Trust Services Infrastructure – enabling multi-brand multi application smartcards SCNF Northern Showcase Event 26 th October 2004 Euan Tennant Technical.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

Customer First : Strategic Context and Opportunities Rory Mair.
3SKey 3SKey.
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
E-Delivery Infrastructure and Access Points. e-Freight receives funding from the EC FP7 Sustainable Surface Transport Programme Connectivity Today … …
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The GSMA July 2014 Restricted - Confidential Information
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
SAJAYA ® PARTNERSHIP… PARTNERING FOR SUCCESS. SAJAYA ® APPLICATIONS... SAJAYA ® is a new era in the world of software applications targeted for the Middle.
Harnessing the power of the Information Age - enhancing efficiency of local government
Secure Communication Architectures.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
Lecture 23 Internet Authentication Applications
The Global API Federation
Agenda - 18 February 04 Welcome Round Table - Who? Where? What? Introduction to FAME Fame Generic Framework –Overview –Technical components Round table.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
The “joining up” national project The workflow national project At Newcastle University we are responsible for the Overall Framework and Learning Evaluation.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
SAML-based Delegation in Shibboleth Scott Cantor Internet2/The Ohio State University.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
WP3: the ÆSOP architecture Methods issues: how we did it. Explaining the architecture: –latest version of the pictures Identity management –Registrars.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Generic Framework Toolkit Mike Martin Centre for Social and Business Informatics Newcastle University.
Agenda 08:00 - Guests Arrive / Breakfast 08:30 - Paul Masterton: Objectives for the day 08:40 - Ian Gorst: The incentive to reform 08:55 - Mike King:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
·
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Designing an E-Government Solution Jon Colombo In collaboration with Client or Partner logo.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Development Plans for the Deployment of Smartcards in the North East Region Conn Crawford (NERSC)
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Modernising Government Conference 29 October 2004 Mike Eastham Head of Technology ITSO Ltd.
A Regional Governance Story John Littleton - Newcastle Conn Crawford – Sunderland Mike Martin - cSBI.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Maximizing the Value of Investments in Tax Administration Terry Lutes Principal, M Group.
The National Project for Multi-Agency working. The next generation of targets: Partnership working: you can not go it alone. Infrastructure: you have.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
© SmartCard Networking Forum The LASSeO workshop Geoff Doggett & Mick Davies.
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Paperless & Cashless Poland Program overview
Authority Recognition GGF9
Blockchain initiatives
E-Commerce for Developing Countries (EC-DC)
e-Invoicing – e-Ordering 20/11/2008
Presentation transcript:

Trust Services Infrastructure – enabling multi-brand multi application smartcards SCNF Northern Showcase Event 26 th October 2004 Euan Tennant Technical Programme Manager, NERSC

E-government Architecture Secure Presented in the way I prefer Seamless integration cross boundary Giving me Tailored joined-up service I want This is how it looked to us in ?

Hardware and Operating System Layer Middleware Persistent data layer Master Index Shared Workflow and Message Hub Portal Integration layer Local interaction Channels Local interaction PortalIndexHub Hub to Hub interactions Application layer Domain of Integration Other Domains We are not alone: There are other domains around us.

Hardware and Operating System Layer Middleware Persistent data layer Master Index Shared Workflow and Message Hub Portal Integration layer Local interaction Channels Local interaction Portal Index Hub Application layer Universal point of access: the catalogue of catalogues Federated Identity Management Service Universal point of publication, recourse and resolution. Domain of Integration Other Domains Federation Services Smart Cards: Integrating the integration technologies Accepting networks Identity tokens and keys Brand Apps Pocketable data

NERSC Public Sector Interests Commercial Interests App. owners Brand owner Accepting Networks Issuing Network PE Card Manufacturers Transaction & settlement Bank Clearing & settlement User Support Services (hub) Master registers Trusted Services Provider Registration & Authentication Cards Commission a set of trusted core value chain support services Facilitate collective procurements on behalf the brand and application owners

Card Scheme Components CARD MANAGEMENT SERVICE PROVIDERS PKI APPLICATION PROVIDERS CARDS FEDERATED IDENTITY MANAGEMENT HELPDESK

Card Scheme Success Factors Useful –There is little point expecting people to cherish their smartcard if it can only be used to access services which are not part of their daily lifestyle routine Useable –If its too slow the user may be too impatient to complete a transaction (rip and tear) –Avoid proprietary cards which may limit the range of acceptance networks available for the user –If using digital certificates – its got to be simple! Used –Once you are live be prepared to support users as a bad experience can be a big turn-off

Card Scheme Killers Participants fall out (legal action ensues) No ‘killer’ (compelling) applications Applications stagnate Applications redundant Too expensive (business case does not exist) Scheme not scaleable (architectural constraint) Incorrectly targeted marketing (think channels!) Too many bugs leads to loss of confidence National Project Risk Register – deals with legal risk – don’t forget operational and financial risks as well!

Authentication in the multi-app world A token will be used to assert an authenticated identity or role - potentially in many different environments with differing liabilities appertaining –Be wary of conferring identity risks particularly at low levels of authentication –Don’t assume that low level means free read for all card data

What level of authentication can a smartcard support? Biometrics/PKI/SKI etc –Only by using a digital cert can you ensure non-repudiation of a transaction – that the message was not tampered with and that the principals private key was used and was valid – necessary to achieve level 3 Aren’t Digital Certificates expensive? –Largely depends how pervasive the PKI has to be –Recommend that the LA ‘Citizen’ is PKI only used to authenticate to the Citizen’s Account. Leverage this with SAML authentication assertions to partner web-services Authentication in the multi-app world

Understand that 80% of scheme cost happens after the card is issued (it may last several years). –You will need to think about strategies for extending the card’s earning potential e.g. guest apps –Be prepared for significant churn (cancellations/failures/lost and stolen) –What about card durability (PVC 2-3yrs) Making multi-app smartcards work Pre-requisites

On-card data has to co-exist but a guest service provider has to believe that their data will be secure and not disclosed to or changed by others. –Often schemes fail because service providers do not trust the card issuer to do this (no rental income) –Solution: Use proxy identity information (as in Liberty) thus guaranteeing SP customer data is not compromised –Benefits to operator: increase in Trust and can allow the operation of 3 rd party application load services (even for other card management systems) Making multi-app smartcards work Pre-requisites (continued)

Ensure Inventory Control from the start –it may be fine to run a small pilot on a manual system but tens of thousands of cards issued will quickly generate real challenges for version control and card re-issue Card management systems must be able to manager applications lifecycle after the card has been issued –What happens when the application rules / policies change? –How does the user add ‘guest applications’ Making multi-app smartcards work Pre-requisites (continued)

Post Issuance Issues Why do it? –more cost effective (than re-issuance), more functionality (less wallet space), doesn’t depend on everything being in place at issuance (allows management of time constraints) phased roll-out. But Security Version control Ease of management New applications Business Rule changes (applications) Application termination

Convergence Issues (Retail, Banks, Mobile Operators and Transport) The benefits --- useable, useful & used The issues: –Big Industries……. single council….working in partnership ….may not be easy to achieve –Branding –Legal e.g data protection –Governance – what role for the individual citizen? –Working with standards e.g. ITSO, EMV, Tscheme Certification & accreditation Commercial frameworks

Thank you! Euan Tennant