cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

Size: px
Start display at page:

Download "cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH"

Transcription

1 cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com 1

2 cryptovision cryptovision Gelsenkirchen Office Vienna Office Silicon Valley Office Mexico City Subsidiary New York City 2

3 Trend 1: Multi-application eid Projects 3

4 Trend 1: Multi-application eid projects Multi-application eid cards are already there Electronic ID Card Signature Card Health Insurance Card Company card Payment Card Access Card Loyalty card 4

5 Prepaid SIM Registration Many countries implemented prepaid SIM registration by law Key Objectives: Assist security agencies Reduce fraud Support resolving crime Collect data on phone usage Offer value add services 5

6 Prepaid SIM Registration Current processes are slow, unsecure and costly: Often involves paper-based forms to be filled by applicants Identification based on traditional IDs (photocopy created) Biometric fingerprint has to be taken and stored, again Multiple 100 million pages of paper to be archived Secure process relies on telecom employees 6

7 Prepaid SIM Registration Use eid card to Securely identify the person Store the prepaid SIM serial number on the eid card for offline verification of registered SIM cards 7

8 Prepaid SIM Registration Applications User data Personal data Fingerprints Keys Certificates Additional data eid epki MoC Payment Driving License ICAO Transport Health Voting Pension Insurance Tax SIM Custom 8

9 Trend 1: Multi-application eid projects epasslet Suite A Java Card Applet Suite for eid document applications Provides all relevant applications from one solution Supports multi-application configurations Shared file system, inter-applet communication Post-issuance activation and applet loading possible Without losing the CC certification 9

10 Trend 1: Multi-application eid projects epasslet Suite v3.0 DESFire support for Ticketing/Transport Convergence with M/Chip, VSDC, CPA available eidas token functionality Improved flexibility of key and certificate provisioning Available on NXP JCOP 3 and Veridos SCE 7 (IFX)* 2 nd source option for both chip and operating system Certification at EAL 5+ to be concluded end of Q3/2017 * Functional scope may vary 10

11 Trend 2: Smart Cards and Mobility 11

12 Trend 2: Smart Cards and Mobility Part 1: Using mobile devices for eid document access Both OTS mobile hardware as well as custom build devices are used for enrolment and read-out 12

13 Mobile Identity Verification Many countries are looking for mobile solutions to verify citizens identity Key Objectives: Allow identity verification for police forces and emergency personnel Support (temporary) offline scenarios Non-stationary use 13

14 Mobile Identity Verification Use eid card to Read out eid document data Identify card holder using face and/or fingerprint matching Support Match-on-Card (for offline usage and privacy) 14

15 Mobile Identity Verification Terminal application based on SCalibur SDK Fingerprint/PIN management Read/Write data Read out ICAO application 15

16 Trend 2: Smart Cards and Mobility SCalibur v cryptovision s eid middleware SDK Provides all common eid document protocols/mechanisms Easily portable due to Java Also available for mobile devices running Android Client-only and client-server settings supported All eid protocols Standard compliant Various profiles Biometrics EACv2 / TR

17 Trend 2: Smart Cards and Mobility Some notes on OTS general purpose mobile devices Often problematic antenna design NFC not fully usable No extended length APDUs (getting better) Not fully compliant to ISO Sometimes restricted access (ios getting better?) Mobile OSs lack generic interface for card integration 17

18 Trend 2: Smart Cards and Mobility Mobile devices equipped with SCalibur Image source: Credence ID 18

19 Trend 2: Smart Cards and Mobility Part 2: Moving eid applications to mobile platforms smart card/ eid document mobile smart card alternative More and more organizations look for mobile smart card alternatives 19

20 Trend 2: Smart Cards and Mobility Storing signed data and verifying it is easy only needs public key no requirements for secure execution environment Prevent cloning or storing private keys is hard Requires at least some form of trusted execution environment Ideally supported by dedicated security hardware 20

21 Trend 2: Smart Cards and Mobility We don t see a unified mobile solution with security hardware anytime soon There is the need for a leveled security approach with different security levels for different use case scenarios contact card contactless mobile built-in chip implant smart token TPM SGX software smart card emulation Remote CSP SIM Credentials Of Various Forms Effectively Functioning Equivalently (COVFEFE) microsd mobile key store 21

