eauthentication and Cross Boarder etransaction
|
|
- Maximilian O’Neal’
- 5 years ago
- Views:
Transcription
1 eauthentication and Cross Boarder etransaction James Wu / jrsys CEO 1 1
2 Taiwan s e-gov Journey Efficiency & Effectiveness Infrastructure Development & Penetration Online Service Development Integrated, Interoperable and Interactive Services E-Governance Pervasive Services Transparency Accountability Participation web2.0 driven Clustered, Proactive, Trustworthy and Non-stop Services Device Portable devices Network Wireless Broadband Application Web 2.0 Applications Cloud Computing Stage 1 Stage 2 Stage 2.5 Stage 3 Stage 4 egovernment 3-year Program egovernment Program E-Taiwan egov Program U-Taiwan egov Program Intelligent Taiwan egov Program
3 Taiwan e-gov Framework e-gov Online Services Government e-procurement System (GEPS) Land Information System e-tax System G2B Service Platform e-invoice Platform GPKI GCA, MOICA MOEACA, XCA My egov Service Portal Site Government Service Platform (GSP) Gov Agencies Portal Sites Government Directory Service GDS, XDS, CPA Government Service Network (GSN) Citizen Gov t Business Organizat n Application Services Infrastructure 3
4 Government Public-Key Infrastructure (GPKI) GRCA GTestCA GCA XCA MOEACA MOICA HCA All kinds of test certs. for developing apps Government Agencies, E-Gov Servers Other organizational entities (e.g., school, not-for-profit org.) Businesses (companies and branches, and shops) Citizens Healthcare Professionals, Healthcare orgs, Healthcare Servers 4
5 Proactive Services Proactive Service e-housekeeper for citizen e-helper for business Satisfaction Instance notice Greater efficiency Safe and secure Integrative with other channels e-secretary for Gov employees Innovating Services 5
6 G2B2C e-document Interchange Taiwan first Validation Authority product (2002) Taiwan largest Validation Authority Big transaction volumes (33,000 edocument /day) Digital signature/ encryption Verify signature/ Decryption E-Official Document 6
7 Taipei City Government Multi-purpose card Employee ID card Employee ID Contact PKI Card Contactless Transportation Card Secure Single-Sign-On System 7
8 Newborn baby reporting system 8
9 Military PKI-enabled Applications The first Military PKI-enabled project For both Web base and Client Server Applications Secure Single Sign On Access control by PKI smart card Users include army, navy and air force 9
10 Ministry of Transportation and Communications Mobile Signature and Validation Service Microsoft Active Directory Service PKI-enabled Application Web AD management t portal 10
11 Ministry of Finance 2.Login GCA Internet MOICA EIP Portal Purchase Order System User 1.User with Smart Card Electronic Document PKI Validation Verify CRL SVC OCSP SVC HA PKI suite 3.Verify 5.Result PKI suite Material and Transport Meeting Room Reservation Human Resource 6.Authorization DB LOG SVC 4.Log Audit Log Server EIP(Sun One) LDAP MS AD 11
12 Ministry of Foreign Affairs Single Sign On PKI APIs 12
13 ezfly Online Travel Agent 16 13
14 CHT WebTrust Certificate We issue certificates to Mobile & PC Jrsys Secure Mobile/PC Tokens USB PKI Token Smart Cards USB PC/SC reader Secure MicroSD ios/pc /Android Token Bluetooth Reader Software PFX HCE 14
15 eauthentication Different level of security ID/Password One Time Password PKI Two Factor Authentication Software Token Secure Element Hot Technologies Kerberos/SAML QR code OTP Mobile PKI HCE Tokenization NFC FiDo Biometric Apple Pay Dual-Channel Multi-Factors Authentication 15
16 All in One OTP solutions One Time Random Password Low cost solution Slim SIM OTP SMS AOTP OTP APP QR code OTP MicroSD OTP OCRA OTP jrsys OATH OTP Server Android Token ios OTP e-ink Display Master Card OTP Token 16
