1 FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology.

Slides:



Advertisements
Similar presentations
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Advertisements

Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Federal PKI Architecture Update
The 4BF The Four Bridges Forum Federated PACS A Physical Access Use Case for Bridges FIPS 201/PIV-I PACS Interoperability April 28 th, 2009.
SAFE-BioPharma Association NSTIC Day How does industry drive forward.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
Helena Sims NACHA – The Electronic Payments Association Overview of The Electronic Authentication Partnership Tenth Federal & Higher Education PKI Coordination.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Federal Electronic Identity Initiatives – Current Status Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO for E-Authentication,
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
The U.S. Federal PKI and the Federal Bridge Certification Authority
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
> > > > The Financial System Chapter 17. Learning Goals Outline the structure and importance of the financial system. List the various types of securities.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
The U.S. Federal PKI, 2004: Report to EDUCAUSE Peter Alterman, Ph.D. Assistant CIO for E-Authentication National Institutes of Health.
Get Started with Supply Chain Platform Training Presentation for Supply Chain Platform: BAE Systems July 2012.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter 12 Money and Financial Institutions
Assuring Identities in an Open Trust Framework The Identity Assurance Framework Kantara Initiative Presentation to the Kantara Healthcare Identity.
Read to Learn Discuss the functions and characteristics of money. Discuss three main functions of a bank.
Assuring Identities in an Open Trust Framework Interoperability and Connectivity: Privacy, Security and Trust in Health Information Exchange - 5th Annual.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
The Financial System Chapter 16.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
The Evolving U.S. Federal PKI Richard Guida Chair, Federal PKI Steering Committee Federal Chief Information Officers Council
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
The Financial System Chapter 16.
Hajar Sabuur Johnson & Johnson Worldwide Information Security June 16, 2005
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 How Serious Are Financial Institutions About Electronic Identity? -- for -- Educause Policy 2005 Conference Jim Gross Wells Fargo April 7, 2005.
Overview of US PKI Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
CHAPTER 15 Money and the Financial System FHF 15-2 CHAPTER 14 Accounting and Financial Statements CHAPTER 16 Financial Management and Securities Markets.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Privacy, Security, and Identity Management Update
U.S. Federal e-Authentication Initiative
Organization for the Advancement of Structured Information Standards
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Overview of US PKI Peter Alterman, Ph.D.
HIMSS National Conference New Orleans Convention Center
Global Authentication: Liberty Alliance Identity Assurance Framework
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

1 FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology Consortium Empowering the Industry Through Innovative Ideas

FSTC Santa Rosa FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators Capitalizing on a Federated Identity Assurance Program For the Industry

U.S. Federal Identity Management – An Overview Peter Alterman, Ph.D. Chair, U.S. Federal PKI Policy Authority

FSTC Santa Rosa In The Beginning There was Federal PKI –Rudimentary Assurance –Basic Assurance –Medium Assurance –High Assurance

FSTC Santa Rosa Then OMBDecreed 4 Assurance Levels Based on risk

FSTC Santa Rosa And Pushed Fed PKI Into Levels 3 and 4 Cryptographic-based technology Policy-bound High assurance

FSTC Santa Rosa So We Added New Fed PKI Policies Commercial Best Practice versions Medium Hardware Citizen and Commerce Class Common And found HSPD-12 staring us in the face

FSTC Santa Rosa And Created a De-Facto Identity Management Federation That interfederated with other de-facto federations (though we’d proven the concept in 2001)

FSTC Santa Rosa Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs Industry PKIs CertiPath “ SSP” DOD DHS NASA Commerce USPS USPTO HHS DOE IL DOJ State DOD/ECA GPO DOD/Interop Treasury Wells Fargo MIT LL UTexasSx Commercial “SSP-like” Serving all other Agencies Boeing Raytheon Lockheed Martin VeriSign Cybertrust ORC Treasury GPO Exostar Entrust/Cygnacom IdenTrusT? Total: 15 – 20M users SAFE Industry PKIs Johnson & Johnson Merck Pfizer Procter & Gamble Sanofi-Aventis TAP Pharmaceuticals Abbott Labs AstraZeneca Bristol-Myers Squibb Genzyme GlaxoSmithKline INC Research (HSPD-12- comparable) State of VA first responders ~ 500k users!

