Overview of cryptovision's eid Product Offering. Presentation & Demo

Size: px
Start display at page:

Download "Overview of cryptovision's eid Product Offering. Presentation & Demo"

Transcription

1 Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com 1

2 General Requirements Government of Utopia Utopia Electronic Identity Card Project Requirements: capable of multiple applications functional comprehensive customizable post-issuance updates shall be possible 2

3 Customer wish list Signature application (for egov and enterprise use) Travel document (Schengen-type) Government of Utopia Post-issuance update capabilities Fingerprint for holder identification (identification services also for private enterprises) eid with local content and access for various authorities and private enterprises 3

4 Demo Kit Contactless card reader 3 personalized sample cards USB flash drive with pre-configured VMWare image Fingerprint reader cryptovision eid Demo Kit 4

5 epasslet Suite 5

6 Card Solution Offering epasslet Suite - Ready-to-use Java Card applets for various eid applications - - Many appletes can be used on one card - - Easily customizable and extendable - 6

7 Use multiple applications from the same chip R O M EEPROM Combine PKI and many other common eid applications onto a single card Personal data Fingerprints Keys Certificates Custom data eid epki MoC Insurance Driving License ICAO Transport cryptovision epasslet Suite Core Library NXP JCOP Java Card Operating System Support for all the latest security standards and mechanisms, including BAC, EAC, SAC/PACE and enables the right security features for the desired application. 7

8 Mix and Match functionality as needed EEPROM R O M Includes 3 rd party biometric MoC and support for custom applications Personal data Fingerprints Keys Certificates Custom data eid epki MoC Insurance Driving License ICAO Transport cryptovision epasslet Suite Core Library NXP JCOP Java Card Operating System The same card application suite can be reused to cover a number of different document types including eid, epassport, or extended to support customer defined cards 8

9 Customer wish list revisited Signature application (for egov and enterprise use) Travel document (Schengen-type) Government of Utopia Post-issuance update capabilities Fingerprint for holder identification (identification services also for private enterprises) eid with local content and access for various authorities and private enterprises 9

10 Card profile definition Card Profile Specification Applications Data, Credentials Access rights 10

11 11

12 Introducing epasslet Sampler epasslet Sampler Tool for generating reference cards Meant to be used for card profile validation test card generation 12

13 epasslet Sampler 13

14 Use Cases signature application (for egov and enterprise use) Government of Utopia travel document (Schengen-type) post-issuance capabilities All these use cases can be configured on card with epasslet Sampler fingerprint for card holder identification (identification service also for private enterprises) eid with local content and access for various authorities and private enterprises 14

15 15

16 Smart Card Middleware Environment application smart card middleware reader smart card 16

17 Smart Card Middleware Approaches Client-based Smart Card Middleware Distributed Smart Card Middleware Middleware runs on the client Part on the middleware runs on a trusted served 17

18 18

19 SCalibur Environment Distributed Middleware Trusted Server Reader Card Online Service 19

20 SCalibur Architecture Topping: high level interface for rapid development SCalibur is some layered Cake Take the needed piece of cake and your card Trusted Device Trusted Server Filling: low level interface with more control Foundation: Core functions SDK Development Applications Online Service 20

21 Use Cases signature application (for egov and enterprise use) Government of Utopia travel document (Schengen-type) post-issuance capabilities All these use cases are supported by SCalibur fingerprint for card holder identification (identification service also for private enterprises) eid with local content and access for various authorities and private enterprises 21

22 22

23 sc/interface Environment Host crypto interface card interface reader smart card application middleware 23

24 sc/interface Architecture Applications Signature Browser SSO-Client Admin Tool User Tool Register Tool TokenD PKCS#11 CSP Mini Driver Secure Token Interface Operating Systems Security Token sc/interface 24

25 Use Cases signature application (for egov and enterprise use) Government of Utopia travel document (Schengen-type) post-issuance capabilities All these use cases are supported by sc/interface fingerprint for card holder identification (identification service also for private enterprises) eid with local content and access for various authorities and private enterprises 25

