Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September 2014 1 Oberthur Technologies – Identity.

Slides:



Advertisements
Similar presentations
Smart Card Digital Security Initiative Charles Cagliostro Executive Director of Digital Security Initiative
Advertisements

Mobile Devices in the DoD
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Gemplus and OSGI Benjamin Maury Gemplus Introduction  World Leader for Smart Card Solutions  Smart Solutions in Telecommunications  Beyond.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Next Steps toward More Trustworthy Interfaces Burt Kaliski, RSA Laboratories 1 st Workshop on Trustworthy Interfaces for Passwords and Personal Information.
By: Ansuya Chauhan.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Proposal for the support of connected and proximity crypto HW in browsers Philip Hoyer – Director Strategic Innovation January 2015 Presentation Title.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Database Application Security Models Database Application Security Models 1.
INTRODUCTION TO OFFICE 365 How To Share and Organize All In One Secure Place Panagiota “Penny” Damianeas Assessment & Testing Specialist.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Ivo Rosol, OKsystem Middleware.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
GLOBAL INITIATIVE FOR INCLUSIVE ICTs Promoting the Rights of Persons with Disabilities in the Digital Age Leveraging Mobile For Accessible.
Payment and Wireless Technologies. Engineering Services. July 2015.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
The NIST Special Publications for Security Management By: Waylon Coulter.
Hardware-based secure services past and future Olivier POTONNIEE, Aurélien COUVERT, Virginie GALINDO April 2016.
introductionwhyexamples What is a Web site? A web site is: a presentation tool; a way to communicate; a learning tool; a teaching tool; a marketing important.
Analyze This: Translating Business Needs into Technical Solutions
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
Workday: Data Privacy and Security Overview
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Identity and Access Management
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Data and Applications Security Developments and Directions
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Open Web App.
Merging Security and Convenience with Seos® Credential Technology
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Secure Element API An introduction.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Secure Elements and W3C L. Castillo 06/16/15.
Enhancing Web Application Security with Secure Hardware Tokens
Check Point Connectra NGX R60
CIRCABC Proof Of Concept
PLANNING A SECURE BASELINE INSTALLATION
Jeremy Grant Coordinator Better Identity Coalition
MicroToken Exchange Data Security Solutions
Presentation transcript:

Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity BU JAVARY Bruno

11 September INTRODUCTION Agenda 02. EXISTING : WHAT ARE THE DRAWBACKS 03. USE CASE : PIV 04. PERSPECTIVE AND PROPOSAL

11 September INTRODUCTION Agenda 02. EXISTING : WHAT ARE THE DRAWBACKS 03. USE CASE : PIV 04. PERSPECTIVE AND PROPOSAL

History : OT experience June 20th 2013, London, Workshop on Web Applications and Secure Hardware July 2013 : October 15 th 2013, Oberthur Technologies joins FIDO Alliance OT founding member of SIA November 2013 : Presentation of PIV for eSE on OT booth demonstrating eservices. “my voice is my password” winner in the Trusted internet/ Authentication category February th 2013, Barcelona, GSMA Mobile World Congress : 1st worldwide demonstration of a FIDO authentication secured by the SIM March 2014 : Mobile ID study starts with dedicated workforce with objective : “Smartcard Access from Web Browser” Summer 2014, w3C call for papers, submission of position paper, result of internal study 4 for eSE finalist

POSITION SUMMARY To enable a common access for every single user to trusted services thanks to a secure element, the best candidate is the web browser By consequence HTML and JavaScript will be the standard to access a secure element Many examples already exist to access hardware o Video, webcam, geolocation, file system o Thanks to evolutions of standards 11 September

POSITION SUMMARY Authentication : o For Payment / Internet banking / Corporate network access / Social media o FIDO is an answer Access to cryptographic operations : « Secure Operations Execution » o Web crypto api o Issue : define use cases exhaustively Low level access to the secure element or hardware token o Access the closest possible to the hardware o Close to sysapp considerations 11 September Several topics are to be considered

11 September INTRODUCTION Agenda 02. EXISTING : WHAT ARE THE DRAWBACKS 03. USE CASE : PIV 04. PERSPECTIVE AND PROPOSAL

Middleware Software application that enhances the capacities of our computer applications by creating an abstraction layer Implements standard Good solution for a local use, it provides secure features established on standards in a controlled IT configuration. However it can’t be used as an online solution or in an opened device. 11 September EXISTING Web browser extension Program integrated into a web browser and which provides new features Can be : plug-in, java applet, ActiveX The only solution right now but many drawbacks : o Heterogeneity of methods to access Smart Card o Security

Mobility Most of the apis are proprietary (eg OT Micro SD) There are some promising technologies o NFC o Open Mobile API These communications layers remain low level Middleware and web browser extensions do not fit in a mobile environment 11 September EXISTING

11 September INTRODUCTION Agenda 02. EXISTING : WHAT ARE THE DRAWBACKS 03. USE CASE : PIV 04. PERSPECTIVE AND PROPOSAL

Definition 11 September 2014 PIV - PERSONAL IDENTITY VERIFICATION Limitations US federal employee or contractor wears a PIV card defined by the National Institute of Standards and Technology (NIST). The card is required to enter a governmental building and to log on to computers (Physical and Logical Access Control). The federal employee can also sign s or documents and authenticates to remote web sites in HTTPS. File decryption or signing must be done locally. In a world of cloud computing and “Software as a Service” it represents a real inconvenience. The agent must have an already configured PC or be granted with specific rights, which prevents from using devices “on the go” or “away from office” (in a hotel, an airport, at home). To use a Smartphone or a tablet, specific software and hardware (card reader) have to be set up. 11

11 September INTRODUCTION Agenda 02. EXISTING : WHAT ARE THE DRAWBACKS 03. USE CASE : PIV 04. PERSPECTIVE AND PROPOSAL

Position As a solution provider, we would like to push the standardization of a JavaScript API which allows web browser to communicate with Smart Card Objective is to open trusted services with secure element to the mainstream market In order to be implemented in all browsers and to ensure its liability, the API should be endorsed by W3C. 11 September PROMOTE A STANDARDIZATION Secure Element API This api is complete and well documented. It presents in details the technical background and use cases and gives a good visibility of Security, Permissions, Access Control and Conformance Security is at the heart of OT’s concerns; the proposed solution combines validation of the feature by the user and a specific access control mechanism The idea beyond is to propose a trusted access to a secure element from a service provider, preventing from unauthorized use.

Action Plan Identify a charter to carry the project Define use cases and for each of them demonstrate the impact and validate the consistency of the current proposal. Meeting all stakeholders interested in the subject, be aware of each of them interest and create a common basis of communication and strategy Establish interactions with other standardizations (eg Open Mobile API) Gather work forces to create a proof of concept and decline it to use cases examples (eg eServices) 11 September PERSPECTIVE Let’s follow, jointly with all companies and associations sharing the same opinion and interest, action plan below:

Thank you for your attention 11 September