FSTC Santa Rosa While We Were Doing That We discovered SAML Mandated that all outward-facing online applications run standard risk assessments, and declare Assurance Level Requirements for authentication to those systems

FSTC Santa Rosa And Then Extended the IdM Federation Picture to All ALs And Technologies

FSTC Santa Rosa Then It Was 2004 And we discovered the InCommon Shibboleth-based Identity Federation And worked for two years to interfederate Generating useful documents but no agreement

FSTC Santa Rosa And In 2007 NIH and InCommon Interfederated U.S. Government joined the Liberty Alliance Identity Assurance Expert Group

FSTC Santa Rosa Future Extend interfederation to a meta- framework like the Liberty Identity Assurance Framework Gets the U.S. Government out of the mapping business

Capitalizing on Federated Identity Assurance: Government + Industry = Global Standard 2008 FSTC Annual Conference June 19th, Santa Rosa CA Brett McDowell, Executive Director, Liberty Alliance

16 Who is the Liberty Alliance? Sample of Members Management Board 150 diverse member companies and organizations representing leaders in government and industry (IT, mobility, service provision, system integration and finance) working collaboratively to address the technology, business and policy aspects of identity management.

Holistic Identity Management Is Big...

...And It’s All About Identity Assurance An Ecosystem of Interoperable Products & Services Business and Privacy Guidelines Technology Standards and Guidelines Assurance An Ecosystem of Interoperable Products & Services Identity Assurance Framework & Assessors

Identity Assurance Expert Group  Founded in August of 2007 following Electronic Authentication Partnership (EAP) merger into Liberty Alliance.  Formed to develop a global standard framework and necessary support programs for validating trusted identity assurance credential service providers (CSP’s) in a way that scales, empowers business processes and benefits individual users  Move beyond pure policy development and into development of actionable and measurable programs including certification, education and broad market promotion  Provide public and private organizations with a uniform means of relying on digital credentials issued by a variety of providers in order to advance trusted identity federation and thereby facilitate access to high value online services and information

20 Federated Network The IAF Ecosystem End user (subscriber) Credential Service Provider Federation Operator Assessor Relying Parties (Applications) Accredited Assessors List IAF’s Initial Focus Authentication Technology Vendors

Identity Assurance Framework (IAF)  What is it? –Framework supporting mutual acceptance, validation and lifecycle maintenance across identity federations –EAP Trust Framework and US e-Authentication Federation Credential Assessment Framework as baseline –Harmonized, best-of-breed industry identity assurance standard –Guideline to foster inter-federation on a global scale –Technology agnostic  It consists of 4 parts: –Assurance Levels –Service Assessment Criteria –Accreditation and Certification Model –Business Rules

IAF Uses NIST SP Assurance Levels  Definition: Level of trust associated with a credential measured by the strength and rigor of the identity-proofing process, the inherent strength of the credential and the policy and practice statements employed by the Credential Service Provider (CSP)  Four Primary Levels of Assurance –Level 1 – little or no confidence in asserted identity’s validity –Level 2 – Some confidence –Level 3 – High level of confidence –Level 4 – Very high level of confidence  Use of Assurance Level is determined by level of authentication necessary to mitigate risk in the transaction, as determined by the Relying Party  CSPs are certified by Federation Operators to a specific Level(s)

Assurance Framework Assessment Criteria Note: Assurance level criteria as posited by NIST Special Publication Multi-factor auth; Cryptographic protocol; “soft”, “hard”, or “OTP” tokens Stringent criteria – stronger attestation and verification of records Stringent organizational criteria Access to an online brokerage account AL 3 Multi-factor auth w/hard tokens only; crypto protocol w/keys bound to auth process More stringent criteria – stronger attestation and verification Stringent organizational criteria Dispensation of a controlled drug or $1mm bank wire AL 4 Single factor; Prove control of token through authentication protocol Moderate criteria - Attestation of Govt. ID Moderate organizational criteria Change of address of record by beneficiary AL 2 PIN and PasswordMinimal criteria - Self assertion Minimal Organizational criteria Registration to a news website AL 1 Assessment Criteria – Credential Mgmt Assessment Criteria – Identity Proofing Assessment Criteria – Organization Example Assurance Level