26 26

27 eid projects require certificates Cards and infrastructure systems need digital certificates Certificates needed for authentication, signatures, encryption Certificates can be provided by CAmelot Certificates needed for authentication against card, card content signing, encryption 27

28 X.509 and Card Verifiable Certificates syntax: flexible X.509 Certificate Version Serial Number Signature Issuer Validity Subject Subject Public Key Info Authority Key Identifier Subject Key Identifier Key Usage Private Key Usage Period Policy Mappings Subject Alternative Name Issuer Alternative Name typical size: 2,000 byte person or component PC, server certificate holder inspection system or terminal certificate verifier smart card chip syntax: simple Card Verifiable Certificate Profile Identifier Certification Authority Certificate Holder Certificate Holder Authorization Validity Period Key typical size: 200 byte 28

29 Using cv certificates for access control» EAC allows to granularly define and restrict access for Inspection Systems (IS)» The access rights are defined in the CVCA, DV and IS certificates Card Verifiable Certificate Profile Identifier Certification Authority Certificate Holder Holder Authorization Validity Period Key Effective Authorization: AND over whole certificate chain CVCA DV CAmelot EACv1 DG3 DG4 0/1 0/1 Certificate Holder Authorization Template (CHAT) IS

30 CAmelot - Product Mission CAmelot provides fully modular certificate lifecycle management Registration Key Generation Request Certificate Generation EoL Provisioning Document Signing Publication 30

31 Use Cases signature application (for egov and enterprise use) Government of Utopia travel document (Schengen-type) post-issuance capabilities These use cases require digital certificates fingerprint for card holder identification (identification service also for private enterprises) eid with local content and access for various authorities and private enterprises 31

32 32

33 Solution Partners 33

34 34

35 Outlook Future Project Steps Post-issuance updates (process involves all parts of the system) Convergence (banking/payment, things we learned from Enterprise projects) Derived IDs based on a trusted initial document-based identity? 35

36 Summary Customizable With epasslet Suite, agencies will be enabled to customize existing applications and add local content Multi-application epasslet Suite cards can host various applications in parallel, including payment Standard-compliant All our solutions comply with international standards and provide proven security and interoperability Cross-platform sc/interface supports over 50 PKI cards and all major clients, Versatile SCalibur provides all common eid mechanisms and can easily integrated Java / Java Card Open platform provides transparency and prevents vendor lock-in situations 36

37 End Contact cv cryptovision cv cryptovision GmbH Munscheidstr Gelsenkirchen Germany Tel: +49 (0) 2 09 / Fax: +49 (0) 2 09 / info(at)cryptovision.com Thank You! 37

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen

More information

Introduction to Electronic Identity Documents

Introduction to Electronic Identity Documents Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional

More information

cryptovision Enterprise product line Use Smart Cards, the smart way

cryptovision Enterprise product line Use Smart Cards, the smart way cryptovision Enterprise product line Use Smart Cards, the smart way cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Mindshare 2016 - Enterprise 2 cryptovision

More information

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 2 The Smart Card Evolution

More information

cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017

cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017 cryptovision s Enterprise Solutions Brian Kowal, Guido Ringel cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision

More information

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports

More information

Market Trends and Veridos solutions for epassports & ID Documents

Market Trends and Veridos solutions for epassports & ID Documents Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

Mindshare 2018 The Nine Steps to Your Company ID:

Mindshare 2018 The Nine Steps to Your Company ID: Mindshare 2018 : An IT Hero s Quest to Get Smart Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Hooray! Your company has won a lucrative contract!

