FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

Size: px
Start display at page:

Download "FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies"

Transcription

1 FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies

2 The Problem The Solution The Alliance Updates

3 Data Breaches 781 data breaches in million records in 2015 (up 50%) $3.8 million cost/breach (up 23% f/2013)

4 The world has a PASSWORD PROBLEM

5 WE NEED A NEW MODEL

6 WE CALL OUR NEW MODEL Fast IDentity Online online authentication using public key cryptography

7 The Problem The Solution The Alliance Updates

8 THE OLD PARADIGM SECURITY USABILITY

9 HOW FIDO AUTHN WORKS The user authenticates locally to their device by various means The device authenticates the user online using public key cryptography LOCAL ONLINE AUTHENTICATOR

10 Passwordless Experience (UAF Standards) 1 2 3? Authentication Challenge Biometric Verification* Authenticated Online Second Factor Experience (U2F Standards) Second Factor Challenge *There are other types of authenticators Insert Dongle* / Press Button Authenticated Online

11 FIDO UAF UNIVERSAL AUTHENTICATION FRAMEWORK Same User as enrolled before? Same Authenticator as registered before? AUTHENTICATOR

12 FIDO U2F UNIVERSAL 2 ND FACTOR Is a user present? USER VERIFICATION FIDO AUTHENTICATION AUTHENTICATOR Same authenticator as registered before?

13 USABILITY, SECURITY and PRIVACY

14 No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No Link-ability Between Services No Link-ability Between Accounts

15 The Problem The Solution The Alliance Updates

16 The FIDO Alliance is an open industry association of over 250 global member organizations

17 FIDO SCOPE Single Sign-On Federation MODERN AUTHENTICATION Authentication Passwords Strong Risk-Based User Management Physical-to-digital identity

18 FIDO Alliance Mission Develop Specifications Operate Adoption Programs Pursue Formal Standardization

19 Associate Members

20 Sponsor Members The image part with relationship ID rid57 was not found in the file.

21 Board Members

22 Our mission is highly complementary to many other associations around the world. We welcome the opportunity to collaborate with this growing list of industry partner organizations. Liaison Program

23 Government Members The fact that FIDO has now welcomed government participation is a logical and exciting step toward further advancement of the Identity Ecosystem; we look forward to continued progress. -- Mike Garcia, NSTIC NPO

24 The Problem The Solution The Alliance Updates

25 FIDO TIMELINE Alliance Announced FIDO Ready Program Specification Review Draft First Deployments FIDO 1.0 FINAL Certification Program New U2F Transports Broad Adoption FEB Members DEC 2013 FEB 2014 FEB-OCT 2014 DEC MAY 2015 JUNE 2015 TODAY >250 Members

26 2014 FIDO ADOPTION Secure Consumer Payments Enabled for Alipay Customers with Easy-to-Use Fingerprint Sensors on Recently-Launched Samsung Galaxy S5 September 17, 2014 PayPal and Samsung Enable Consumer Payments with Fingerprint Authentication on New Samsung Galaxy S5 Feb 24, 2014 Google Launches Security Key, World s First Deployment of Fast Identity Online Universal Second Factor (FIDO U2F) Authentication October 21, 2014

27 2015 FIDO ADOPTION Google for Work announced Enterprise admin support for FIDO U2F Security Key April 21, 2015 Today, we re adding Universal 2nd Factor (U2F) security keys as an additional method for two-step verification, giving you stronger authentication protection. August 12, 2015 Qualcomm launches Snapdragon fingerprint scanning technology March 2, 2015 Microsoft Announces FIDO Support Coming to Windows 10 Feb 23, 2015 Largest mobile network in Japan becomes first wireless carrier to enhance customer experience with natural, simple and strong ways to authenticate to DOCOMO s services using FIDO standards. May 26, 2015 [T]he technology supporting fingerprint sign-in was built according to FIDO (Fast IDentity Online) standards. September 15, 2015 GitHub says it will now handle what is called the FIDO Universal 2nd Factor, or U2F, specification. October 1, 2015