There’s More... Assurance Needs Certification  Standards conformity –Certification by any authority to have equivalence to the four defined assurance levels  Broad adoption –Not specific to any one business model –Not geographically constrained  Leverages existing control frameworks  Minimize burden on assessor community

Value Proposition  For Assessors –Business opportunities in new digital identity realm –Deepen relationship with existing clients  For Credential Issuers –Reduces/Eliminates need for unique and “one-off” assessments by credential consumers –Makes identity services more marketable  For Credential Consumers –Creates a level playing field for an identity marketplace –Reduces/eliminates need to assess issuers  For Individuals –Portable high assurance identity credential enables new/more high value electronic services

26 Phone:

Capitalizing on Federated Identity Assurance: Financial Services Use Cases Jim Gross Senior Vice President ● WellsSecure Identity Assurance 2008 Annual Conference ● June 18, 2008 ● Santa Rosa, CA

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 28 Buying Stuff Getting In The Door Always With Me My 2.0 Agents

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 29 It Takes Two To Tango Interoperable Hardware, Code and Network Specs. Interoperable Business Policy, Rules and Contractual Framework Common “Drive Train” Across The Identity Ecology Young Adult Gangly Adolescent

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 30 Key Technology Drivers Toward Mature Convergence  For physical: HSPD-12/FIPS 201/PIV “twins” –Finally brought certification to smart card reader interoperability –NIST (draft out for review) further refines physical access specs. to support identity assurance level  For mobile: secure contactless access to SIM chip  For Web 2.0: rich metadata –To enable a service –And, to allow dynamic linkage decisioning Standard identity services are at the top of the list!

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 31 Key Business Driver Towards Mature Convergence  Liberty Alliance IAF (Identity Assurance Framework) –Objective is to create a framework of baseline policies, business rules and commercial terms against which identity assurance services can be assessed and certified Standard, broadly accepted Levels of Assurance allow relying parties (or their agents) to readily determine, on the fly, their confidence in an identity credential –Desired results are: Less complex/more rapid deployment of digital identity services Operational streamlining of identity service provider certification/accreditation processes for entire industry

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 32 IAF Assurance Level Policy Overview  Level of trust is associated with the strength and rigor of the identity-proofing policy and practices statements joined to an identity credential  Four Primary Levels of Assurance –Level 1 – little or no confidence in asserted identity’s validity –Level 2 – Some confidence –Level 3 – High level of confidence –Level 4 – Very high level of confidence  Use of Assurance Level is determined by Relying Party risk and the level of authentication rigor necessary to mitigate a given risk(s)  CSP’s (Credential Service Providers) are certified by Federation Operators to offer services at the given assurance level(s)

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 33 Use Case: Annuity Funds Transfer  Initiation/transfer of $XXMM from demand deposit account to third party annuity product provider –Basic customer financial institution requirement: customer authentication onto network and application in order to submit request. Existing tools satisfy requirement. –Further requirement: customer authorization to submit request. Existing tools partially satisfy requirement. –But, do both the financial institution and the third party have high assurance that the identity credential submitted can non-repudiably represent the customer and other dependent parties? IAF framework and supporting network deliver this capability. This is where we lose STP traction today And it gets messier as Web 2.0/SOA unfolds

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 34 Converged Use Case: Physical  Physical access to storage facility containing negotiable documents –Facility maintains directory of identities authorized to enter –Person x is authorized to enter, but does not have a facility access card to allow authorized entry –Person x does holds a payment card that also holds a high assurance identity credential –Person x can be authorized to enter without further effort via assurance level match

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 35 Real World Use Case/Deployment  US Federal: GSA eOffer procurement site acceptance of federated WellsSecure certificates

