eauthentication and Cross Boarder etransaction

Size: px
Start display at page:

Download "eauthentication and Cross Boarder etransaction"

Transcription

1 eauthentication and Cross Boarder etransaction James Wu / jrsys CEO 1 1

2 Taiwan s e-gov Journey Efficiency & Effectiveness Infrastructure Development & Penetration Online Service Development Integrated, Interoperable and Interactive Services E-Governance Pervasive Services Transparency Accountability Participation web2.0 driven Clustered, Proactive, Trustworthy and Non-stop Services Device Portable devices Network Wireless Broadband Application Web 2.0 Applications Cloud Computing Stage 1 Stage 2 Stage 2.5 Stage 3 Stage 4 egovernment 3-year Program egovernment Program E-Taiwan egov Program U-Taiwan egov Program Intelligent Taiwan egov Program

3 Taiwan e-gov Framework e-gov Online Services Government e-procurement System (GEPS) Land Information System e-tax System G2B Service Platform e-invoice Platform GPKI GCA, MOICA MOEACA, XCA My egov Service Portal Site Government Service Platform (GSP) Gov Agencies Portal Sites Government Directory Service GDS, XDS, CPA Government Service Network (GSN) Citizen Gov t Business Organizat n Application Services Infrastructure 3

4 Government Public-Key Infrastructure (GPKI) GRCA GTestCA GCA XCA MOEACA MOICA HCA All kinds of test certs. for developing apps Government Agencies, E-Gov Servers Other organizational entities (e.g., school, not-for-profit org.) Businesses (companies and branches, and shops) Citizens Healthcare Professionals, Healthcare orgs, Healthcare Servers 4

5 Proactive Services Proactive Service e-housekeeper for citizen e-helper for business Satisfaction Instance notice Greater efficiency Safe and secure Integrative with other channels e-secretary for Gov employees Innovating Services 5

6 G2B2C e-document Interchange Taiwan first Validation Authority product (2002) Taiwan largest Validation Authority Big transaction volumes (33,000 edocument /day) Digital signature/ encryption Verify signature/ Decryption E-Official Document 6

7 Taipei City Government Multi-purpose card Employee ID card Employee ID Contact PKI Card Contactless Transportation Card Secure Single-Sign-On System 7

8 Newborn baby reporting system 8

9 Military PKI-enabled Applications The first Military PKI-enabled project For both Web base and Client Server Applications Secure Single Sign On Access control by PKI smart card Users include army, navy and air force 9

10 Ministry of Transportation and Communications Mobile Signature and Validation Service Microsoft Active Directory Service PKI-enabled Application Web AD management t portal 10

11 Ministry of Finance 2.Login GCA Internet MOICA EIP Portal Purchase Order System User 1.User with Smart Card Electronic Document PKI Validation Verify CRL SVC OCSP SVC HA PKI suite 3.Verify 5.Result PKI suite Material and Transport Meeting Room Reservation Human Resource 6.Authorization DB LOG SVC 4.Log Audit Log Server EIP(Sun One) LDAP MS AD 11

12 Ministry of Foreign Affairs Single Sign On PKI APIs 12

13 ezfly Online Travel Agent 16 13

14 CHT WebTrust Certificate We issue certificates to Mobile & PC Jrsys Secure Mobile/PC Tokens USB PKI Token Smart Cards USB PC/SC reader Secure MicroSD ios/pc /Android Token Bluetooth Reader Software PFX HCE 14

15 eauthentication Different level of security ID/Password One Time Password PKI Two Factor Authentication Software Token Secure Element Hot Technologies Kerberos/SAML QR code OTP Mobile PKI HCE Tokenization NFC FiDo Biometric Apple Pay Dual-Channel Multi-Factors Authentication 15

16 All in One OTP solutions One Time Random Password Low cost solution Slim SIM OTP SMS AOTP OTP APP QR code OTP MicroSD OTP OCRA OTP jrsys OATH OTP Server Android Token ios OTP e-ink Display Master Card OTP Token 16

