UbIdentity Ubiquitous Identity Management in the Cloud 20/03/2014 Dan BUTNARU Product Line Manager Trusted Identity.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
1 Confidential and proprietary material for authorized Verizon personnel only. Use, disclosure or distribution of this material is not permitted to any.
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
Stork is an EU co-funded project INFSO-ICT-PSP Secure Identity Across Borders Linked Secure Electronic Identity Across Europe! STORK – 4 TH I NDUSTRY.
Vision 2020: Smart Secure Devices Xavier Larduinat WISTP’08 – Sevilla – May 14, 2008.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION STORK Presentation Lithuania March 2010.
Evolution in cross-border interoperability of eSignatures and eID Tarvi Martens SK, Estonia.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
1 Smart Card – EMV – Security – Internet 10 June 2002 Presentation by Mr. Alan Siu Deputy Secretary for Information Technology and Broadcasting Government.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
LU Chenglong ( ) DIAO Wenrui ( )
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
ISSA European Network Technical Seminar on efficient e-services in Social Security Warsaw, 24 th of May 2012 Dr. Jens Bruhn Deutsche Rentenversicherung.
Education roaming Secure Wireless Service for Research and Education.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
E-SCM Developments in Hong Kong Opening address by Mrs. Carrie Yau Secretary for Information Technology and Broadcasting.
·
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Nogues Thomas Director, Standards Coordination, NDS Ltd A “converged world” is where technology brings connectivity.
NemID An agile national eID for Denmark V1.00a Geneva, 6-7 December 2010.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 UNECE Capacity Building Workshop on Trade Facilitation Implementation: October 2004 Electronic PostMark (EPM) Security & Authentication for eTrade Documents.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
Using Public Key Cryptography Key management and public key infrastructures.
Mobility in the Government Workforce Presentation at an ACT-IAC Partners Breakfast June 16, 2011 Thom Rubel, Research Vice President Beth Jolles, IDC Government.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
European Electronic Identity Practices Country Update of Estonia Speaker: Ivar Jung Date:
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Smart Syncing: Travelers Get News, Information, and Entertainment along with Free Internet via WiFi COMPANY PROFILE: SIENN With a team across Europe, SIENN.
© DataCard Corporation. All rights reserved. TRENDS IN eGOVERNMENT Drivers, applications and technologies.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
EID and eSignature programs at National level in Europe Detlef Houdeau Nov 2013 Exploratory seminar on e-signatures for e- business in the South Mediterranean.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
CASE STUDY: ELECTRONIC BANKING By: Sarah Baig, Laura Logan, Agyakwa Tenkorang.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Why Verizon. Network performance Breadth of solutions See why better matters when doing business: Confidential and proprietary materials for authorized.
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: Jan 2017 Single.
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
The Future Digital Identity Landscape in Europe Stefane Mouille/Detlef Houdeau World eID Congress, 27th of Sep. 2017, Marseille, France.
Cross-sector and user-centric AAI
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 mPOS Terminal Market unit shipment.
Opportunity Analysis and Industry Forecast, Pages: 110 Tables: 43 Charts: 56 Global Opportunity Analysis and Industry Forecast, Online.
On the brink of a Networked society.
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
E-Commerce for Developing Countries (EC-DC)
560+ people dedicated to innovation across 5 R&D labs
Reiniger LLC.
E-identities (and e-signatures)
Operator Based Authentication
Presentation transcript:

UbIdentity Ubiquitous Identity Management in the Cloud 20/03/2014 Dan BUTNARU Product Line Manager Trusted Identity

© OpenTrust - All rights reserved. Agenda World of Today – World of Tomorrow Identity Management Cloud Approach Ubiquity Use cases Summary 2