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 36 Federal HSPD-12 Credential State/Local FRAC FEMA Attribute Repository Valid Private Sector FRAC Web-based Public CRLs Trusted :… Key: AHJ - Authority Having Jurisdiction CRLs - Certificate Revocation Lists FRAC - First Responder Authentication Credential PIV Auth Cert – FIPS 201 Personal ID Verification Authorization Certificate Consolidated Information = PIV Auth Cert + Electronic Attribute FIPS 201 Cert Agency or AHJ Attribute Administrator “Standardized FIPS 201 Credential & Attribute Validation Process” Electronic Attributes Identity Infrastructure Personal Identifiable Information (PII) Retained Validation Infrastructure Validated Information Retained Attribute Infrastructure No PII Retained For Official Use Only (FOUO) Identity Framework Data Services Will Be Increasingly Essential Assurance Level Assigned Assurance Level Consumed Graphic and content courtesy of Tom Lockwood, DHS

2008 Wells Fargo Bank N.A. -- All Rights Reserved Page 37 Contact Information Jim Gross Senior Vice President Wells Fargo One Front Street MAC A th Floor San Francisco, CA V: (415) F: (415)

University Bancorp (NASDAQ –UNIB) Leveraging Healthcare RHIOs To Create an Identity Assurance Federation Stephen Lange Ranzini President & CEO, University Bancorp President & Chairman, University Bank President & Chairman, University Islamic Financial  +1(734) xt 226   June 19, 2008

Safe Harbor Statement q Any prediction of the future is inherently not assured. Investors should read the “Risk Factors” listed on pages 23 to 24 in the Company’s report on Form 10K for the year ended December 31, 2007 and any prediction in this release is intended to be covered by the Safe Harbor provisions of Section 21E of the Securities Exchange Act of 1934.

Overview of University Bancorp q Bank holding company based in Ann Arbor, Michigan –Founded 1890 & Relocated to Ann Arbor in 1996 q Owns 100% of University Bank –FDIC insured community bank in Ann Arbor, Michigan q Owns 80% of Midwest Loan Services –Mortgage subservicer to the Credit Union industry with $5.25 billion in mortgages subserviced q Owns 80% of University Islamic Financial –First U.S. Islamic Banking subsidiary run on Sharia’a principles q Owns 50.01% of University Lending Group –Wholesale HUD/GNMA/VA lender operating in 12 states q Owns 100% of University Insurance & Investment Services –Full-line Insurance Agency and Stock Brokerage Account services q 4,255,878 shares of common stock –Board owns 70.6% of outstanding shares –Current Share Price $2.00 (Symbol UNIB) –Current Market Capitalization, just $8.5 million –Trading volume averages 3,400 shares per day –52 week range: High $2.20; Low $1.60 –Trading at 12.5x Trailing 12 Months Net Income –Trading at 4.5x 2008 Net Income projection (low end)

Routes to Market Adoption of the Identity Assurance Framework q Healthcare RHIOs as Possible Early Adopters of the Identity Assurance Framework –What are RHIOs? –Why do RHIOs need “credentials” or a “Trust Framework”? –HIPAA q Example of SEMHIE as possible early adopter –Who are the stakeholders of SEMHIE Major Michigan Employers State of Michigan Major healthcare insurers Major Hospital Chains University Bank q What SEMHIE may want –Identity Assurance Federation services supplied by a banking industry consortium Why they may want this from a banking industry consortium and not from individual large banks –Individual members may want Additional Optional Services such as fully electronic payment services from individual banks

Identity Assurance Federation q Why large banks would want to participate (what's in it for them) –How large banks could more readily sell their value added services if they participated in the Identity Assurance Federation to: End users Correspondent (smaller) banks q Services that can only be sold by the banking industry via an Identity Assurance Federation –Examples of lucrative services that cannot be supplied by a single large bank but could be supplied by a banking industry Identity Assurance Federation consortium –A bigger revenue pie for all banks who participate q Should the Identity Assurance Federation have a: –Non-profit/cost recovery only business model (e.g. DTCC or ACH type model)? –For profit/income generating business model (e.g. VISA/MASTERCARD/ATM network model)?

For More Information Stephen Lange Ranzini President & CEO University Bancorp (Listed NASDAQ – UNIB)  +1(734) xt 226 [phone]  +1(734) [fax]  [ ] Investor Relations website: 

44 FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators The Financial Services Technology Consortium Empowering the Industry Through Innovative Ideas

FSTC’s 2008 Annual Conference On the Innovative Edge: Successful Strategies for Financial Services Industry Navigators Futurist Closing Luncheon Program: On the Horizon: The Future of Telecommunications and Banking