, Secure, Guaranteed ACH Credits – The Next Generation of Online Payments Samantha Carrier, Director, eCommerce, NACHA.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Customer Relationship Management (CRM)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill
Copyright © 2014 Synaptics Incorporated. All Rights ReservedPage 1 Copyright © 2014 Synaptics Incorporated. All Rights Reserved. This information and any.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
The Challenges of Online Identity Assurance in a Judicial Setting Alison Knight, Supervisors: Prof. Steve Saxby (Law) & Dr. Mark Weal (ECS) Law ILAWS dog.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Biometrics Authentication Technology
Why FIDO Matters? Healthcare Tom Groom CEO October 5th, 2015 Confidential.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
“The FIDO Alliance Today”
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
ARCH-04 Before You Begin Your Transformation Project… Phillip Magnay Architect – Applied Technology.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Secure Quick Reliable Login ● SQRL pronounced “squirrel”. ● Acronym confusion – QR no longer stands for “Quick Response” two-dimensional bar codes. Optional.
Identity Standards Architect, Microsoft
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
2 Factor & Multi Factor Authentication
An Overview of Kantara Initiative, Inc.
Intel® network builders university
FIDO U2F Universal 2nd Factor
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Windows Hello Sam Chang Senior Program Manager WinHEC 2015
State of e-Authentication in Higher Education Bernie Gleason
Understanding IDENTITY Assurance
NextGen Access Control Platform
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Global Authentication: Liberty Alliance Identity Assurance Framework
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Fast IDentity Online – a new industry alliance formed to develop technical standards that enable Internet Services to use Simpler Stronger Auth solutions © 2014 FIDO Alliance

Who… What… Why… Repeat that we are growing the Alliance now, if you represent any of these constituencies please join!

Slide deck includes members from all parts of the value chain: authenticator vendors, device OEMs, OS vendors, authentication players and relying parties Strong motivation for multiple players to support FIDO For example, Microsoft’s customers are increasingly having to deal with non-Windows devices

142+ & growing…

142+ & growing…

To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b) Operating programs to help ensure industry adoption (c) Submitting mature Specifications for formal standardization Emphasize this is the User eXperience, acknowledge that most of us do much more on the backend with risk-based techniques, but the UX is password/OTP

FIDO Alliance’s Role… “Paper” Specifications Interoperability and Conformance testing Trademark licensing against criteria Thought leadership, nurture ecosystem The Alliance does not ship products! Implementations left to commercial vendors Emphasize this is the User eXperience, acknowledge that most of us do much more on the backend with risk-based techniques, but the UX is password/OTP

Identity & Authentication Building Blocks E-Gov Payments Security Personalization Single Sign-On Modern Authentication Federation Passwords Risk-Based Authentication Strong Identity services will be a key control point in the modern computing ecosystem. Whether its Over-the-Top players like Google, Facebook and PayPal or Device-OEMs like Apple, Samsung, and Lenovo or communication providers like Telefonica, Vodafone, Verizon and other MNOs who are in this room, everyone is beginning to understand that Identity & Authentication are the “Ignition Keys” for their business We’re going to zoom into a pivotal part of the identity problem - Authentication User Management Physical-to-digital identity ©NOK NOK LABS – Used by Permission

Why Authentication is Cybersecurity Priority #1 Poor authentication mechanisms are a commonly exploited vector of attack by adversaries; the 2013 Data Breach Investigations Report (conducted by Verizon in concert with the U.S. Department of Homeland Security) noted that 76% of 2012 network intrusions exploited weak or stolen credentials. -- NIST Roadmap for Improving Critical Infrastructure Cybersecurity,12-Feb-2014 The Internet Services need Simpler, Stronger authentication online, the devices are coming with Simpler, Stronger local auth innovations, why not put them together (which will require open, interoperable wire protocols that can be implemented to by any device and any online service) – that’s what FIDO is!

Today’s Passwords REUSED PHISHED KEYLOGGED We all know the inherent problems with passwords… REUSED PHISHED KEYLOGGED

Today’s Password Alternatives One Time Codes with SMS or Device SMS USABILITY DEVICE USABILITY USER EXPERIEN CE STILL PHISHABL E In spite of the recent trend to bolt-on optional OTP solutions (aka “2-step verification”) f/Google, Twitter, etc. – this is a temp. fix, only makes UX worse Improves security but not easy enough Coverage | Delay | Cost One per site | $$ | Fragile User find it hard Known attacks today

Major Industry Trend PERSONAL DEVICES LOCAL LOCKING Simpler, Stronger Local Device Auth PERSONAL DEVICES LOCAL LOCKING NEW WAVE: CONVENIENT SECURITY Carry Personal Data Pins & Patterns today Simpler, Stronger local authentication With so many people carrying mobile devices full of personal information, they are locking their devices, now with PIN & Gesture, but even more convenient and stronger solutions are on the horizon: finger scan, keychain devices, voice, facial recognition, etc. with an underpinning of silicon-based security

Putting It Together The problem: Simpler, Stronger online The trend: Simpler, Stronger local device auth Why not: Use local device auth for online auth? The Internet Services need Simpler, Stronger authentication online, the devices are coming with Simpler, Stronger local auth innovations, why not put them together (which will require open, interoperable wire protocols that can be implemented to by any device and any online service) – that’s what FIDO is! This is the core idea behind FIDO standards!