More information

Verifying emrtd Security Controls

Verifying emrtd Security Controls Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

1. Product Overview 2. Product Features 3. Product Value 4. Comparison Chart 5. Product Applications 6. Q & A

1. Product Overview 2. Product Features 3. Product Value 4. Comparison Chart 5. Product Applications 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Product Value 4. Comparison Chart 5. Product Applications 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module ACOS5

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Identity and Authentication PKI Portfolio

Identity and Authentication PKI Portfolio Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5-64 Series (64KB EEPROM) Cryptographic Smart Card and Token Module

More information

1. Product Overview 2. Product Features 3. Comparison Chart 5. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 5. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token 5 Time-to-market Mask chip

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems. White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.

More information

The Future of Smart Cards: Bigger, Faster and More Secure

The Future of Smart Cards: Bigger, Faster and More Secure The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview

More information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US (PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Interface. Circuit. CryptoMate

Interface. Circuit. CryptoMate A C O S 5 - C T M C r y p t o M a t e U S B T o k e n Version 1.5 03-2007, Email: info@acs.com.hk Website: www.acs.com.hk CryptoMate USB Token 1.0 Introduction Frustrated by network breaches like Trojan

More information

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

open.org Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB

open.org Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB www.oasis open.org Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB www.primekey.se www.ejbca.org www.oasis open.org Background Data loss and key management issues

More information

September OID: Public Document

September OID: Public Document THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

Future Expansion for emrtd PKI Mark Joynes, Entrust

Future Expansion for emrtd PKI Mark Joynes, Entrust Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

@firma, Validation Platform for PKIs

@firma, Validation Platform for PKIs @firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the

More information

Security Mechanism of Electronic Passports. Petr ŠTURC Coesys Research and Development

Security Mechanism of Electronic Passports. Petr ŠTURC Coesys Research and Development Security Mechanism of Electronic Passports Petr ŠTURC Coesys Research and Development Smartcard CPU 16/32 bit 3.57MHz (20MHz) 1.8 / 3/ 5 V ROM 16-300 kb RAM 1-8 kb EEPROM 8-128kB Contactless communication

More information

The EAC for MRTD. 26 January 2010

The EAC for MRTD. 26 January 2010 The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

Dohatec CA. Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0]

Dohatec CA. Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0] Dohatec CA Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0] 1 1 Digital Certificate Certificates issued by Dohatec CA are in X.509 v3 format. In Microsoft windows machines, these

More information

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

Test plan for eid and esign compliant smart card readers with integrated EACv2

Test plan for eid and esign compliant smart card readers with integrated EACv2 Technical Guideline BSI TR-03105 Part 5.2 Test plan for eid and esign compliant smart card readers with integrated EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik

More information

Jrsys Mobile Banking Solutions

Jrsys Mobile Banking Solutions Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

Designing and Managing a Windows Public Key Infrastructure

Designing and Managing a Windows Public Key Infrastructure Designing and Managing a Windows Public Key Infrastructure Key Data Course #: 2821A Number of Days: 4 Format: Instructor-Led Certification Track: Exam 70-214: Implementing and Managing Security in a Windows

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

Whitepaper: GlobalTester Prove IS

Whitepaper: GlobalTester Prove IS Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile

More information

MACHINE READABLE TRAVEL DOCUMENTS

MACHINE READABLE TRAVEL DOCUMENTS MACHINE READABLE TRAVEL DOCUMENTS ADVANCED SECURITY MECHANISMS FOR MACHINE READABLE TRAVEL DOCUMENTS EXTENDED ACCESS CONTROL (EACv1) COMPLEMENTARY TO TEST METHODS FOR MRTDs USING STATIC BINDING Version

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9 PRICE LIST TRUST SERVICE PRODUCTS Price List Version 5.9 Berlin, April 2018 Copyright 2018, Bundesdruckerei GmbH Seite 1/9 Qualified Single Signature Cards D-TRUST Card 3.0 EU Signature card according

More information

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance Overview Current generation of epassports Benefits and Limits of an epassport Overview of the next generation epassport Applications

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Securing your Standards Based Services. Rüdiger Gartmann (con terra GmbH) Satish Sankaran (Esri)