28 2016 FIDO ADOPTION FIDO Universal 2nd Factor (U2F) authentication is now being used to allow all UK citizens to easily and securely access GOV.UK Verify digital public services. Mar 23, 2016 BC Card provides Token and FIDO services to strengthen security and safety of Samsung Pay March 1, 2016 RSA Via Access Server is now FIDO Certified March 1, 2016 NTT DOCOMO is now offering FIDO-enabled biometric authentication for customers using Apple ios devices Mar 7, 2016

29 Deployments are enabled by FIDO Certified products available today

30 OEMs Now Shipping FIDO Certified Devices Samsung S5, Mini Alpha Note 4, 5 Note Edge Tab S, Tab S2 S6, S6 Edge LG V10 & G5 Sharp Aquos Zeta SH-01H, SH-03G Sony Experia Z5 SO-01H, Compact SO-02H, Premium SO-03H Fujitsu Arrows Fit F-01H, NX F-02H, NX F-04G

31 App Developers can add FIDO to any TouchID-enabled device running ios 9+ Supported ios Fingerprint Devices iphone 5s iphone 6, 6+ iphone 6s, 6s+ ipad Air 2, Mini 3 ipad Mini 4 ipad Pro

32

33 FIDO 2.0 & W3C November 2015 February 2016 FIDO Authentication Poised for Continued Growth as Alliance Submits FIDO 2.0 Web API to W3C W3C has accepted our submission Specifications required to define a FIDO-compliant Web API Designed to extend FIDO s existing reach to all platforms OEM community should begin to plan their support now RP community should deploy FIDO 1.x now knowing FIDO standards are future proof -- strategically positioned as the de facto authentication scheme for the Web & OS Platforms W3C Launches New Standards Effort Based on FIDO 2.0 Web APIs W3C announces the chartering of the Web Authentication Working Group Standardizing the submitted FIDO Web APIs can ensure standards-based strong authentication across all Web browsers and related Web platform infrastructure The first meeting of the Working group was early March

34 @FIDOAlliance

A NEW MODEL FOR AUTHENTICATION

A NEW MODEL FOR AUTHENTICATION All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD

More information

Who What Why

Who What Why Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD

More information

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017 FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Welcome to the 5G age

Welcome to the 5G age Welcome to the 5G age Cristiano Amon Executive Vice President, Qualcomm Technologies, Inc. and President, Qualcomm CDMA Technologies October 2017 @cristianoamon Mobile technology is powering the global

More information

Digital Test. Coverage Index

Digital Test. Coverage Index Digital Test Coverage Index Edition 3 December 2015 Table of Contents Introduction How We Built the Index and How to Read It... Pg. 4 Key Takeaways... Pg. 5 Mobile and Web Indexes by Country U.S... Pg.

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

ADOPTING FIDO SearchSecurity

ADOPTING FIDO SearchSecurity E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2

More information

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TABLE OF CONTENTS Executive Summary... 3 FIDO Solution Requirements... 3 FIDO UAF Client infrastructure... 4 FIDO UAF

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017 1 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017 2 THE FACTS ON

More information

More than just being signed-in or signed-out. Parul Jain, Architect,

More than just being signed-in or signed-out. Parul Jain, Architect, More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance

More information

Next Gen Security Technologies for Healthcare Authentication

Next Gen Security Technologies for Healthcare Authentication Next Gen Security Technologies for Healthcare Authentication Session 261, March 8, 2018 Abbie Barbir, Senior Security Adviser, Aetna Brett McDowell, Executive Director, FIDO Alliance 1 Conflict of Interest

More information

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization

More information

Digital Test Coverage Index

Digital Test Coverage Index Edition 4 April 2016 Digital Test Coverage Index Enhance your customers digital experiences Table of Contents Why We Created This Index... Pg. 3 Introduction... Pg. 4 How We Built the Index and How to

More information

Technology Strategy Technology and Strategy

Technology Strategy Technology and Strategy Technology and Strategy Danger, Inc. Three key questions Who are the most attractive potential partners to design and manufacture devices for Danger? Who amongst the worlds' many mobile network operators,

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

The Innovation Connection: How NFC is Driving New Global Opportunities. Koichi Tagawa Sony Chairman, NFC Forum

The Innovation Connection: How NFC is Driving New Global Opportunities. Koichi Tagawa Sony Chairman, NFC Forum The Innovation Connection: How NFC is Driving New Global Opportunities Koichi Tagawa Sony Chairman, NFC Forum NFC World Congress September 19, 2011 Marketplace Situation 2 Global Market Developments Business

More information

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012 Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control

More information

Mobile Search: Techniques and Tactics for Marketers

Mobile Search: Techniques and Tactics for Marketers Mobile Search: Techniques and Tactics for Marketers Follow along using #mobileppc Eli Goodman & Mike Solomon *Note: A copy of this presentation will be sent to all attendees within 2-3 business days Our

More information

FIDO & PSD2. Providing for a satisfactory customer journey. April, Copyright 2018 FIDO Alliance All Rights Reserved.

