Download presentation
Presentation is loading. Please wait.
Published byKristina Chambers Modified over 8 years ago
2
Modern User and Device Authentication
3
Biometric Fingerprints: Moving beyond Login TPM Key Attestation: Binding a user and machine identities Strong User identity on BYOD devices: with Virtual Smart Card
4
Consumer Reports survey 2013 9.8 million adult Facebook users had their account used by an unauthorized person; had their reputation harmed; or were harassed, threatened, or defrauded Deloitte Study 2013 In a recent study of six million actual user passwords, the 10,000 most common passwords would have accessed 98.1 percent of accounts Cybercrime costing UK billions, 2013 63% of small businesses were attacked by an unauthorized outsider in the last year, up from 41% in the previous year. For large organizations, the comparable figures stood at 78% and 73% Passwords are not sufficient to keep users safe
7
Ease users’ struggle to enter credentials on touch devices Built-in Windows experiences Introduce a new “touch” fingerprint sensors Light up a few engaging scenarios
8
User loved the simplicity seen as a fix to the password problem Replacement for many passwords and ideal for touch devices Quicker to perform than typing a password and more user- friendly Understood gesture as verifying identity before impactful activity Unlike UAC, user knows the result of confirming Gesture is so simple and well understood that it is not seen as intrusive to experience
9
Windows Biometrics Engine Adapter Storage Adapter (inbox but can be replaced by 3 rd party if needed) Sensor Adapter (inbox but can be replaced by 3 rd party if needed) Windows Biometric Device Interface (WBDI) Driver Sensor OS component 3 rd party application 3 rd party driver and companion components
12
Confirming purchase, profile change, in-app experiences Helps control and personalize device experience Highly desired as a means to control high-value transactions, e.g. purchases Can benefit “cloaking” apps, access to an app, release credentials…
13
CredUI Broker LocalSystem Request Verification Check Availability OS components Apps
17
EKAIK
18
User with TPM capable device EKPubs and EkCert obtained out of band Here my RSA (pub), signed by AIK Also, my AIK(pub), signed by EK And here is my EK(pub) Validate EK && generate challenge Validate secret Here is a secret, Encrypted to your EK(pub), Can you tell me a secret? Here is your decrypted secret which proves I own EK(priv) Certificate issued for RSA key Certificate Authority EK AIK RSA
19
RADIUS + VPN Certificate Authority TPM Attested Certificate Non-Attested Certificate Request and Get Certificate
23
Mail App package WWAHost Select client auth cert LiveComm Use the selected cert for SSL Mail server
24
RAS Select certificate VPN app Use the selected certificate over SSL VPN server
25
var certNamespace = Windows.Security.Cryptography.Certificates; var selectedCert; var query = new certNamespace.CertificateQuery(); query.friendlyName = “clientAuthCert”; certNamespace.CertificateStores.findAllAsync(query).done(f unction (certs) { if (certs.size > 0) { for (var i = 0; i < certs.size; i++) { if (certs[i].isStronglyProtected) { selectedCert = certs[i]; break; } });
26
Certificates: Simple Certificate Enrollment Protocol (SCEP)
27
Familiar
28
Modern
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.