22 Trend 2: Smart Cards and Mobility Credential Orchestration System From the cryptovision labs Smartcard Reader Device Reader Driver (PCSC) Smartcard Middleware Applications TPM Smartcard Simulation Service Virtual Reader Driver (PCSC) Smartcard Middleware Applications Intel SGX Remote Server (HSM) Token Enclave Service Remote Connection Service Virtual Reader Driver (PCSC) Virtual Reader Driver (PCSC) Smartcard Middleware Smartcard Middleware Applications Applications Security Level Mobile Phone (ios, Android) Mobile Connection Service Virtual Reader Driver (PCSC) Smartcard Middleware Applications PFX File PFX File Service Virtual Reader Driver (PCSC) Smartcard Middleware Applications 22

23 Trend 2: Smart Cards and Mobility From the cryptovision labs Usage of existing smart card based applications No modification of existing use cases Virtual token module used to configure different tokens Virtual Token Module TPM SGX Remote Mobile Phone Hardware Token Virtual Token Virtual Token Virtual Token Virtual Token Virtual Token sc/interface Minidriver PKCS#11 Smartcard Logon SSL/TLS VPN CMS 23

24 Trend 3: eidas 24

25 Trend 3: eidas What is eidas? EU regulation on electronic identification and trust services for electronic transactions Goals: amend the regulations on electronic signatures extend electronic identification improve interoperability of these services within the EU 25

26 Trend 3: eidas The eidas token specification Is a joint effort between ANSSI and BSI Provides interesting new features for eid documents: Authorization Extensions Enhanced Role Authentication Pseudonymous Signatures 26

27 Trend 3: eidas Authorization Extensions Allows for defining access to on-card data based on certificate extensions Even for future use cases not known at the time of issuance Example: Adding health data to an eid card Emergency Data R Insurance Plan R/W 27

28 Trend 3: eidas Enhanced Role Authentication Enables download of (short term) credentials in a secure online session Also supports new uses case and increases interoperability Example: downloading a missing credential Service Trust 28

29 Trend 3: eidas POSeIDAS cryptovision: card implementation on Java Card HJP: eidas for PersoSIM (Open Source eid card simulator) Governikus: eid Server, eid Client 29

30 Trend 4: Additional Biometric Modalities 30

31 Thank you for your attention! Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com 31

Overview of cryptovision's eid Product Offering. Presentation & Demo

Overview of cryptovision's eid Product Offering. Presentation & Demo Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic

More information

cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017

cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017 cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision

More information

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 2 The Smart Card Evolution

More information

Introduction to Electronic Identity Documents

Introduction to Electronic Identity Documents Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional

More information

Mindshare 2018 The Nine Steps to Your Company ID:

Mindshare 2018 The Nine Steps to Your Company ID: Mindshare 2018 : An IT Hero s Quest to Get Smart Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Hooray! Your company has won a lucrative contract!

More information

cryptovision Enterprise product line Use Smart Cards, the smart way

cryptovision Enterprise product line Use Smart Cards, the smart way cryptovision Enterprise product line Use Smart Cards, the smart way cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Mindshare 2016 - Enterprise 2 cryptovision

More information

Market Trends and Veridos solutions for epassports & ID Documents

Market Trends and Veridos solutions for epassports & ID Documents Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Jrsys Mobile Banking Solutions

Jrsys Mobile Banking Solutions Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User

More information

White Paper Implementing mobile electronic identity

White Paper Implementing mobile electronic identity Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing

More information

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication FAMILY BROCHURE Gemalto Authenticators Diverse Form Factors for Convenient Strong Diverse Form Factors for Convenient Strong. Offering the broadest range of authentication methods and form factors supported

More information

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical

More information

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile

More information

The Gemalto offer for PKI market in Russia

The Gemalto offer for PKI market in Russia The Gemalto offer for PKI market in Russia Miroslaw TOCICKI, Technical Consultant September 18th, 2014 Agenda Introduction Gemalto IdA portfolio Java PKI cards for developers GOST certified solution IDPrime

More information

How I Learned to Stop Worrying and Love the Internet of Things

How I Learned to Stop Worrying and Love the Internet of Things SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

