PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.

Slides:



Advertisements
Similar presentations
NexSentry Imaging Solutions
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
MIDAS is a complete web based scheduling solution for managing your facility’s bookings and resources. MIDAS is a complete web based scheduling solution.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
A new Network Concept for transporting and storing digital video…………
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Cypak, the Future of Ink on Packaging September 12 th 2007, London Danevert Åsbrink, VP Sales, Cypak AB, Sweden.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Gateplus Time Attendance and Access Control System.
Remote Access Network Management Kelly Given Allison Traina.
FIT3105 Smart card based authentication and identity management Lecture 4.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments I.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Awareness: Applying Practical Security in Your World
Your Interactive Guide to the Digital World Discovering Computers 2012.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Certificate and Key Storage Tokens and Software
Microcrypt Technologies SPACER Secure Physical Access Control Enhanced Reader for contactless cryptographic smart cards.
Intelligent Pharmaceutical Packaging Electronic Data Capturing system to improve data quality and cut time in clinical trials with unparalleled cost efficiency.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Introduction to computers. What is a personal computer? Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. Normally measured.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Information Security for Managers (Master MIS)
PC Support & Repair Chapter 13 Advanced Laptops & Portable Devices.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Week #7 Objectives: Secure Windows 7 Desktop
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Commercial Notebooks Accessories.
Copyright ONE-O-ONE iSOLUTIONS Inc Smart Card Technology for the Macintosh Chris Goeltner January 30, 2001.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Smart Card Technology & Features
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Introduction to Computer and Computer Networking: Part I Xiangming Mu 9/16/2004.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Computer Parts There are many parts that work together to make a computer work.
V x 700: A Perfect Fit for Unattended Applications.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Computer Parts There are many parts that work together to make a computer work.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
Hubert Kairuki Memorial University Kaizilege Karoma CS200 - Computer.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Hardware Components Controller cards Bus Lines Ports Power Supply Secondary Storage.
Cloud Storage Service with Proven Military Grade Security
Wireless Technologies
The CPU is the brain of the computer
Principles of Information Technology
SECURITY FEATURES OF ATM
Product Manager, Keon PKI
Cypak core technology Combat fraud and keep your customer happy
The Computer Work Stations
A mobile single sign-on system
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
2N Access Unit 2.0 Multi-technology access control readers.
Presentation transcript:

PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness

Balancing securtiy, cost and convenience Security Advanced encryption Copying PIN eaves- dropping X X = target position Cost Card Reader System integration Convenience Easy to use Contact-less Mobility

PIN security over the Internet A typical PC is not secure PIN/Passwords entered from the computer's keyboard are easily intercepted by Trojans Information stored as files on a computer’s hard disc is easily copied by Trojans Keys must be stored outside the computer PINs must be entered on a device outside the computer Cryptographic operations must be performed outside the computer

Today - security, cost or convenience Smart Cards –Security: Need advanced external keypad reader to secure PIN over the Internet –Cost: Expensive keypad readers –Convenience: Sensitive, not for outdoor use RFID/prox cards –Security: Information can be read out remotely and needs advanced external keypad reader to secure PIN over the Internet. –Cost: Expensive readers –Convenience: Robust, contact-less and convenient

Combining security, cost and convenience + Smart Card –Intelligent and high security, can not be read out remotely –Large data storage + RFID Card –Contact-less + Keypad reader –Prevents PIN interception PIN-on-Card

Highest level of security –Security resides on the card, not reader or system –128-bit AES ( RSA, 3DES ) –PIN never leaves the card –Secure data storage (32 kBytes) Low cost –Robust cards and readers, no slot, no moving parts –Low cost for readers High convenience –One card - multiple systems/functionality –Contact-less –High level of automation Introducing PIN-on-Card

PIN-on-Card (POC) POC readers –Desktop reader connects to computer’s USB port –Wall mounted reader –OEM components POC Client API POC controller (for physical security) –Control unit for access, control and alarm for buildings and machinery The PIN-on-Card system components

Cards and readers Cards –Integrated PIN pad –Standard ISO card size –Customized graphic design Readers –Multiple form factors –Reader range up to 5 mm –OEM component from 1 US –Easily integrated into non-metallic flat surfaces; keyboard, mouse mat, Smart Phone etc.

SC Client Driver and API Extends functionality of the card to third- party applications Easy integration with event-driven COM/ActiveX interface Minimal coding effort required Automatic Web-browser activation and navigation to URL stored in card

User scenario - Internet service 1. The card is placed on a card reader connected to computer 2. Card navigates automatically to preprogrammed Internet site 3. User is verified by entering PIN on card 4. User is accepted by service

Basic challenge response 1. PIN entry 2. Encrypt challenge and X with secret key Decrypt response with secret key to determine if X is authentic Generates long random number as challenge Card on reader User Service User claims to be X User sends response Service challenges user Service accepted or rejected