17 Mobile ID (OOB auth) 1. Input ID and Password PKI base QR code Dual Channels Two Factors Out-Of-Band authentication Internet 2. Scan QR code to obtain the OTP code 3. Server verify the OTP code CA/RA Jrsys Authentication Server 17

18 Mobile PKI Smart Card SIM Bluetooth Reader, NFC Mobile Phone, Audio Reader SWP SIM, Slim SIM Sticker with Secure Element/SWP, HCE Secure MicroSD ios/android/pc Token Audio PKI Token FiDo/Apple Pay NFC + SE +Fingerprint sensor 18

19 Secure Mobile Devices Bluetooth Reader World First ios/android/pc Token e-ink Master OTP card Audio Reader 19

20 Bluetooth Smart Card Reader for ios/android/pc 20

21 Dual Interface Smart Card Multi-Function Smart Card ID card (Contact/Contactless ICAO) PKI card (Contact/Contactless Digital Signature) Transportation Card (Contactless MiFare) 21

22 World First ios/android/pc Token ios 8-Pin Lightning Connector Android Mini USB PC USB Platform: PC/Android/iOS Jrsys Secure MicroSD inside 22

23 Secure your cloud storages Secure your cloud storage with one more device. 23

24 Pain & Solution PKI is hard to understand and implement Cross Platform is hard, especially Mobile High Hidden cost 24

25 Easy & Fast PKI-enable Solutions PKI-enabled in 3 Days Not 3 Months Cross Platform Various Devices Firefox Plug-In ActiveX Chrome Plug-In Mobile Signature & Validation Service 25

26 2014 Taiwan ITM Best product Winner Award Security Suits for PC Web Authentication with SE Applications Software Applications can work with Jrsys Middleware Jrsys PC Security Suite and many Firefox Plug-In ActiveX Chrome Plug-In Secure Devices Multiple Tokens Software PFX Smart Card 26 USB Token HSM

27 2014 Taiwan ITM Best product Winner Award Security Suits for Mobile Applications Mobile Authentication with SE Secure Mobile APP can work with Jrsys Middleware One Time Password Secure Secure PDF Mobile Signature jrsys Mobile Security Suite Mobile Money and many ios SDK Android SDK Secure Mobile Devices Software PFX HCE Multiple Mobile Tokens Smart Cards Bluetooth reader 27 Secure MicroSD PC/iOS/Android Token

28 WebTrust RA CHT WebTrust CA issue certificates to Mobile & PC Jrsys Secure Mobile/PC Tokens USB PKI Token Smart Cards USB PC/SC reader Secure MicroSD ios/pc /Android Token Bluetooth Reader Software PFX HCE 28

29 Cloud Validation All in One Authentication Service: ID/Password, OTP, Smart Card, Mobile Tokens and Micro SD. Single Sign On PKI APIs 29

30 Secret Communication System VOIP IM Photo File PDF 30

31 Cross-Border e-commerce Mobile Payment James Wu /jrsys Digital Signed Electronic Document Exchange 31

32 QR Code for Digital Signature Online/Offline Payment, 2 Factor Login, etc. 32

33 2 Factor Login QR Code & Mobile No Phishing Secure Sign In Traditional ID/Password Hard to against Trojan, Sniffer, Web Site Compromised and Bad Administrator Dual Channel Two Factor Secure Login Cross Platform/ Browsers 33

34 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer, Phishing site e-commerce site compromised 34

35 On-Line Payment No more Card Number + Expiration Date + CVV Just Scan the Secure QR Code Commerce 1.Prepare checkout data 2.Create a Digital Signed Checkout QR code on the screen Consumer 3.Scan the checkout QR code 4.Select virtual credit card 5.Input PIN code to confirm the payment Credit card information is not transmitted Date:2014/10/02 Merchant s Digital Signature 35

36 Off-Line Payment More Secure and Fast than Magnetic Credit Card Swipe Payment Mobile Payment Before Out-of-band authentication Handwriting signature Card can be Cloned Sign a Credit card Check Merchant scan the QR 36

37 Offline Payment Process Consumer 1.Select Virtual credit card 2.Enter the amount 3.Input PIN to make a digital signature and Generate a QR code Commerce 4.Scan the QR code 5.Make a Digital Signature 6.Connect to Payment Gateway Date:2014/10/02 Consumer s Digital Signature 37 Commerce cannot clone any card!