ACR1281U npa Dual Interface Reader Technical Specifications

ACR1281U npa Dual Interface Reader Technical Specifications Datenblatt / Specifications ACR1281U npa Dual Interface Reader Technical Specifications Table of Contents ACR1281U npa 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical

More information

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Secure Application Trend in Smartphones. STMicroelectronics November 2017

Secure Application Trend in Smartphones. STMicroelectronics November 2017 Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research

More information

The Future of Smart Cards: Bigger, Faster and More Secure

The Future of Smart Cards: Bigger, Faster and More Secure The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview

More information

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice. ACR1252U NFC Forum Certified Reader Technical Specifications V1.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0.

More information

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013 Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US (PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com

More information

Whitepaper: GlobalTester Prove IS

Whitepaper: GlobalTester Prove IS Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card

CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card CEN TC 224 WG15 European Citizen Card Brussels May 10th 2007 1CEN/TC 224 WG15 European Citizen Card European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control

More information

ACR1251U-A1 USB NFC Reader with SAM Slot

ACR1251U-A1 USB NFC Reader with SAM Slot ACR1251U-A1 USB NFC Reader with SAM Slot Technical Specifications V1.05 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5

More information

Smart Cards. José Costa. Software for Embedded Systems. Departamento de Engenharia Informática (DEI) Instituto Superior Técnico

Smart Cards. José Costa. Software for Embedded Systems. Departamento de Engenharia Informática (DEI) Instituto Superior Técnico Smart Cards José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-11-09 José Costa (DEI/IST) Smart Cards 1 Outline Application Domains: Smart

More information

CONFORMITY TESTING OF EAC INSPECTION SYSTEMS

CONFORMITY TESTING OF EAC INSPECTION SYSTEMS CONFORMITY TESTING OF EAC INSPECTION SYSTEMS By Dr. Michael Jahnich, Technical Director, HJP Consulting GmbH Testing the conformance of inspection systems for epassports is an ongoing and open issue. One

More information

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports

More information

New Paradigms of Digital Identity:

New Paradigms of Digital Identity: A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Identity and Authentication PKI Portfolio

Identity and Authentication PKI Portfolio Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5-64 Series (64KB EEPROM) Cryptographic Smart Card and Token Module

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

Multifunctional Identifiers ESMART Access

Multifunctional Identifiers ESMART Access AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

Life innovation with UBIVELOX

Life innovation with UBIVELOX Life innovation with UBIVELOX Ucard OVERVIEW Ucard FAMILY UBIVELOX Smart Card UBIVELOX develops card solutions applicable for broadcasting, communication, finance, transportation, ID and various other

More information

Mobile Driver s License Region IV May 24, 2017 Seattle, WA

Mobile Driver s License Region IV May 24, 2017 Seattle, WA Mobile Driver s License 2017 Region IV May 24, 2017 Seattle, WA Presenter: Loffie Jordaan Senior Project Manager, AAMVA 2 Introduction & background CDS Committee & eid WG What is a mdl? Functional requirements

More information

Verifying emrtd Security Controls

Verifying emrtd Security Controls Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting

More information

eauthentication and Cross Boarder etransaction

eauthentication and Cross Boarder etransaction eauthentication and Cross Boarder etransaction James Wu / jrsys CEO 1 1 Taiwan s e-gov Journey Efficiency & Effectiveness Infrastructure Development & Penetration Online Service Development Integrated,

More information

Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event

Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event Electronic ID in Germany Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event Table of Contents Authentication in Germany Infrastructure (Client, Hardware, Participants) Authentication

More information

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc.

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Identities Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Device Identifiers Most devices we are using everyday have (at least)

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

MIFARE Security Evaluation Scheme

MIFARE Security Evaluation Scheme Scheme Rev. 2.0 9 December 2016 Scheme Application Form Document information Info Content Keywords MIFARE, Security, Evaluation, Certification Abstract Application form and Guidance Notes for the Scheme

More information

ACR1255U-J1 Secure Bluetooth NFC Reader

ACR1255U-J1 Secure Bluetooth NFC Reader ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

ACR1255 NFC Bluetooth Smart Card Reader

ACR1255 NFC Bluetooth Smart Card Reader ACR1255 NFC Bluetooth Smart Card Reader User Manual V1.00 Name Signature Date Prepared by: Tommy Wong 2015-05-28 Reviewed by: Approved by: Subject to change without prior notice Table of Contents 1.0.

