The Mobile Finnish Identity Certificate
|
|
- Johnathan Edgar Wilson
- 6 years ago
- Views:
Transcription
1 The Mobile Finnish Identity Certificate Dr.Tech. Göran Pulkkis and BSc (Eng.) Jonny Karlsson ARCADA Polytechnic Helsinki Finland PRESENTATION OUTLINE Finnish Electronic Identity (FINEID) as a Smartcard Application Mobile Fineid based on PKI SIM Cards Standardized Mobile Signature Service Authentication Service based on Mobile FINEID Practical demonstration: authentication to a www service Mobile FINEID Deployment Issues
2 FINEID APPLICATION Based on open standards Public Key Infrastructure 2 key pairs, certificates and PIN Codes: Authentication + encryption Non-repudiation signature PKIX based Certificate Policy X.509v.3 certificates and X.500 and LDAP directories FINEID APPLICATION The file structure of the FINEID application is is based onthe ISO/IEC and PKCS#15 specification. Notice that the FINEID application must be selected prior to being able to access this file structure. The FINEID application may potentially exist in a multiapplication smart card or other interoperable token.
3 FINEID APPLICATION FINEID APPLICATION
4 FINEID APPLICATION FINEID APPLICATION Individuality
5 SMARTCARDS Specific security components in user devices in mobile cellular networks are smartcards such as: SIM (Subscriber Identity Module) USIM (Universal SIM) PKI SIM (Public Key Infrastructure SIM) A SIM/USIM card securely stores an authentication key identifying a GSM/3G network user. A PKI SIM is a SIM/USIM with an integrated RSA crypto processor and storage space for private keyes. SIM Card Mobile phone a personal trusted device GSM PKI Solution Enabling Secure Mobile Communications In Finland the Population Register Centre has concluded a co-operation agreement with TeliaSonera Finland and Elisa in creating a mobile phone service for the electronic identification of a person It is possible to use the services of both public administration and the private sector Can be utilised also in communications services through the Internet, in which case the mobile phone acts like a card reader
6 Mobile Electronic Identity Mobile FINEID (Finnish Electronic Identity) is a mobile electronic ID for inhabitants in Finland. Based on PKI with user private keys integrated in a PKI SIM: Mobile Electronic Identity PKI SIM cards are currently issued by two Finnish operators. PKI SIM owner identities are verified by mobile citizen certificates issued by the Finnish Population Register Center (PRC).
7 Technical Features of a FINEID PKI SIM Contains a crypto processor and two PIN code protected private keyes: Authentication/encryption key Signature key Technical Features of a FINEID PKI SIM The corresponding X.509 certified public keys are stored in the FINEID certificate directory administrated by the PRC. Hashes of both public keys are stored in the PKI SIM for retreival of correct certificates from the certificate directory.
8 Technical Features of a FINEID PKI SIM Contains a SIM Application Toolkit (SAT) application known as Wireless Internet Browser (WIB). A PKI plug-in (PKCS#7 Signature plug-in) is used to generate signatures with the private keys through function calls executed by the WIB. Function calls to, input data to, and retreival of return data from the signature plug-in are encapsulated in SMS messages transmitted over an Over the Air (OTA) connection. Mobile Signature Service (MSS) Architecture
9 Mobile Signature Service (MSS) Architecture Communication between the service provider and the operator is based on an ETSI TS standarized web service interface. The interface is mainly based on: Simple Object Access Protocol (SOAP) XML HTTP/HTTPS Signature roaming is supported and is based on a public standard: ETSI TS standard Authentication based on Mobile FINEID Example: User authentication to a Protected WEB Service 1. The user tries to access the web service using HTTP and the web service informs the user that authentication is required and asks s for the user s s phone number 2. After receiving the phone number the service provider (in this case c the web service) sends a signature request message, containing the user s s phone number, to the mobile operator. 3. The mobile operator sends a signature request to the user s s mobile phone PKI SIM, where a PKCS#1 signature is generated with the private key. 4. The PKCS#1 signature and the public key hash is sent back to the mobile operator and the user s s citizen certificate is retrieved from the PRC directory based on the hash. 5. The signature is embedded into a PKCS#7 package, containing the user certificate, and sent to the service provider. 6. After successful signature verification, the user can access the protected WEB service
10 Authentication based on Mobile FINEID Example: User authentication to a Protected WEB Service Practical demonstration: MSS Architecture Evaluation The architecture of current MSS systems is complex because of the required SMS communication with the PKI SIM. An agreement between the SP and the operator is required. The technical specifications of operator specific PKI SIMs are confidential and application and service development is thus mostly operator dependent. Currently, there are no public services for mobile FINEIDs.