38 QR code for Logistic Shipping QR code contains Product codes, Quantities, Date, Time and Manufacture's Digital Signature User can scan and verify it immediately 38

39 Patented QR Code Payment Digital Signature QR code Not only an URL/ OTP short code But also the transaction with digital signature Date:2014/10/02 Time:11:50 Amount: US$25 OTP Digital Signature Easy to deploy and use No additional hardware cost Patented O2O Payment technology Authentication, Integrity, Confidentiality and Non-repudiation secure transaction 39

40 Digital Signed Hard Copy Document Before H andwriting Signature Digital Signed PDF or Hard copy Printout Now PDF417 Original Document with Digest Party A s Digital Signature Party B s Digital Signature 40

41 Digital Signed Hard Copy Document Digital signed PDF 417 License Digital signed QR code Invoice 41

42 About jrsys Innovative Mobile and Cloud Security-Enabler 2014 Taiwan ITM Best 100 products Winner Award APICTA Award 2013 Security Winner 2012 Mobile Money Innovation Award 2012 ASIA PKI Innovation Award 42 One of the 7 innovative ideas to provide greater access to financial services from 98 best ideas of 26 countries BY: MIF, IDB, CAF and GSMA

43 Partner with Foxit 27,500 Millions PDF users use jrsys security Suite 43

44 jrsys Secure your Mobile Life! 44 44

Jrsys Mobile Banking Solutions

Jrsys Mobile Banking Solutions Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile

More information

Development of smart authentication and identification in Asia

Development of smart authentication and identification in Asia Development of smart authentication and identification in Asia Asia PKI Consortium Dr. Wei-Chung Hwang weichung.hwang@gmail.com Nov 16, 2017 Agenda About APKIC Background Current Development New trends

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical

More information

Payeeton Solution Platform

Payeeton Solution Platform Payeeton Solution Platform Bridging your mobile life Macronix 旺宏電子集團子公司 Index About MXIC About Mxtran Payeeton Introduction P.2 Corporate Introduction Mxtran Inc. The Origin of Brand - Macronix About Macronix

More information

Identity and Authentication PKI Portfolio

Identity and Authentication PKI Portfolio Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

An Overview of Secure and Authenticated Remote Access to Central Sites

An Overview of Secure and Authenticated Remote Access to Central Sites Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com

More information

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen

More information

AS emas emudhra Authentication Solution

AS emas emudhra Authentication Solution AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

E-Government Moldova s Experience and Future Perspectives

E-Government Moldova s Experience and Future Perspectives E-Government Moldova s Experience and Future Perspectives ALEXANDRU DONOS ProDataLex DEKAT Company LTD // Dushanbe, Tadzhikistan 22-23 June, 2017 By 2020 all public services will be digitized. Government

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

ACR1281U npa Dual Interface Reader Technical Specifications

ACR1281U npa Dual Interface Reader Technical Specifications Datenblatt / Specifications ACR1281U npa Dual Interface Reader Technical Specifications Table of Contents ACR1281U npa 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

SECURE OFFICE OF THE FUTURE

SECURE OFFICE OF THE FUTURE ** SECURE OFFICE OF THE FUTURE HP Today Powering 430 of the Global Fortune 500 Companies Working with 250,000+ Channel Partners 18,000+ patents 2 PCs & 1 Printer ship every second HP Business Personal

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Helpdesk Administration Guide Advanced Authentication. Version 5.6

Helpdesk Administration Guide Advanced Authentication. Version 5.6 Helpdesk Administration Guide Advanced Authentication Version 5.6 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association IMEI Database Manufacturer / Brand Owner User Guide Version 4.0 01 September 2015 Copyright Notice Copyright 2015 GSM Association GSM and the GSM logo are registered and owned by the GSM Association. Antitrust