More information

Mobile Identity Management

Mobile Identity Management Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks

More information

Credentialing Project Technical Architecture

Credentialing Project Technical Architecture Credentialing Project Technical Architecture Presented to Transportation Industry Association Stakeholder Meetings April 11-29, 2002 1 Agenda Overview of High Level Architecture Vision Components of Architecture

More information

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

EUROPEAN CAMPUS CARD ASSOCIATION. Current State-of-the-Art in Campus Card Systems

EUROPEAN CAMPUS CARD ASSOCIATION. Current State-of-the-Art in Campus Card Systems EUROPEAN CAMPUS CARD ASSOCIATION Current State-of-the-Art in Campus Card Systems Commissioned by the European Campus Card Association in May 2016, the survey reflects the views and opinions of 181 educational

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany SmartCards as electronic signature devices Progress of standardization Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany scherzer@de.ibm.com Active CEN working groups(today) TC224 : "Machine readable

More information

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice.

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice. ACR1281U-C2 Card UID Reader Reference Manual 1.01 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Reference Documents...

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

PCMS. PC-linked Reader with Mass Storage.

PCMS. PC-linked Reader with Mass Storage. PCMS PC-linked Reader with Mass Storage www.acs.com.hk 1 Rundown 1. Product Overview 2. Product Features 3. Product Value 4. Product Application 5. Q & A 2 Product Overview 3 Product Overview The PC-linked

More information

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification Technical report Signature creation and administration for eidas token Part 1: Functional Specification Version 1.0 Date: 2015/07/21 Page 1 Foreword This technical report specifies an autonomous signature

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

Practical Attack Scenarios on Secure Element-enabled Mobile Devices

Practical Attack Scenarios on Secure Element-enabled Mobile Devices Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March

More information

1 Introduction. dloc is a revolutionary system for managing and

1 Introduction. dloc is a revolutionary system for managing and 1 Introduction dloc is a revolutionary system for managing and authenticating critical records. Combining the security of blockchain and the convenience of Near Field Communication (NFC), it allows any

More information

Open e-id implementation for temporary and future card deployments

Open e-id implementation for temporary and future card deployments Open e-id implementation for temporary and future card deployments Gauthier Van Damme Karel Wouters Danny De Cock Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC World e-id Conference, 2010 ESAT/SCD-COSIC

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

Past & Future Issues in Smartcard Industry

Past & Future Issues in Smartcard Industry Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets

More information

vsec:cms S-Series Introduction Release Notes Release April 27 th, 2018

vsec:cms S-Series Introduction Release Notes Release April 27 th, 2018 vsec:cms S-Series Release Notes Release 5.1.0.0 April 27 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document

More information

The Internet of Things

The Internet of Things 1 The Internet of Things The Internet of Things (IoT) is a new vision of the Internet in which any type of object or thing that generates or consumes data on the network can be connected. It is the evolution

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

The Digital Identity Revolution

The Digital Identity Revolution The Digital Identity Revolution From eid to Mobile ID From eid to Mobile ID The delivery of successful and secure digital identity is fundamental to the modernization of states and dematerialization of

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Automotive Identification Wireless Infrastructure Lighting Industrial Mobile Consumer Computing Global player with local

More information

An Overview of Secure and Authenticated Remote Access to Central Sites

An Overview of Secure and Authenticated Remote Access to Central Sites Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com

More information

German eid based on Extended Access Control v2

German eid based on Extended Access Control v2 German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0

More information

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD THE TRUST IMPERATIVE E-Passports are issued by entities that assert trust Trust depends on the

More information

vsec:cms S-Series Introduction Release Notes Release October 16 th, 2018

vsec:cms S-Series Introduction Release Notes Release October 16 th, 2018 vsec:cms S-Series Release Notes Release 5.3.0.0 October 16 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document

More information

Beyond Payment: Secure NFC applications and their relation to RFID

Beyond Payment: Secure NFC applications and their relation to RFID Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

More information