OASIS Trust Elevation Elevate Trust in Electronic Identities Gershon Janssen, Member OASIS Trust Elevation TC www.oasis-open.org.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Multi-factor Authentication Methods Taxonomy Abbie Barbir.
Digital Certificate Installation & User Guide For Class-2 Certificates.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Functional component terminology - thoughts C. Tilton.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Authentication & Kerberos
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Biometrics: Identity Verification in a Networked World
Security-Authentication
Geneva, Switzerland, September 2014 Step-up authentication a key enabler of mobile on-line trust Progress report of ITU-T and OASIS Trust Elevation.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
OASIS Trust Elevation Elevate Trust in Electronic Identities Abbie Barbir, Ph.D Co-Chair OASIS Trust Elevation TC.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
“Stronger” Web Authentication: A Security Review Cory Scott.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
NIST Update: Part Deux Elaine Newton, PhD NIST
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Networking Network Classification, by there: 3 Security And Communications software.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Challenge/Response Authentication
Mastercard Identity Check Mobile
Identity on the Internet
ESign Aashutosh.
System Access Authentication
Challenge/Response Authentication
Authentication.
Tokens & Proofing De-Mystified
Security Barriers Asset Proper Access Attack Security System
Office 365 Identity Management
Setting up an online account
E-Authentication: What Technologies Are Effective?
Installation & User Guide
Introduction of ISO/IEC Identity Proofing
Authentication Chapter 2.
COEN 351 Authentication.
Presentation transcript:

OASIS Trust Elevation Elevate Trust in Electronic Identities Gershon Janssen, Member OASIS Trust Elevation TC

2 Trust Elevation: Elevate the trust in an electronic identity presented for authentication purposes.

3 Why are we doing this work? Few consumers have high LOA-credentials. More organizations look to implement systems that require authentication at higher Levels of Assurance When dealing with consumers and citizens, there is a clear need for dynamic authentication: a customer should only be asked to do multi-factor authentication when they want to do “a high value transaction”, not as a prerequisite to visiting a website. As a result of this there is an increased interest in transaction-based assurance: “authentication” based on the necessary current conditions of specified, validated attributes and agreements. New real world solutions seem to require the use of a step-up approach to multi-factor authentication.

4 Why are we doing this work? Recommendations by the Federal Financial Institutions Examination Council (FFIEC) and the highly publicized breaches in 2011 have made trust elevation a more urgent topic. Responding to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC).

5 Goal OASIS Trust Elevation TC The OASIS Trust Elevation TC’s goal is: to define a set of methods or standardized protocols that service providers may use to elevate the trust in an electronic identity presented to them for authentication purposes.

6 Approach Phase I: Catalog of Trust Elevation Methods Short: conduct a survey of methods of trust elevation and creating a taxonomy of five method factors Create a comprehensive list of methods being used currently to authenticate identities online to the degree necessary to transact business where material amounts of economic value or personally identifiable data are involved. Status: phase is completed – Committee Note pending publication

7 Approach Phase II: Analysis of Trust Elevation Methods Short: an analysis of the methods, which methods counter which threats and are complimentary, etc. Analysis of identified methods to determine their ability to provide a service provider with assurance of the submitter's identity sufficient for elevation between each pair of assurance levels, to transact business where material amounts of economic value or personally identifiable data are involved. Status: phase starting up

8 Approach Phase III: Establish Trust Elevation Protocol Short: propose a protocol Establish an "Electronic Identity Credential Trust Elevation Methods Protocol“ that recommends particular methods as satisfying defined levels of assurance for elevating trust in an electronic identity credential to assure the submitter's identity sufficiently to support elevation between each pair of assurance levels to transact business where material amounts of economic value or personally identifiable data are involved. Status: phase planned

9 Definition of Trust Elevation Trust elevation: Increasing the strength of trust by adding factors from the same or different categories of trust elevation methods that don’t have the same vulnerabilities. There are five categories of trust elevation methods: who you are, what you know, what you have, what you typically do and the context. What you typically do consists of behavioral habits that are independent of physical biometric attributes. Context includes, but is not limited to, location, time, party, prior relationship, social relationship and source. Elevation can be within the classic four NIST and ISO/ITU-T levels of assurance or across levels of assurance.

