Identity and Access IDGo Secure Email (ISE) for Android Didier Bonnet November 2014.

Slides:



Advertisements
Similar presentations
Mobile Devices in the DoD
Advertisements

Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Office 365 for Enterprises: Pricing & Licensing Overview
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 9 Deploying IIS and Active Directory Certificate Services
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
eToken PKI Client Overview
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
S/MIME and PKI Dartmouth College PKI Lab. What Is S/MIME? RFC 2633 (S/MIME Version 3)RFC 2633 Extensions to MIME Uses PKI certificates, keys, and.
Guide to Operating System Security Chapter 10 Security.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
By: Bill Stevenson Jose Plancarte Erik Magsino. Overview Messaging and collaboration server Send and Receive electronic mail and other forms of interactive.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Riva – Sync Sugar directly to Microsoft Exchange Server-side sync | No plug-ins required Trevor Poapst VP Marketing and Sales Riva CRM Integration
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
09:45-10:30 – Windows Mobile Update 10:30-11:30 – System Center Mobile Device Manager :30-11:45 - Break 11:45-12:30 -Deploying SCMDM and Customer.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Innovation is Our Passion Online Banking Past, Present and Future.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
1 1 Social Security Platform James Wu We Simplify Security.
Redmond Protocols Plugfest 2016 Andrew Davidoff Exchange 2016 Protocol Overview Senior Software Engineer.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Public Key Infrastructure and Applications
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014

s are a Priority for Enterprises 2 Forrester, December 2011

Main Requirements Addressed 3 BYOD Same mobile device for professional and private usages Mobility Access to s anywhere, anytime Security Mobile devices are more exposed than PCs

Mobile OS Market Share Evolution in Q Operating System 2Q14 Shipment Volume (Mu) 2Q14 Market Share 2Q13 Shipment Volume (Mu) 2Q13 Market Share 2Q14/2Q13 Growth Android % %33.3% iOS % %12.7% Windows Phone %8.23.4%-9.4% BlackBerry1.50.5%6.72.8%-78.0% Others1.90.6%2.91.2%-32.2% Total % %25.3% Source IDC Worldwide Quaterly Mobile Phone Tracker (August 2014)IDC Worldwide Quaterly Mobile Phone Tracker

5 Secure Elements Now and Future MicroSD UICC TEE eSE Badge via contact reader As of today: 10 Million Gemalto smartcard active users 20 Million 3 rd party smartcard active users Next 2 years: Prototypes in progress Badge via NFC Semi- detached credentials Embedded credentials Smart card on a stick Badge via Bluetooth reader Detached credentials In years: Next generation of handsets BYOD/ mobile desktop will increase needs for Secure Elements Secure Element adoption

IDGo 800 Middleware and SDK 6 Other reader drivers NFC driver PKI Crypto Layer API Test tools OTP API 3 rd party client applications Middleware SDK IDPrime cards TEE (*) PC-SC like API (*) OTG: On-The-Go = USB Master TEE: Trusted Execution Environment USB OTG (*) driver Other Secure Elements

Supported Readers and Tokens on Android 7 USB On-The-Go port (= USB Master ) or BlueTooth USB Female – Micro USB adaptor or cable BHXT and Feitian readers USB tokens & IDBridge K3000 PC-Link readers Micro USB cable

ISE Security Features S/MIME signature and encryption Encryption algorithms: 3DES, AES256, RSA Signature algorithms: MD5, SHA1, SHA256, SHA512, RSA 8 8 Gemalto middleware and Secure Elements IDGo 800 for Android and associated readers: USB, NFC, BLE, µSD IDPrime MD,.NET and PIV PKI applets SSL / TLS communication with the server

Other Features and Benefits Microsoft Exchange ActiveSync (EAS) protocol Synchronization with the native Android Contacts and Calendar reception by push or periodical synchronization Support of Global Address List (GAL) Various PKI certificate managements Local validation with the Certification Authority (CA) Validation with the EAS server or OCSP protocol Certificates retrieved from validated s, (multi) LDAP and EAS server Revocation by Certificate Revocation List (CRL) POP3, IMAP4 and SMTP protocols for BYOD usage Multi accounts, mailboxes and folders, combined mailbox HTML or plain text format Group and Search functions 9 9

What is Exchange ActiveSync? EASEAS is a communication protocol that synchronizes s, calendars, contacts and tasks between servers and mobile client applications It also provides some Mobile Device Management (MDM) features and security policy controls It is based on XML and HTTP(S) protocols More details… EAS is licensed by Microsoft is the main provider of EAS compliant servers EAS is supported by Windows Phone, Android, iOS, BB, Gmail, Google Apps, Office 365, Lotus Notes 10

What is S/MIME? Secure / Multipurpose Internet Mail Extensions Standard protocol based on X509 PKI certificates Described by several specifications: RFC 3851, 5751, 5652 Present version is S/MIME v3.2 Insures compatibility between the various applications and servers Main applications Outlook, Mozilla Thunderbird, MacOS Mail, Gmail, OWA Main server: Microsoft Exchange Active Sync (EAS) 11 S/MIME specifies the Digital Signature and encryption / decryption

S/MIMES/MIME Operations 12 The is encrypted with the Recipient Public Key and signed with the Sender Private Key The is decrypted with the Recipient Private Key and the signature is verified with the Sender Public Key

Basic Operations 13 edition Input mailbox

Wide Settings Capabilities 14

ISE Roadmap ISE for Android V1.0 November 2014 V1.0 Version Initial version Version 2.0 (to be confirmed) + Database encryption + User authentication + Android version L Q V2.0 September 2014

Thank you!