FIDO & PSD2. Providing for a satisfactory customer journey. April, Copyright 2018 FIDO Alliance All Rights Reserved. FIDO & PSD2 Providing for a satisfactory customer journey April, 2018 Copyright 2018 FIDO Alliance All Rights Reserved. 1 Introduction When PSD2 is deployed in Europe, users will be able to take advantage

More information

An overview of. Mobile Testing. By André Jacobs. A Jacobs

An overview of. Mobile Testing. By André Jacobs. A Jacobs An overview of Mobile Testing By André Jacobs THE RISE AND RISE OF MOBILE 3 The Apple Story A look at the company that arguably has sparked the explosive growth in smart devices and mobile applications

More information

FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS

FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS April 2015 Ralph W. Bernstein (Consultant) IDEX ASA and AmberCon 14.04.2015 ralph.bernstein@idex.no ralph@bernstein.no Mobile:+ 47 93059303 www.idex.no IDEX

More information

Supported Operating Systems, Browsers, Networks, and Stores Phone Channel Supported Operating Systems

Supported Operating Systems, Browsers, Networks, and Stores Phone Channel Supported Operating Systems Supported Operating Systems, s, Networks, and Stores Phone Channel Supported Operating Systems NOTE: Only major versions released directly by OEMs (Apple or any Android hardware manufacturer) are included.

More information

Mobile Banking Supported Operating Systems, Browsers, and Networks Phone Channel

Mobile Banking Supported Operating Systems, Browsers, and Networks Phone Channel Mobile Banking ed Operating Systems, Browsers, and Networks Phone Channel ed Operating Systems (October December 2017) The following outlines the scope of ADK on the Go s operating system and network support.

More information

Bango Preliminary results

Bango Preliminary results Bango Preliminary results for 12 months to 31 st March 2011 June 2011 www.bangoinvestor.com - Highlights - Business Progress - Financials - Outlook - Supplementary June 9 th 2009 1 About Bango Bango customers

More information

Smart Card Alliance Member Webinar: Mission Expansion and Name Change. February 22, 2017

Smart Card Alliance Member Webinar: Mission Expansion and Name Change. February 22, 2017 Smart Card Alliance Member Webinar: Mission Expansion and Name Change February 22, 2017 Agenda The Changes Ahead Randy Vanderhoof Industry and Market Impact Brian Russell, Board Chair Industry Councils

More information

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Natural Security Alliance

Natural Security Alliance Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution

More information

KENYA 2019 Training Schedule

KENYA 2019 Training Schedule KENYA 2019 Training Schedule Monday Tuesday Wednesday Thursday Friday 4th Feb 5th Feb 6th Feb 7th Feb 8th Feb Using 11th Feb 12th Feb 13th Feb 14th Feb 15th Feb Using (cont...) Field Data Collection and

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Mobile: the foundation of the digital economy

Mobile: the foundation of the digital economy Mobile: the foundation of the digital economy Cristiano Amon Executive Vice President, Qualcomm Technologies, Inc. and President, Qualcomm CDMA Technologies @cristianoamon 1 Mobile technology is powering

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m UAF Protocol Internet is Global 120m 300m 1.3bn Users 160m 289m 300m #Users 2014 Google: 2013 Twitter: 2015 Devices without physical keyboard How Secure is Authentication? Cloud Authentication Password

More information

Manual Apple Ipad Mini 2 Release Date 2013 Uk

Manual Apple Ipad Mini 2 Release Date 2013 Uk Manual Apple Ipad Mini 2 Release Date 2013 Uk We've found 8 Apple ipad Mini 2 deals View all deals While it's dropped since the launch of the ipad mini 3, you're still looking at 239 (US$299, AU$369).