10 Categories of Trust Elevation Methods Who you are – biometrics, behavioral attributes What you know – shared secrets, public and relationship knowledge What you have – devices, tokens - hard, soft, OTP What you typically do – described by ITU-T x1254 – behavioral habits that are independent of physical biometric attributes Context – e.g. location, time, party, prior relationship, social relationship and source

11 Levels of Assurance Classic four NIST and ISO/ITU-T levels of assurance showing Trust Elevation Paths between Levels of Assurance

12 Trust Elevation Method List Methods sorted by trust elevation method category What you are – Biometric -- use of distinctive measurements about your physical body and or your behavior that are unique Physical Biometric – considered immutable and unique – Facial recognition – Iris Scan – Retinal Scan – Fingerprint Palm Scan – Voice – Liveliness biometric factors include: » Pulse. » CAPTCHA; » Temperature. Behavioral Biometric -- person’s physical behavioral activity patterns – Keyboard signature – Voice

13 Trust Elevation Method List What you know – User Name and Password (UN/PW) – Knowledge Based Authentication (KBA) User is asked one or more (sometimes 3 to 5) challenge questions User-data procured at enrollment time Static KBA – Questions and answers that do not change Dynamic KBA – questions that are user-specific and/or change over time and/or the answers to the questions change over time (e.g., asking the value of the customer’s last VISA transaction)

14 Trust Elevation Method List What you have – End Point Identity Landline number; Mobile phone number and or SIM and or OS; IP address, router, provider; Cookie, OS, browser, chip. – Token Hardware tokens – Proprietary tokens – USB tokens – Smart Cards – Mobile phone and or SIM. Software tokens – Digital certificates – Cookies

15 Trust Elevation Method List What you have – Out of Band User calls service provider from a registered phone; Response to a phone call from the service provider; Response to an from the service provider; Response to an SMS message from the service provider; Response to a mobile application transaction initiated by the service provider; Response to a post card; Response to a letter, registered or otherwise. – One Time Password (OTP) ; Mobile phone voice message; Mobile phone SMS message; Mobile phone application; Landline voice message; Mail (postcard, letter, registered mail, etc.); Proprietary hardware token with password generation capability.

16 Trust Elevation Method List What You Typically Do -- an individual’s repeated behaviors or behavioral habits – Browsing patterns (order in which pages are accessed, duration of access, links accessed, etc.); – Time of access; – Type of access, etc.

17 Trust Elevation Method List Context -- attributes relevant to the user or situation – Location; – Time of access; – Frequency of access; – Party; – Prior relationship ; – Social relationship; – Source and endpoint identity attributes such as Date of last virus scan IP address Subscriber identity module (SIM) Device basic input/ouput system (BIOS) Virus scan software version CallerID Cookie (presence and or contents); – Multi-channel combination; – Credential lifecycle attributes; – Certificate binding and or other chain of trust attributes; – Secure device with user specific disk allocation.

18 Method Examples (Use Cases) Reuse of Primary Authenticator Method Example Customer Retention Method Example Cloud Access Method Example Static KBA Method Example Session Elevation to Level of Identity Proofing Method Example Hub Provider of Pseudonymous Identity Method Example Step-Up Authorization Method Example Multi-channel by Phone Method Example Generic KBA Method Example Address Verification Service Method Example Split Large (Risky) Transactions into Multiple Smaller Transactions Method Example Use of Tokenized Device/Network Attributes Method Example Trust Elevation by Hard Token (OTP Generator) Method Example Multi-Attribute-Based Trust Elevation Service Method Example (AKA Fraud Detection) Emergency Access to Patient Healthcare Information – a European Method Example

19 Resources OASIS Trust-El Technical Committee Homepage