11 CONCLUSIONS Mobile Electronic Identities provide strong PKI based authentication, encryption, and digital signature services. Further work should be done on improving the usability of and on developing applications for Mobile FINEID
FINEID - S4-2 Implementation Profile 2
FINEID SPECIFICATION 21.10.2004 FINEID - S4-2 Implementation Profile 2 for Organizational Usage v 2.1A Population Register Centre (VRK) Certification Authority Services P.O. Box 70 FIN-00581 Helsinki Finland
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationSONERA MOBILE ID CERTIFICATE
Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu
More informationTELIA MOBILE ID CERTIFICATE
Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationPublic Key Cryptography Options for Trusted Host Identities in HIP
Public Key Cryptography Options for Trusted Host Identities in HIP Harri Forsgren and Timo Karvi University of Helsinki, Department of Computer Science Kaj Grahn and Göran Pulkkis Arcada University of
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security
RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution
More informationFINEID - S4-1 Implementation Profile 1
FINEID SPECIFICATION 21.10.2004 FINEID - S4-1 Implementation Profile 1 for Finnish Electronic ID Card v 2.1A Population Register Centre (VRK) Certification Authority Services P.O. Box 70 FIN-00581 Helsinki
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationKeyOne. Certification Authority
Certification Description KeyOne public key infrastructure (PKI) solution component that provides certification authority (CA) functions. KeyOne CA provides: Public key infrastructure deployment for governments,
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationETSI TS V7.1.0 ( )
TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationDesign and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet
Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology
More informationActiveSecurity MyClient
ActiveSecurity MyClient Setup Guide Contents 1 Introduction... 2 2 Installation of ActiveSecurity MyClient... 2 2.1 Desktop installation... 2 3 Configuration... 6 3.1 Language... 6 3.2 Smart card management...
More informationStrong Authentication for Web Services using Smartcards
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Strong Authentication for Web Services using Smartcards D S. Stienne
More informationPKCS #15: Conformance Profile Specification
Table of Contents PKCS #15: Conformance Profile Specification RSA Laboratories August 1, 2000 1 INTRODUCTION... 2 1 REFERENCES AND RELATED DOCUMENTS... 2 2 DEFINITIONS... 2 3 SYMBOLS AND ABBREVIATIONS...
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationApplication Note. Web Signing. Document version
Application Note Web Signing Document version 1.1 31.10.2008 Population Register Centre (VRK) Certification Authority Services P.O. Box 70 FIN-00581 Helsinki Finland http://www.fineid.fi Application Note
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationSERVICE DESCRIPTION. Population Register Centre s online services
SERVICE DESCRIPTION Population Register Centre s online services SERVICE DESCRIPTION [Number] 2 (12) DOCUMENT MANAGEMENT Owner Author Checked by Approved by Pauli Pekkanen Project Working Group Reko-Aleksi
More informationIdentity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014
Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2
More informationSSH Communications Tectia SSH
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product
More informationPKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures
Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment
More informationODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd.
Snorkel-TX Feature Highlights & Technical Specifications Snorkel-TX is a powerful transaction security server that enables failsafe authentication, access control, non-repudiation and integrity for web
More informationGuide Installation and User Guide - Windows
Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally
More informationIdentity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011
Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2
More informationLeveraging HSPD-12 to Meet E-authentication E
Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy
More informationVeinID SCANNERS FOR DIGITAL SIGNING. Hitachi s VeinID Solution for signing digital transactions enables new levels of security and user convenience.
VeinID SCANNERS FOR DIGITAL SIGNING Hitachi s VeinID Solution for signing digital transactions enables new levels of security and user convenience. A POWERFUL COMBINATION OF FIXED AND WIRELESS BIOMETRIC
More informationCertificate service General description Implementation project of a national Incomes Register
Version 1.0 Certificate service General description Implementation project of a national Incomes Register Version history Version Date Description 1.0 30.10.2017 Document published. CONTENTS 1 Foreword...