More information

SignCloud. Remote Digital Signature System

SignCloud. Remote Digital Signature System SignCloud Remote Digital Signature System All the information in this document is CONFIDENTIAL and can t be used entirely or in part without a written permission from Bit4id SRL. Contents 1. Executive

More information

Mobile Payment in a cashless future Trends/Benefits/Solutions

Mobile Payment in a cashless future Trends/Benefits/Solutions Mobile Payment in a cashless future Trends/Benefits/Solutions Carol Wan 20 th September 2018 Company Overview Headquartered in Hong Kong Founded in 1925 HKT Trust was listed on the Hong Kong Stock Exchange

More information

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem

More information

Session 2: Understanding the payment ecosystem and the issues Visa Europe

Session 2: Understanding the payment ecosystem and the issues Visa Europe Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said

More information

Strong Authentication for Physical Access using Mobile Devices

Strong Authentication for Physical Access using Mobile Devices Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Power LogOn s Features - Check List

Power LogOn s Features - Check List s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Hardware One-Time Password User Guide November 2017

Hardware One-Time Password User Guide November 2017 Hardware One-Time Password User Guide November 2017 1 Table of Contents Table of Contents... 2 Purpose... 3 About One-Time Password Credentials... 3 How to Determine if You Need a Credential... 3 Acquisition

More information

Table of Contents: ipayment for Android

Table of Contents: ipayment for Android for Android Tablets Table of Contents: Two-Factor Authentication... 3 Card reader... 4 Bluetooth Card reader... 5 Receipt Printer... 6 Logging in to ipayment MobilePay... 7 Demo Mode... 7 Reset Password...

More information

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate

More information

DIGIPASS Authentication for O2 Succendo

DIGIPASS Authentication for O2 Succendo DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Phone-Based One-Time Password without Proofing (Level 2) User Guide November 2017

Phone-Based One-Time Password without Proofing (Level 2) User Guide November 2017 Phone-Based One-Time Password without Proofing (Level 2) User Guide November 2017 1 Contents About Phone Based One-Time Password... 3 OTP Acquisition and Activation Process Overview... 3 Step 1: Determine

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide RSA SECURID ACCESS Standard Agent Client Implementation Guide NetMove Daniel R. Pintal, RSA Partner Engineering Last Modified: April 4, 2018 Solution Summary Secure Starter

More information

PCMS. PC-linked Reader with Mass Storage.

PCMS. PC-linked Reader with Mass Storage. PCMS PC-linked Reader with Mass Storage www.acs.com.hk 1 Rundown 1. Product Overview 2. Product Features 3. Product Value 4. Product Application 5. Q & A 2 Product Overview 3 Product Overview The PC-linked

More information

Yubico with Centrify for Mac - Deployment Guide

Yubico with Centrify for Mac - Deployment Guide CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched

More information

10 April 2016 Mobcon Europe Sofia, Bulgaria. DSK Bank s. experience in the field of Mobile applications

10 April 2016 Mobcon Europe Sofia, Bulgaria. DSK Bank s. experience in the field of Mobile applications DSK Bank 1 10 April 2016 Mobcon Europe Sofia, Bulgaria DSK Bank s experience in the field of Mobile applications 2004 - launch of first e-channel for DSK Bank Provided to business clients. Run by dedicated

More information

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking

More information

for iphone for iphone

for iphone for iphone for iphone for iphone Table of Contents: Two-Factor Authentication...3 Overview...4 Card reader...4 Bluetooth Card reader...5 Receipt Printer...6 Logging in to ipayment MobilePay...7 Demo Mode...7 Reset

More information

CipherMail encryption. CipherMail white paper

CipherMail  encryption. CipherMail white paper CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013 Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000

More information

CPET 581 E-Commerce & Business Technologies. References

CPET 581 E-Commerce & Business Technologies. References CPET 581 E-Commerce & Business Technologies The E-Commerce Security Part 2 of 2 Paul I-Hai Lin, Professor http://www.etcs.ipfw.edu/~lin A Specialty Course for M.S. in Technology IT/Advanced Computer Applications

More information

Phone-Based One-Time Password User Guide November 2017

Phone-Based One-Time Password User Guide November 2017 Phone-Based One-Time Password User Guide November 2017 Table of Contents About Phone One-Time Password... 2 OTP Acquisition and Activation Process Overview... 2 Step 1: Determine Your Need for an OPT Credential...