17 Mobile ID (OOB auth) 1. Input ID and Password PKI base QR code Dual Channels Two Factors Out-Of-Band authentication Internet 2. Scan QR code to obtain the OTP code 3. Server verify the OTP code CA/RA Jrsys Authentication Server 17
18 Mobile PKI Smart Card SIM Bluetooth Reader, NFC Mobile Phone, Audio Reader SWP SIM, Slim SIM Sticker with Secure Element/SWP, HCE Secure MicroSD ios/android/pc Token Audio PKI Token FiDo/Apple Pay NFC + SE +Fingerprint sensor 18
19 Secure Mobile Devices Bluetooth Reader World First ios/android/pc Token e-ink Master OTP card Audio Reader 19
20 Bluetooth Smart Card Reader for ios/android/pc 20
21 Dual Interface Smart Card Multi-Function Smart Card ID card (Contact/Contactless ICAO) PKI card (Contact/Contactless Digital Signature) Transportation Card (Contactless MiFare) 21
22 World First ios/android/pc Token ios 8-Pin Lightning Connector Android Mini USB PC USB Platform: PC/Android/iOS Jrsys Secure MicroSD inside 22
23 Secure your cloud storages Secure your cloud storage with one more device. 23
24 Pain & Solution PKI is hard to understand and implement Cross Platform is hard, especially Mobile High Hidden cost 24
25 Easy & Fast PKI-enable Solutions PKI-enabled in 3 Days Not 3 Months Cross Platform Various Devices Firefox Plug-In ActiveX Chrome Plug-In Mobile Signature & Validation Service 25
26 2014 Taiwan ITM Best product Winner Award Security Suits for PC Web Authentication with SE Applications Software Applications can work with Jrsys Middleware Jrsys PC Security Suite and many Firefox Plug-In ActiveX Chrome Plug-In Secure Devices Multiple Tokens Software PFX Smart Card 26 USB Token HSM
27 2014 Taiwan ITM Best product Winner Award Security Suits for Mobile Applications Mobile Authentication with SE Secure Mobile APP can work with Jrsys Middleware One Time Password Secure Secure PDF Mobile Signature jrsys Mobile Security Suite Mobile Money and many ios SDK Android SDK Secure Mobile Devices Software PFX HCE Multiple Mobile Tokens Smart Cards Bluetooth reader 27 Secure MicroSD PC/iOS/Android Token
28 WebTrust RA CHT WebTrust CA issue certificates to Mobile & PC Jrsys Secure Mobile/PC Tokens USB PKI Token Smart Cards USB PC/SC reader Secure MicroSD ios/pc /Android Token Bluetooth Reader Software PFX HCE 28
29 Cloud Validation All in One Authentication Service: ID/Password, OTP, Smart Card, Mobile Tokens and Micro SD. Single Sign On PKI APIs 29
30 Secret Communication System VOIP IM Photo File PDF 30
31 Cross-Border e-commerce Mobile Payment James Wu /jrsys Digital Signed Electronic Document Exchange 31
32 QR Code for Digital Signature Online/Offline Payment, 2 Factor Login, etc. 32
33 2 Factor Login QR Code & Mobile No Phishing Secure Sign In Traditional ID/Password Hard to against Trojan, Sniffer, Web Site Compromised and Bad Administrator Dual Channel Two Factor Secure Login Cross Platform/ Browsers 33
34 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer, Phishing site e-commerce site compromised 34
35 On-Line Payment No more Card Number + Expiration Date + CVV Just Scan the Secure QR Code Commerce 1.Prepare checkout data 2.Create a Digital Signed Checkout QR code on the screen Consumer 3.Scan the checkout QR code 4.Select virtual credit card 5.Input PIN code to confirm the payment Credit card information is not transmitted Date:2014/10/02 Merchant s Digital Signature 35
36 Off-Line Payment More Secure and Fast than Magnetic Credit Card Swipe Payment Mobile Payment Before Out-of-band authentication Handwriting signature Card can be Cloned Sign a Credit card Check Merchant scan the QR 36
37 Offline Payment Process Consumer 1.Select Virtual credit card 2.Enter the amount 3.Input PIN to make a digital signature and Generate a QR code Commerce 4.Scan the QR code 5.Make a Digital Signature 6.Connect to Payment Gateway Date:2014/10/02 Consumer s Digital Signature 37 Commerce cannot clone any card!