More informationSecurity Requirements for Crypto Devices
Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements
More informationGuide Installation and User Guide - Mac
Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationUnifie X Common Gateway Server (N Tier)
Unifie X Common Gateway Server (N Tier) M.SUPRIYA Dept of IT, Swami Vivekananda Institute of Technology, Telangana, India ABSTRACT The main objective of this project is to develop a generic tool for Common
More informationesign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,
esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges
More informationMcAfee Endpoint Encryption
Secured by RSA Implementation Guide for SecurID Authenticators Last Modified: December 4, 2013 Partner Information Product Information Partner Name McAfee Web Site www.mcafee.com Product Name (EEPC) Version
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationAn Overview of Secure and Authenticated Remote Access to Central Sites
Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationHow to Configure S/MIME for WorxMail
How to Configure S/MIME for WorxMail Windows Phone 8.1 This article describes how to configure S/MIME (Secure/Multipurpose Internet Mail Extensions) for WorxMail Windows Phone 8.1. Note: This feature works
More informationPublic Key Infrastructure
Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure
More informationDBsign for HTML Applications Version 4.0 Release Notes
DBsign for HTML Applications Version 4.0 Release Notes Copyright 2010 Version 4.0 Copyright Notice: The Release Notes has a copyright of 2000-2010 by Gradkell Computers, Inc. This work contains proprietary
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationBuilding on existing security
Building on existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationArcot Universal Client SAFE-Compliant Digital Signatures
Arcot Universal Client SAFE-Compliant Digital Signatures Scott Kern Solutions Architect Arcot, Inc. Company logo here Arcot Overview Authentication & Digital Signing Company Authentication 2-party and
More informationMavenir Systems Inc. SSX-3000 Security Gateway
Secured by RSA Implementation Guide for 3rd Party PKI Applications Partner Information Last Modified: June 16, 2015 Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationThales nshield Series
RSA Secured Implementation Guide For 3rd Party PKI Applications Last Modified: November 16 th, 2011 Partner Information Product Information Partner Name Thales Web Site www.thales-esecurity.com Product
More informationImplementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004
Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students
More informationSMART CARDS. Miguel Monteiro FEUP / DEI
SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationWhat is a Digital Certificate? Basic Problem. Digital Certificates, Certification Authorities, and Public Key Infrastructure. Sections
Digital Certificates, Certification Authorities, and Public Key Infrastructure Sections 14.3-14.5 Basic Problem What does a public-key signature verification tell you? Verification parameters include public
More informationDigital Certificates, Certification Authorities, and Public Key Infrastructure. Sections
Digital Certificates, Certification Authorities, and Public Key Infrastructure Sections 14.3-14.5 Basic Problem What does a public-key signature verification tell you? Verification parameters include public
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More information@firma, Validation Platform for PKIs
@firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the
More informationGetting to Grips with Public Key Infrastructure (PKI)
Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue
More informationINFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT
INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationPublic-key Infrastructure Options and choices
Public-key Infrastructure Options and choices Tim Moses Director, Advanced Security Technology April 98 1997 Entrust Technologies Overview General-purpose and Dedicated PKIs Trust models Two-key architecture
More informationDigital signatures: How it s done in PDF
Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?
More informationInstallation and Configuration Last updated: May 2010
PKIF OCSP Plug-in for Microsoft Windows Installation and Configuration Last updated: May 2010 This page intentionally mostly blank Table of Contents 1 Introduction... 4 2 Installation... 4 3 Configuration...
More informationPublic Key Establishment
Public Key Establishment Bart Preneel Katholieke Universiteit Leuven February 2007 Thanks to Paul van Oorschot How to establish public keys? point-to-point on a trusted channel mail business card, phone
More informationXceedium Xsuite. Secured by RSA Implementation Guide for 3rd Party PKI Applications. Partner Information. Last Modified: February 10 th, 2014
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: February 10 th, 2014 Partner Information Product Information Partner Name Xceedium Web Site www.xceedium.com Product Name
More informationUsing existing security infrastructures
Using existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang (South
More informationActivCard Strong Authentication product line. Jerome Becquart, Senior Product Manager
ActivCard Strong Authentication product line Jerome Becquart, Senior Product Manager A little history Strong Authentication products since 1994 Over 2.5 Millions devices, 1 Million in 2000 alone More than
More informationKey Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationSC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved
SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB
More informationCERN Certification Authority
CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,
More informationShort-Lived Certificates as a Mobile Authentication Method
HELSINKI UNIVERSITY OF TECHNOLOGY Faculty of Information and Natural Sciences Department of Computer Science and Engineering Pranav Kumar Sharma Short-Lived Certificates as a Mobile Authentication Method
More informationDoD Wireless Smartphone Security Requirements Matrix Version January 2011
DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation
More informationFederal Voting Assistance Program (FVAP)
16th Annual Computer Security Application Conference (ACSAC) December 2000 Federal Voting Assistance Program (FVAP) Provide Background on VOI Pilot Effort Provide High Level Technical Overview Security
More informationInterface. Circuit. CryptoMate
A C O S 5 - C T M C r y p t o M a t e U S B T o k e n Version 1.5 03-2007, Email: info@acs.com.hk Website: www.acs.com.hk CryptoMate USB Token 1.0 Introduction Frustrated by network breaches like Trojan
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationGlossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access
Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber
More informationSafeGuard LAN Crypt: Loading Profile Troubleshooting Guide
1 Troubleshooting Guide SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide Document date: 26/11/2014 Contents 1 Introduction... 4 2 SafeGuard LAN Crypt User application... 4 3 Loading the user
More informationLPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments Mohsen Toorani Ali A. Beheshti Abstract The non-repudiation as an essential requirement of many applications can be provided by
More informationCertificateless Public Key Cryptography
Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.