More information

Latest Certified Device List Phone Channel (OCT 2016)

Latest Certified Device List Phone Channel (OCT 2016) Latest Certified Device List Phone Channel (OCT 2016) The following outlines the scope of Mobiliti s general device support. Only devices explicitly listed in the Certified Device List are fully supported.

More information

TECHNICAL WHITE PAPER ENABLING BIOMETRICS FOR MOBILE APPLICATION AUTHENTICATION

TECHNICAL WHITE PAPER ENABLING BIOMETRICS FOR MOBILE APPLICATION AUTHENTICATION TECHNICAL WHITE PAPER ENABLING BIOMETRICS FOR MOBILE APPLICATION AUTHENTICATION Comparing Nok Nok S3 Authentication Suite and Native API Approaches EXECUTIVE SUMMARY In an increasingly mobile world, relying

More information

Operating System Support Plan for Test Delivery System

Operating System Support Plan for Test Delivery System Operating System Support Plan for Test Delivery System 2017 2018 Published August 7, 2017 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information Distribution

More information

Forging the Link Between Global Interoperability and New Business Opportunities

Forging the Link Between Global Interoperability and New Business Opportunities Forging the Link Between Global Interoperability and New Business Opportunities Debbie Arnold Director, NFC Forum WIMA USA November 30, 2011 Marketplace Situation 2 NFC Forum Google Hits Awareness of NFCIncreasing

More information

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking

More information

Mobiliti. Certified Device List MR6 Release. Last Updated June, ASP Version

Mobiliti. Certified Device List MR6 Release. Last Updated June, ASP Version Certified Device List MR6 Release Last Updated June, 2015 - ASP Version 2011-2014, Inc. or its affiliates. All rights reserved. This work is confidential and its use is strictly limited. Use is permitted

More information

VESA Display Standards Updates

VESA Display Standards Updates VESA Display Standards Updates Jim Choate VESA Compliance Program Manager May 3, 2018 Agenda VESA Overview DisplayPort Market Adoption DisplayPort 1.4a Updates VESA Certified DisplayHDR New VESA Technology

More information

Welcome to the Industrial Internet Forum

Welcome to the Industrial Internet Forum Welcome to the Industrial Internet Forum Dr. Richard Soley, Executive Director Industrial Internet Consortium Keio University June 3, 2016 The Industrial Internet is leading the next economic revolution

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

W3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption

W3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption January 2017 W3C CASE STUDY Teamwork on Open Standards Development Speeds Industry Adoption Like driving a long stretch of open road alone, standards development work can be a lonely endeavor. But with

More information

Grid Code Planner EU Code Modifications GC0100/101/102/104

Grid Code Planner EU Code Modifications GC0100/101/102/104 Grid Code Planner EU Code Modifications GC0100/101/102/104 Place your chosen image here. The four corners must just cover the arrow tips. For covers, the three pictures should be the same size and in a

More information

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com :: @jgrantindc 1 WHAT IS REGTECH? RegTech: Technology

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

Operating System Support Plan for Test Delivery System

Operating System Support Plan for Test Delivery System Washington Comprehensive Assessment Program Operating System Support Plan for Test Delivery System 2017 2018 Published July 20, 2017 Prepared by the American Institutes for Research Descriptions of the

More information

Operating System Support Plan for Test Delivery System

Operating System Support Plan for Test Delivery System Indiana Assessment Operating Support Plan for Test Delivery 2018 2019 Published September 18, 2018 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information

More information

Organizing a Campus Change: Planning for Identity and Access Management Improvements at UF

Organizing a Campus Change: Planning for Identity and Access Management Improvements at UF Organizing a Campus Change: Planning for Identity and Access Management Improvements at UF Dr. Mike Conlon Director of Data Infrastructure June 3, 2008 University of Florida $2B annual revenue, $518M in

More information

Smart Meters and Home Automation

Smart Meters and Home Automation Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing bob.gohn@ember.com Who is? Ember is the leading supplier of ZigBee Semiconductors, Software, and Development Tools Defining Home

More information

How Mobile is Reshaping Payments

How Mobile is Reshaping Payments How Mobile is Reshaping Payments Smart Card Alliance Payments Summit April 7, 2016 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston Disclaimer: The views expressed in this

