The team - currently 25 people

Slides:



Advertisements
Similar presentations
How to Set Up a System for Teaching Files, Conferences, and Clinical Trials Medical Imaging Resource Center.
Advertisements

1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
McAfee One Time Password
XProtect® Web Client 1 Product presentation.
1. What is Essex Scheduler? 2. Why Android? 3. Software design 4. Application graphics 5. Releasing to Google Play 6. Application maintenance Essex Scheduler.
The Dog’s Biggest Bite. Overview History Start Communication Protocol Weakness POODLE Issues.
1Proprietary and Confidential AirVantage API – Getting started David SCIAMMA – June 13th 2014.
Using Evernote and Google Docs in your web or mobile application (and potentially Dropbox and Skydrive) By Peter Messenger Senior Developer – Triple Point.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Unleashing Your Data From the Local Desktop Webinar.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
11th September 2008 Stockholm Sweden Simon Josefsson Head of R&D
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Chapter 12 Extending Web Applications. ASP.NET 2.0, Third Edition2.
Publishing a Web Page at the University of DE FREC 135.
Hardware Token Support for the Web Analysis of the W3C Workshop on Authentication, Hardware Tokens and Beyond.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Current State Of NetID By Jonathan Higgins Presentation Template available from Microsoft A low cost Identity Management Implementation Guide.
DAS/BEST ITSecurity Division. RSA SecurID Software Tokens: Make strong authentication a convenient part of doing business. Deploy RSA software tokens.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Agenda Introduction Student Day 2006 Microsoft IT Academy MSDN Academic Alliance Questions Paul Lo Academic Advisor Paul Lo Academic.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
Location Based Advertisement System Rushabh Shah Praveen Krishnaiah Naren Chainani Jatin Kumar.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
System Programming Basics Cha#2 H.M.Bilal. Operating Systems An operating system is the software on a computer that manages the way different programs.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
© 2013 IBM Corporation 1 How do you get license keys for IBM Security products? The License Key Center (LKC) is an online application that provides an.
Outline  XAMPP  XAMPP Install  Put php and HTML documents  Windows and Mac Version  Security.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Identity Standards Architect, Microsoft
2 Factor & Multi Factor Authentication
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
Platform as a Service.
FIDO U2F Universal 2nd Factor
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Secure Element API An introduction.
Cypak core technology Combat fraud and keep your customer happy
OPERATING SYSTEMS.
Enhancing Web Application Security with Secure Hardware Tokens
ApplinX Rod Carlson Senior Technical Lead.
Microsoft Virtual Academy
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

The team - currently 25 people

Do a quick demo - open text editor, insert YubiKey, touch button, watch OTP Alternatively, go to demo.yubico.com

We publish for Linux, Windows and Mac. About YUBICO Yubico is a hardware company. All our open source free software is available at https://developers.yubico.com and on our official GitHub Repository https://github.com/yubico (pull requests are welcome!) We publish for Linux, Windows and Mac. In 2012, Yubico designed a precursor to Universal Second Factor (U2F) called “gnubby” in close collaboration with Google. To reach mass market, standardization and multiple vendors are needed, and it was decided to publish through the FIDO alliance.

The FIDO Alliance was formed in the summer of 2012

Universal Second Factor - U2F U2F is an open 2-factor authentication standard that enables keychain devices, mobile phones and other devices to securely access any number of web-based services — instantly and with no drivers or client software needed. The U2F specifications are today hosted by the FIDO Alliance (http://fidoalliance.org/specifications/download)

DEMO

Simplified schema

Universal Second Factor - U2F Advantages Apart from the general advantages of 2-factor authentication, U2F has the following characteristics: Phishing protection, using application isolation (:appid) and TLS channel IDs (https://tools.ietf.org/html/draft-balfanz-tls-channelid-00). MITM protection, using appid / keyhandle mismatch No shared secrets. Unlike for example OATH, U2F uses public key cryptography and uses no shared secrets. Anonymous. New public keys are minted for each site. User experience. There are no codes to enter and no drivers to install. Universal. Devices can be of different types (hardware token, fingerprint reader, software token, etc.), communicate using different transports (USB, NFC, BLE) and can be registered to any number of sites. Open standard. Backed by industry leaders such as Google, Paypal, Microsoft, Bank of America, MasterCard and VISA.

Getting Started U2F Client U2F Server Go to https://developers.yubico.com/u2f Go to https://developers.yubico.com/u2f Download your preferred library! C, Java, Python, PHP! Have a look at our python u2f server Download your preferred library! C, Java, Python, PHP!

::: Tommaso De Orchi ::: tom@yubico.com ::: PUB ::: A0973948 FF8A F719 AE58 2818 1B89 4D83 1CE3 9268 A097 3948 Stockholm, Sweden Moving to a super new cool office soon!