More informationNetwork Security Essentials
Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of
More informationE-services instructions https://asiointi.hel.fi. The City of Helsinki e-services support, open Mon-Fri from 8 AM to 6 PM Tel.
1 E-services instructions https://asiointi.hel.fi The City of Helsinki e-services support, open Mon-Fri from 8 AM to 6 PM Tel. (09) 310 88800 Contents 1. First page and phone support number 3. What is
More informationElliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai
Elliptic Curve Cryptography (ECC) based Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai 14th November, 2017 Focus of this talk What should
More informationPublic Key Infrastructures
Foundations for secure e-commerce (bmevihim219) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu,
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationChapter 8 Information Technology
CRIM 2130 Introduction to Critical Infrastructure Protection Spring 2016 Chapter 8 Information Technology School of Criminology and Justice Studies University of Massachusetts Lowell Enterprise systems
More informationA demonstration is available in which the OpenEapSmartcard.NET device is used as an authentication token, controlling the access to a Wi-Fi network.
1. Summary. T he goal of this project is to release a dotnet smartcard providing authentication services for network resources such as PPP, Wi-Fi and VPN (Virtual Private Network). The Extensible Authentication
More informationTechnical report. Signature creation and administration for eidas token Part 1: Functional Specification
Technical report Signature creation and administration for eidas token Part 1: Functional Specification Version 1.0 Date: 2015/07/21 Page 1 Foreword This technical report specifies an autonomous signature
More informationTLS. RFC2246: The TLS Protocol. (c) A. Mariën -
TLS RFC2246: The TLS Protocol What does it achieve? Confidentiality and integrity of the communication Server authentication Eventually: client authentication What is does not do Protect the server Protect
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 15264-1 April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eid system within a smart card infrastructure This CEN Workshop Agreement has been
More informationInformation Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1
Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions
More informationDigital Certificates. PKI and other TTPs. 3.3
Digital Certificates. PKI and other TTPs. 3.3 1 Certification-service providers Spanish Law 59/03 Art. 2.2 or Directive 1999/93/EC Art. 2.11: Certification-service providers means an entity or a legal
More informationSecure Store & Forward / Digital Signatures (BC-SEC-SSF)
Secure Store & Forward / Digital Signatures (BC-SEC-SSF) HELP.BCSECDISI Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted
More information1. Product Overview 2. Product Features 3. Product Value 4. Comparison Chart 5. Product Applications 6. Q & A
www.acs.com.hk 1. Product Overview 2. Product Features 3. Product Value 4. Comparison Chart 5. Product Applications 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module ACOS5
More informationU.S. E-Authentication Interoperability Lab Engineer
Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationSecure Access to Private Services in Intranet for Mobile Clients
Research Journal of Applied Sciences, Engineering and Technology 5(6): 1978-1985, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 12, 2012 Accepted: August
More informationCertificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between
Certificate Enrollment- and Signing Services for the Cloud A behind-the-scenes presentation of a successful cooperation between Introduction Based on our experience and the request from the market we would
More informationASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003
ASIA PKI Forum Overcome PKI Deployment Obstacles Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003 Agenda PKI technology and business benefits Deployment related obstacles Closer look of obstacles
More informationOVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS
OVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS John A. ~ac~onald', '~nformation Security Croup, Royal Holloway, University of London, Egham, Surrey TW20 OEX, UK; '~rnart Card Centre,
More information