FIDO Experiences ONLINE AUTH REQUEST LOCAL DEVICE AUTH SUCCESS PASSWORDLESS EXPERIENCE (UAF standards) Transaction Detail Show a biometric Done SECOND FACTOR EXPERIENCE (U2F standards) We are enabling two fundamental use cases/user experiences: Passwordless w/UAF (requires native device support), PW+token w/U2F (FIDO-enable any device with an innovative “driverless PKI” keychain-type device) FIDO provides two user experiences to address a wide range of use cases and deployment scenarios. FIDO protocols are based on public key cryptography and are strongly resistant to phishing. Passwordless UX: The passwordless FIDO experience is supported by the Universal Authentication Framework (UAF) protocol. In this experience, the user registers their device to the online service by selecting a local authentication mechanism such as swiping a finger, looking at the camera, speaking into the mic, entering a PIN, etc. The UAF protocols allows the service to select which mechanisms are presented to the user. Once registered, the user simply repeats the local authentication action whenever they need to authenticate to the service. The user no longer needs to enter their password when authenticating from that device. UAF also allows experiences that combine multiple authentication mechanisms such as fingerprint + PIN. Second Factor UX: The second factor FIDO experience is supported by the Universal Second Factor (U2F) protocol. This experience allows online services to augment the security of their existing password infrastructure by adding a strong second factor to user login. The user logs in with a username and password as before. The service can also prompt the user to present a second factor device at any time it chooses. The strong second factor allows the service to simplify its passwords (eg. 4-digit PIN) without compromising security. During registration and authentication, the user presents the second factor by simply pressing a button on a USB device or tapping over NFC. The user can use their FIDO U2F device across all online services that support the protocol leveraging built-in support in web browsers. Login & Password Insert Dongle, Press button Done

State of Market Adoption Repeat that we are growing the Alliance now, if you represent any of these constituencies please join!

Version 1.0 is in Public Review

13+ products have participated in and satisfied the requirements of our testing program and are conferred the right to use the FIDO Ready™ mark.

OEM Enabled: Lenovo ThinkPads with Fingerprint Sensors OEMs SHIPPING FIDO-READY ™ PRODUCTS New and existing devices are supported OEM Enabled: Lenovo ThinkPads with Fingerprint Sensors OEM Enabled: Samsung Galaxy S5 - On the authenticator side, we are working with dozens of authenticator manufacturers - Here are three that we have publicly demonstrated Clients available for these operating systems : Software Authenticator Examples: Voice/Face recognition, PIN, QR Code, etc. Aftermarket Hardware Authenticator Examples: USB fingerprint scanner, MicroSD Secure Element DOCUMENT & TITLE

First FIDO Deployment already live… Customers can use their finger to pay with PayPal from their new Samsung Galaxy S5 because the FIDO Ready™ software on the device securely communicates between the fingerprint sensor on their device and PayPal’s service in the cloud. The only information the device shares with PayPal is a unique cryptographic “public key” that allows PayPal to verify the identity of the customer without having to store any biometric information on PayPal’s servers.

From July 2014… Alipay – formerly a part of Alibaba Group in China Processed $519 Billion in transactions in 2013 Launched FIDO-based payments using Galaxy S5

How it works Repeat that we are growing the Alliance now, if you represent any of these constituencies please join!

REGISTRATION COMPLETE FIDO Registration REGISTRATION BEGINS USER APPROVAL 1 2 USER APPROVAL REGISTRATION COMPLETE NEW KEY CREATED 4 3 KEY REGISTERED Using Public key Cryptography

FIDO Login LOGIN USER APPROVAL 1 2 LOGIN COMPLETE KEY SELECTED 4 3 LOGIN CHALLENGE Login LOGIN COMPLETE KEY SELECTED 4 3 LOGIN RESPONSE Using Public key Cryptography

Decouple User Verification Method from Authentication Protocol PLUGGABLE LOCAL AUTH LOGIN USER APPROVAL 1 2 LOGIN CHALLENGE ONLINE SECURITY PROTOCOL REGISTRATION COMPLETE KEY SELECTED 4 3 LOGIN RESPONSE Leverage public key cryptography

No 3rd Party in the Protocol

No secrets on Server side

Key Benefit for Service Providers CHA-BOA087-20090804-IN-LJ-v1

FIDO’s Focus on User Privacy Biometric data (if used) never leaves device No link-ability between Services No link-ability between Accounts

Call to Action FIDO is ready for use Get involved: launch a Proof-of-Concept & Pilot Get involved: Adapt your strategy & roadmap to include FIDO Join the Alliance – we are non-profit & volunteer Contact Brett McDowell – brett@fidoalliance.org Come to the plenary, meet and mingle, speak with the pioneers, select your partners

THANK YOU Repeat that we are growing the Alliance now, if you represent any of these constituencies please join!