Securing your Standards Based Services. Rüdiger Gartmann (con terra GmbH) Satish Sankaran (Esri) Securing your Standards Based Services Rüdiger Gartmann (con terra GmbH) Satish Sankaran (Esri) Agenda What are your security goals? Access control Standards and interoperability User management and authentication

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013 FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Security Target Lite SK e-pass V1.0

Security Target Lite SK e-pass V1.0 Ref.: Security Target Lite SK e-pass V1.0 Table of Contents 1 INTRODUCTION... 6 1.1 ST AND ST-LITE IDENTIFICATION... 6 1.2 TOE IDENTIFICATION... 6 1.3 CC AND PP CONFORMANCE... 6 1.4 CONVENTIONS... 7 1.5

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

advant power Fully scalable fully flexible advanced contactless smart card system Key applications & standards

advant power Fully scalable fully flexible advanced contactless smart card system Key applications & standards advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant line has been developed to ideally support the design and realisation

More information

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification Technical report Signature creation and administration for eidas token Part 1: Functional Specification Version 1.0 Date: 2015/07/21 Page 1 Foreword This technical report specifies an autonomous signature

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is   Written by Marc Grote Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Securing E-Mails with S/MIME and Smartcards in Exchange 2003 Written by Marc Grote - mailto:grotem@it-training-grote.de

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

ID-One PIV (Type A) FIPS Security Policy. (PIV Applet Suite on ID-One Cosmo V7-n) Public Version

ID-One PIV (Type A) FIPS Security Policy. (PIV Applet Suite on ID-One Cosmo V7-n) Public Version ID-One PIV (Type A) (PIV Applet Suite on ID-One Cosmo V7-n) FIPS 140-2 Security Policy Public Version Oberthur Technologies of America 4250 Pleasant Valley Road Chantilly, VA 20151-1221 - USA Document

More information

The Belgian eid card

The Belgian eid card The Belgian eid card Physical and Optical Security Features Physical elements Card made of durable polycarbonat Standard bank card format (ISO) Very rich set of physical security elements 1 Physical and

More information

August 2007 Intel Pro SSL Addendum to the Comodo Certification Practice Statement v.3.0

August 2007 Intel Pro SSL Addendum to the Comodo Certification Practice Statement v.3.0 August 2007 Intel Pro SSL Addendum to the Comodo Certification Practice Statement v.3.0 Comodo CA, Ltd. August 2007 Intel Pro SSL Addendum to Version 3.0 Amendments 17 August 2007 3rd Floor, Office Village,

More information

Helping Meet the OMB Directive

Helping Meet the OMB Directive Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise

More information

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

TWIC / CAC Wiegand 58 bit format

TWIC / CAC Wiegand 58 bit format This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content

More information

Short Public Report. 2. Manufacturer or vendor of the IT product / Provider of the IT-based service:

Short Public Report. 2. Manufacturer or vendor of the IT product / Provider of the IT-based service: Short Public Report 1. Name and version of the IT product or IT-based service: DIGITTRADE High Security HDD HS256S 2. Manufacturer or vendor of the IT product / Provider of the IT-based service: Company

More information

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM chanders@us.ibm.com IBM KeyWorks Market Needs History KeyWorks KeyWorks KeyWorks KeyWorks KeyWorks Suite

More information

cv act epasslet/eacv2-sac v1.8 Security Target

cv act epasslet/eacv2-sac v1.8 Security Target cv act epasslet/eacv2-sac v1.8 Security Target BSI-DSZ-CC-0799 Common Criteria / ISO 15408 EAL 4+ Document Version 1.04 2012-08-16 cv cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen Germany www.cryptovision.com

More information

Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002

Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002 Physical and Logical Security Solutions Smart Card Alliance Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002 1 Outline Homeland Security Mission Spectrum Market Assessment Identification

More information

German eid based on Extended Access Control v2

German eid based on Extended Access Control v2 German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information