© OpenTrust - All rights reserved. Today’s world is e-ID… More than 1,3 Billion e-ID cards in-the-field 100 countries have deployed e-ID documents  e-Passports, National e-ID cards, e-RP, e-DL, etc. High density of equipped countries in Europe  Large scale projects (e.g. Germany)  High penetration rates (e.g. Estonia 90%) Worldwide dynamics (GCC, Asia, Latin America, Africa) 3

© OpenTrust - All rights reserved. …and Mobile Almost 7 Billion mobile phones worldwide 96% of global population covered More than 50% is in Asia Pacific PC world also focuses on mobility –Tablets, iPads, etc. All new devices are “smart” –Trend is Sophistication and Consumerization 34% of world’s population access Internet 40% of internet time is on Mobile 4

© OpenTrust - All rights reserved. Federation in Diversity Several Schemes aim for federation/standardization –NSTIC –STORK 2 –EAC v2 –FIDO Multiple devices and form factors will include various digital identities –PC, SmartCard, Mobile phone, Tablets, USB keys –Connected Objects 5

© OpenTrust - All rights reserved. Tomorrow will be connected and mobile Internet of Things –Large Scale Identity Management –New Security Challenges New Use cases –Instant Availability of Information will change our lives –Transposition of Paper & Procedures into «Digital» –Mix of Public/Private, Business/Leisure, Work/Home –Constant transitions from/to Physical/Digital Mobility and Ubiquity ! –Access to whatever whenever and wherever –Information Management requires constant ID Management 6

© OpenTrust - All rights reserved. Identity Management Issuance of Digital Identities –Different Issuance Authorities –Different levels of Trust –Different means of Distribution Usage of Digital Identities –Trough different form factors –For different means (authentication, non-repudiation, confidentiality) Verification of Digital Identities –Towards local/global directories –Towards state (active, suspended, revoked) 7

© OpenTrust - All rights reserved. Cloud Approach Access to whatever, whenever, and wherever  Your digital ID follows you Your digital ID secured in the Cloud  Combined Action of IDP, TSP, and AP  Identity Provider (Government, Organization,…)  Trust Service Provider (Verification, Security Services,…)  Application Provider (Merchant, e-Gov Service, …) 8

© OpenTrust - All rights reserved. Ubiquity Ubiquitous Credential Management System  Whatever Service  Wherever you are  Whenever you need 9

© OpenTrust - All rights reserved. Use case - Issuance Public Scheme  National e-ID cards Private Schemes  Nat. E-ID drives commercial e-ID  Trusted Reference  Commercial e-ID  Agreement between parties  Cloud based, central issuance  Effective solution for large scale projects  Security aspects are mastered  Convenient 10

© OpenTrust - All rights reserved. Use Case Online Usage - Local User Credentials reside on-board –Authentication, Digital Signature, Confidentiality On-line Application interact directly with the device Advantage: Security Disadvantage –Deployment Logistics depend on device –Multiple devices need multiple credentials 11

© OpenTrust - All rights reserved. Use Case Online Usage - Central User Credentials reside in the Cloud –Device contains Identifier accessing credentials managed centrally On-line Application interact with central IDP Advantage: –Convenience –Device independent –Cost Efficiency Disadvantage –Is there any ? 12

© OpenTrust - All rights reserved. Summary Tomorrow will be Mobile & Cloud Access whenever, wherever implies ubiquitous identity management A framework between IDP, TSP and AP is required Cloud based issuance and usage is an efficient way to realize Ubiquitous Identity Management 13

© OpenTrust - All rights reserved. OpenTrust: Leading Provider of Trusted Identity-Based Solutions 2012 turnover: 18.5 million Euros Presence in Europe, Middle-East and USA 2 Datacenters Personnel: 120 staff (40% R&D) 200+ customers in Governments, Industry, Finance 25 million identities secured worldwide 10 million electronic contracts signed per year 1 billion transactions secured each month Reselling Partners in 20 countries Securing Your Buisness is Our Signature

Thank You for Your Attention rue René Jacques Issy-les-Moulineaux Cedex - France +33 (0)