More information

1 Introduction Requirements Architecture Feature List... 3

1 Introduction Requirements Architecture Feature List... 3 Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 3 1.3.1 Device Compliance status... 3 1.3.2 Auto grouping for devices... 4 1.4 Basic Deployment... 4 1.4.1 Prepare

More information

FIDO Alliance Response to the European Banking Authority (EBA)

FIDO Alliance Response to the European Banking Authority (EBA) FIDO Alliance Response to the European Banking Authority (EBA) Consultation on the Guidelines on the conditions to be met to benefit from an exemption from contingency measures under Article 33(6) of Regulation

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

Enrolling for Mobile Money

Enrolling for Mobile Money Enrolling for Mobile Money Log onto Internet Banking Go to Services> Mobiliti Click on Enroll Check the box next to I accept these Terms and Conditions and the continue button will appear after the check

More information

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;

More information

OpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011

OpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 OpenID: From Geek to Chic Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 Why OpenID? Time for a poll Who has reused their same password when logging into a new website? Who has forgotten their password

More information

Secure Application Trend in Smartphones. STMicroelectronics November 2017

Secure Application Trend in Smartphones. STMicroelectronics November 2017 Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research

More information

Mobile Apps: The Big Picture

Mobile Apps: The Big Picture Mobile Apps: The Big Picture Chetan Sharma Consulting 9 yr old Seattle based Strategy firm exclusively focused on Mobile Advisor to major operators, brands, startups, VCs, and Fortune 500 firms around

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

Microsoft Skype for Business

Microsoft Skype for Business Microsoft Skype for Business The Next generation of LYNC IM Community OCIO - Operations & Security September 27, 2017 Agenda Past Present Capabilities Statistics Use Cases Challenges Future Skype for Business

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

Operating System Support Plan for Test Delivery System

Operating System Support Plan for Test Delivery System U.S. Virgin Islands Smarter Balanced Assessments Operating System Support Plan for Test Delivery System 2016 2017 Published October 4, 2016 Prepared by the American Institutes for Research Descriptions

More information

Annual Membership Meeting. San Francisco, CA June 19, 2014

Annual Membership Meeting. San Francisco, CA June 19, 2014 Annual Membership Meeting San Francisco, CA June 19, 2014 1 Antitrust Statement Although the Cool Roof Rating Council is a broad-based 501(c)3 organization, it does include numerous competitors in the

More information

Partner Verified and Supported Products. Program Guide 6.8

Partner Verified and Supported Products. Program Guide 6.8 Partner Verified and Supported Products Program Guide 6.8 Copyright 2018 VMware, Inc. All rights reserved. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other

More information

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Introduction of the Identity Assurance Framework. Defining the framework and its goals Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

RCS OVERVIEW. Fábio Moraes GSMA October 2018 Future Networks Programme

RCS OVERVIEW. Fábio Moraes GSMA October 2018 Future Networks Programme RCS OVERVIEW Fábio Moraes GSMA October 2018 Future Networks Programme RCS INDUSTRY MOMENTUM WHAT IS RCS BUSINESS MESSAGING? RCS is an upgrade to SMS on a global scale Universal Profile resolving legacy

More information

Macbook Pro Schematics 13 In Retina Display Release Date

Macbook Pro Schematics 13 In Retina Display Release Date Macbook Pro Schematics 13 In Retina Display Release Date Wondering what happened to the 15in Retina MacBook Pro? Here's our New 2015 15-inch MacBook Pro with Retina display release date, specs and UK pricing.

More information

Natural Security Alliance

Natural Security Alliance Natural Security Alliance Biometrics Based Projects: How to Build Trust in biometrics projects? October 7-8, 2014 Barcelona Summary! 3 Key questions 1/ How to succeed biometrics based deployment project?

More information

The Future of Authentication

The Future of Authentication The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication

More information

USGv6: US Government. IPv6 Transition Activities 11/04/2010 DISCOVER THE TRUE VALUE OF TECHNOLOGY

USGv6: US Government. IPv6 Transition Activities 11/04/2010 DISCOVER THE TRUE VALUE OF TECHNOLOGY USGv6: US Government Dale Geesey Chief Operating Officer Auspex Technologies, LLC Phone: 703.319.1925 Fax: 866.873.1277 E-mail: dgeesey@auspextech.com Web: www.auspextech.com IPv6 Transition Activities

More information

User Guide Advanced Authentication - Smartphone Applications. Version 5.6

User Guide Advanced Authentication - Smartphone Applications. Version 5.6 User Guide Advanced Authentication - Smartphone Applications Version 5.6 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.