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service. You can add your SBI Debit Card issued on Visa and MasterCard platform on your Samsung

More information

Product names and symbols mentioned in this presentation and this document content are trademarks or registered trademarks owned by respective companies. We highlight them here for educational purpose

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Wells Fargo Merchant Services. Wells Fargo Mobile Merchant User Guide for Apple ipad Version 3.2

Wells Fargo Merchant Services. Wells Fargo Mobile Merchant User Guide for Apple ipad Version 3.2 Wells Fargo Merchant Services Wells Fargo Mobile Merchant User Guide for Apple ipad Version 3.2 Table of Contents Overview...3 Key Features...3 Download Wells Fargo...4 Mobile Merchant...4 Demo Mode...4

More information

FEITIAN Technologies, Co., Ltd.

FEITIAN Technologies, Co., Ltd. POWER CARD www.ftsafe.com FEITIAN Technologies, Co., Ltd. Power Card Power Cards are security solutions in ISO standard card form factor and are able to combine various security functions into one card

More information

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication FAMILY BROCHURE Gemalto Authenticators Diverse Form Factors for Convenient Strong Diverse Form Factors for Convenient Strong. Offering the broadest range of authentication methods and form factors supported

More information

Certificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between

Certificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between Certificate Enrollment- and Signing Services for the Cloud A behind-the-scenes presentation of a successful cooperation between Introduction Based on our experience and the request from the market we would

More information

Overview of cryptovision's eid Product Offering. Presentation & Demo

Overview of cryptovision's eid Product Offering. Presentation & Demo Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic

More information

INTEGRATION OF TURKISH EID WITH E-GOVERNMENT & E-BUSINESS SERVICES

INTEGRATION OF TURKISH EID WITH E-GOVERNMENT & E-BUSINESS SERVICES INTEGRATION OF TURKISH EID WITH E-GOVERNMENT & E-BUSINESS SERVICES Oktay Adalier TÜBİTAK BİLGEM UEKAE, 41470, Kocaeli, Turkey Mucahit Mutlugun TÜBİTAK BİLGEM UEKAE, 41470, Kocaeli, Turkey Ahmet Fatih Mustacoglu

More information

SurePassID ServicePass User Guide. SurePassID Authentication Server 2017

SurePassID ServicePass User Guide. SurePassID Authentication Server 2017 SurePassID ServicePass User Guide SurePassID Authentication Server 2017 Introduction This technical guide shows how users can manage their SurePassID security tokens that are compatible with SurePassID

More information

User Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android

User Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android Disclosure Statements Confidential Notice The information contained herein is the property of Total System Services, Inc. (TSYS

More information

Florence Blanc-Renaud Senior Software Engineer - Identity Management - Red Hat

Florence Blanc-Renaud Senior Software Engineer - Identity Management - Red Hat TOO BAD... YOUR PASSWORD HAS JUST BEEN STOLEN! DID YOU CONSIDER USING 2FA? Florence Blanc-Renaud (flo@redhat.com) Senior Software Engineer - Identity Management - Red Hat A GOOD PASSWORD: SECURITY THROUGH

More information

Managed Access Gateway One-Time Password Guide Version 1.0 February 2017

Managed Access Gateway One-Time Password Guide Version 1.0 February 2017 1 Managed Access Gateway One-Time Password Guide Version 1.0 February 2017 2 Contents About One Time Password (OTP)... 3 OTP Credential Types... 3 What is the Proofing Upgrade?... 3 How to Determine if

More information

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...

