ID anywhere mobile | smart cards | devices.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Mobile Devices in the DoD
Trusted Symbol of the Digital Economy 1 Bill Holmes – VP Marketing ID Platform - Smart Cards.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
1 Enabling Personal Databases To every Citizen. To create a Global Personal Network that facilitates Information Flow between people Every person in the.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
© ZigBee Alliance. All rights reserved. 1 Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG, July 2012.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Secure Communication Architectures.
7/11/2011Pomcor 1 Pros and Cons of U-Prove, Idemix and Other Privacy-Enhancing Technologies Francisco Corella Karen Lewison Pomcor.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
10/20/2011Pomcor 1 Deployment and Usability of Cryptographic Credentials Francisco Corella Karen Lewison Pomcor.
SKS – Secure Key Store KeyGen2 –Token Provisioning Protocol Executive Level Presentation.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Certificate and Key Storage Tokens and Software
Public Key Infrastructure from the Most Trusted Name in e-Security.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Proposal for the support of connected and proximity crypto HW in browsers Philip Hoyer – Director Strategic Innovation January 2015 Presentation Title.
Country Update: Austria Herbert Leitold Secure Information Technology Center - Austria
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June A Rev
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
·
Identity on Force.com & Benefits of SSO Nick Simha.
Enabling Shared Context Anne Thomas Manes Director Market Innovation W3C Web Services Workshop.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Ignite Presentation: Near Field Communication Harry Yang.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
National Computational Science National Center for Supercomputing Applications National Computational Science Credential Management in the Grid Security.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
1 1 Social Security Platform James Wu We Simplify Security.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Understand User Authentication LESSON 2.1A Security Fundamentals.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Tokens & Proofing De-Mystified
Hardware Cryptographic Coprocessor
Product Manager, Keon PKI
Merging Security and Convenience with Seos® Credential Technology
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Secure Element API An introduction.
Windows Hello in Microsoft Edge
Enhancing Web Application Security with Secure Hardware Tokens
Public Key Infrastructure from the Most Trusted Name in e-Security
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

ID anywhere mobile | smart cards | devices

W3C WebCrypto.Next linking to existing identities and secure credentials Peter Cattaneo, VP Business Development September 2014

3 Existing identities and credentials There are many valuable existing identities and credentials Corporate Government Financial services… And user-managed

4 Corporate, government, financial services… Centrally issued ‒Validated identity, lifecycle management Strong cryptography ‒PKI, PK, symmetric Lots of form factors ‒Smart cards, USB tokens, embedded SEs, microSD, passports… Many interfaces ‒Hardwired, PC/SC, USB, Bluetooth, NFC … Even more standards Large deployed base

5 User-managed identity Individually created and managed ‒Self asserted Not widely deployed with crypto Emerging standards Unique issues ‒Different concept of privacy Emerging issues

6 Key points for W3C Enable use of existing identities and credentials ‒Centrally issued ‒Individually managed Support multiple credential stores Enable both closed and open systems ‒Discovery… or not Suitable for common use cases; optionally including credential management

7 Thank you | Peter Cattaneo ǀ