More information

idenprotect Enrolment Walkthrough Apply Mobile

idenprotect Enrolment Walkthrough Apply Mobile idenprotect Enrolment Walkthrough Apply Mobile Version 1.0 draft, November 7th, 2017 This walkthrough describes how you can enrol your mobile device or a idenprotect PLUS Token as an idenprotect Device

More information

Coursework Completion

Coursework Completion Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students

More information

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services

More information

Barclay s 2009 Worldwide Wireless and Wireline Conference

Barclay s 2009 Worldwide Wireless and Wireline Conference Barclay s 2009 Worldwide Wireless and Wireline Conference MAY 28, 2009 Steve Mollenkopf Executive Vice President, & President, Qualcomm CDMA Technologies Safe Harbor Before we proceed with our presentation,

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

Multi-Screen-TV and Over-The-Top TV

Multi-Screen-TV and Over-The-Top TV Multi-Screen-TV and Over-The-Top TV Stefan Jenzowsky Head of Multimedia Siemens Communications, Media and Technology It s just a website September 17, 2005 The Economist announces the death of the traditional

More information

FORWARD THINKING FOR SPECTRUM

FORWARD THINKING FOR SPECTRUM FORWARD THINKING FOR SPECTRUM Getting ready for 5G GSMA-GSA seminar, ITU World Telecom 16 th November 2016 Co-hosted by Panel Progress and advances in 5G trials and the importance of spectrum harmonization

More information

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) 08 Jun 2017 K-LUG Technical Meeting Rochester, MN Presented by: Vi Grey Independent Security Researcher https://vigrey.com Who

More information

Emerging Risks in Emerging Payments

Emerging Risks in Emerging Payments CTIA- The Wireless Association Presentation for Federal Reserve Bank Emerging Risks in Emerging Payments November, 15, 2010 Atlanta, GA Kate Kingberger Director, Wireless Internet Development CTIA- The

More information

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories Cross-Operator Identity Services. Ingo.Friese@telekom.de 13. January 2012, Introduction. Successful Telco Identity needs joint R&D. We believe that IdM is one of the most important application enabler,

More information

Information Technology (CCHIT): Report on Activities and Progress

Information Technology (CCHIT): Report on Activities and Progress Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT

More information

MOBILE TESTING REFERENCE GUIDE

MOBILE TESTING REFERENCE GUIDE SOLUTIONS BRIEF MOBILE TESTING REFERENCE GUIDE If you develop mobile applications, you already understand the why of software testing. You know that testing ensures your applications will perform as expected

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide RSA SECURID ACCESS Standard Agent Client Implementation Guide Pulse Secure John Sammon, Dan Pintal, RSA Partner Engineering Last Modified: July 11, 2018 Solution Summary

More information

Mobilink-Network Partial List of Partners

Mobilink-Network Partial List of Partners Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the users phone will

More information

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

Opera - Simply The Best Internet Experience. 1Q05 Results. April 29, 2005

Opera - Simply The Best Internet Experience. 1Q05 Results. April 29, 2005 1Q05 Results April 29, 2005 Highlights first quarter 2005 New license agreement with Nokia signed New handsets announced: NTT DoCoMo M1000 Motorola A1010 ZTE e3 Home Media announcements: Archos Media Player

More information

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

AdMob Mobile Metrics. Metrics Highlights. May 2010

AdMob Mobile Metrics. Metrics Highlights. May 2010 AdMob Mobile Metrics Metrics Highlights May 2010 Metrics Highlights Summary While mobile Internet requests are growing rapidly worldwide, there are regional differences in the devices used 92 countries

More information

for Education Jason Trump Senior Education Specialist - Devices

for Education Jason Trump Senior Education Specialist - Devices for Education Jason Trump Senior Education Specialist - Devices a 2 + b 2 = c 2 WATCHING, LISTENING INDIVIDUAL STUDY READING COLLABORATING ASSESSING WRITING PRESENTING Ipad Chromebook Surface Design Principles

More information