More information

Moser Baer Group 25 years of excellence

Moser Baer Group 25 years of excellence Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

The Future of Smart Cards: Bigger, Faster and More Secure

The Future of Smart Cards: Bigger, Faster and More Secure The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview

More information

About MagTek. PIN Entry & Management

About MagTek. PIN Entry & Management About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

Hardware One-Time Password User Guide August 2018

Hardware One-Time Password User Guide August 2018 Hardware One-Time Password User Guide August 2018 Copyright 2017 Exostar LLC. All rights reserved 1 Version Impacts Date Owner Hardware One-Time Password User Guide Image updates August 2018 M. Williams

More information

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC? MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.

More information

B2B Portal User Guide

B2B Portal User Guide B2B Portal User Guide Table of Contents Introduction..3 Logging In.4 Changing your original password......6 Ordering Product....7 Product Waiting Lists......8 Payment Options.. 14 Finalizing your Order...

More information

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos

More information

Congratulations on the purchase of your new Clover Mobile

Congratulations on the purchase of your new Clover Mobile Congratulations on the purchase of your new Clover Mobile Set Up the Hardware What s included Optional Accessories USB wall charger USB cable Clover Mobile Dock Clover Mobile Printer Clover Mobile Clover

More information

Digitalisation and electronic signatures

Digitalisation and electronic signatures Digitalisation and electronic signatures eidas - a game changer Cryptomathic 2017 - All rights reserved Agenda Digitalisation - a global trend Key challenges in the implementation of digital Signatures

More information

White Paper Implementing mobile electronic identity

White Paper Implementing mobile electronic identity Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing

More information

Apple Pay - Frequently Asked Questions

Apple Pay - Frequently Asked Questions Apple Pay - Frequently Asked Questions What is Apple Pay? Apple Pay is a payments feature integrated into the Wallet app on your ios device that lets you add your Century Bank (CB) MasterCard Debit Card

More information

Congratulations on the purchase of your new Clover Flex

Congratulations on the purchase of your new Clover Flex Congratulations on the purchase of your new Clover Flex Set Up the Hardware What s included Clover Flex Charging cradle Receipt paper Power cord (2 for EU) Power brick Screwdriver Clover Flex Features

More information

ACR101I SIMicro (CCID)

ACR101I SIMicro (CCID) ACR101I SIMicro (CCID) Smart Card and Micro SD Reader Technical Specifications V1.06 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. SIM-sized Smart Card Reader...

More information

Symantec Managed PKI Overview. v8.15

Symantec Managed PKI Overview. v8.15 Symantec Managed PKI Overview v8.15 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of

More information

Sagem Orga Strong, Global, Innovative.

Sagem Orga Strong, Global, Innovative. Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

FIDO Alliance and Asia PKI Consortium White Paper: FIDO UAF and PKI in Asia Case Study and Recommendations

FIDO Alliance and Asia PKI Consortium White Paper: FIDO UAF and PKI in Asia Case Study and Recommendations FIDO Alliance and Asia PKI Consortium White Paper: FIDO UAF and PKI in Asia Case Study and Recommendations Editor: Ms. Karen Chang, APKIC (Asia PKI Consortium) Table of Contents 1. Development of PKI in

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security

More information

MDES to support converged wallets CEESCA 2015 Dubrovnik

MDES to support converged wallets CEESCA 2015 Dubrovnik László Szetnics, MasterCard Europe 30 September 2015 MDES to support converged wallets CEESCA 2015 Dubrovnik From the basics to the latest P2P Digitization MCBP NFC HCE PAN MasterPass Token DSRP MDES MDEXpress

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

The Business of Identity: Business Drivers and Use Cases of Identity Web Services

The Business of Identity: Business Drivers and Use Cases of Identity Web Services The Business of Identity: Business Drivers and Use Cases of Identity Web Services Roger Sullivan, Vice President, Liberty Alliance Vice President, Oracle Corporation Liberty s Architecture Liberty Identity

More information