38 QR code for Logistic Shipping QR code contains Product codes, Quantities, Date, Time and Manufacture's Digital Signature User can scan and verify it immediately 38
39 Patented QR Code Payment Digital Signature QR code Not only an URL/ OTP short code But also the transaction with digital signature Date:2014/10/02 Time:11:50 Amount: US$25 OTP Digital Signature Easy to deploy and use No additional hardware cost Patented O2O Payment technology Authentication, Integrity, Confidentiality and Non-repudiation secure transaction 39
40 Digital Signed Hard Copy Document Before H andwriting Signature Digital Signed PDF or Hard copy Printout Now PDF417 Original Document with Digest Party A s Digital Signature Party B s Digital Signature 40
41 Digital Signed Hard Copy Document Digital signed PDF 417 License Digital signed QR code Invoice 41
42 About jrsys Innovative Mobile and Cloud Security-Enabler 2014 Taiwan ITM Best 100 products Winner Award APICTA Award 2013 Security Winner 2012 Mobile Money Innovation Award 2012 ASIA PKI Innovation Award 42 One of the 7 innovative ideas to provide greater access to financial services from 98 best ideas of 26 countries BY: MIF, IDB, CAF and GSMA
43 Partner with Foxit 27,500 Millions PDF users use jrsys security Suite 43
44 jrsys Secure your Mobile Life! 44 44
Jrsys Mobile Banking Solutions
Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile
More informationDevelopment of smart authentication and identification in Asia
Development of smart authentication and identification in Asia Asia PKI Consortium Dr. Wei-Chung Hwang weichung.hwang@gmail.com Nov 16, 2017 Agenda About APKIC Background Current Development New trends
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationNFC embedded microsd smart Card - Mobile ticketing opportunities in Transit
NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical
More informationPayeeton Solution Platform
Payeeton Solution Platform Bridging your mobile life Macronix 旺宏電子集團子公司 Index About MXIC About Mxtran Payeeton Introduction P.2 Corporate Introduction Mxtran Inc. The Origin of Brand - Macronix About Macronix
More informationIdentity and Authentication PKI Portfolio
Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationAn Overview of Secure and Authenticated Remote Access to Central Sites
Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com
More informationDr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011
Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationOverview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT
DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor
More informationIDGo Middleware and SDK for Mobile Devices
Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for
More informationE-Government Moldova s Experience and Future Perspectives
E-Government Moldova s Experience and Future Perspectives ALEXANDRU DONOS ProDataLex DEKAT Company LTD // Dushanbe, Tadzhikistan 22-23 June, 2017 By 2020 all public services will be digitized. Government
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationACR1281U npa Dual Interface Reader Technical Specifications
Datenblatt / Specifications ACR1281U npa Dual Interface Reader Technical Specifications Table of Contents ACR1281U npa 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationCertificate Enrollment for the Atlas Platform
Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps
More informationSECURE OFFICE OF THE FUTURE
** SECURE OFFICE OF THE FUTURE HP Today Powering 430 of the Global Fortune 500 Companies Working with 250,000+ Channel Partners 18,000+ patents 2 PCs & 1 Printer ship every second HP Business Personal
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More informationHelpdesk Administration Guide Advanced Authentication. Version 5.6
Helpdesk Administration Guide Advanced Authentication Version 5.6 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationSecure Lightweight Activation and Lifecycle Management
Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution
More informationSafeNet MobilePKI for BlackBerry V1.2. Administration Guide
SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationIMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association
IMEI Database Manufacturer / Brand Owner User Guide Version 4.0 01 September 2015 Copyright Notice Copyright 2015 GSM Association GSM and the GSM logo are registered and owned by the GSM Association. Antitrust
More informationSignCloud. Remote Digital Signature System
SignCloud Remote Digital Signature System All the information in this document is CONFIDENTIAL and can t be used entirely or in part without a written permission from Bit4id SRL. Contents 1. Executive
More informationMobile Payment in a cashless future Trends/Benefits/Solutions
Mobile Payment in a cashless future Trends/Benefits/Solutions Carol Wan 20 th September 2018 Company Overview Headquartered in Hong Kong Founded in 1925 HKT Trust was listed on the Hong Kong Stock Exchange
More informationhidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL
Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem
More informationSession 2: Understanding the payment ecosystem and the issues Visa Europe
Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said
More informationStrong Authentication for Physical Access using Mobile Devices
Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationPower LogOn s Features - Check List
s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationHardware One-Time Password User Guide November 2017
Hardware One-Time Password User Guide November 2017 1 Table of Contents Table of Contents... 2 Purpose... 3 About One-Time Password Credentials... 3 How to Determine if You Need a Credential... 3 Acquisition
More informationTable of Contents: ipayment for Android
for Android Tablets Table of Contents: Two-Factor Authentication... 3 Card reader... 4 Bluetooth Card reader... 5 Receipt Printer... 6 Logging in to ipayment MobilePay... 7 Demo Mode... 7 Reset Password...
More informationGiovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security
Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate
More informationDIGIPASS Authentication for O2 Succendo
DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationPhone-Based One-Time Password without Proofing (Level 2) User Guide November 2017
Phone-Based One-Time Password without Proofing (Level 2) User Guide November 2017 1 Contents About Phone Based One-Time Password... 3 OTP Acquisition and Activation Process Overview... 3 Step 1: Determine
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide NetMove Daniel R. Pintal, RSA Partner Engineering Last Modified: April 4, 2018 Solution Summary Secure Starter
More informationPCMS. PC-linked Reader with Mass Storage.
PCMS PC-linked Reader with Mass Storage www.acs.com.hk 1 Rundown 1. Product Overview 2. Product Features 3. Product Value 4. Product Application 5. Q & A 2 Product Overview 3 Product Overview The PC-linked
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationVisa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations
Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched
More information10 April 2016 Mobcon Europe Sofia, Bulgaria. DSK Bank s. experience in the field of Mobile applications
DSK Bank 1 10 April 2016 Mobcon Europe Sofia, Bulgaria DSK Bank s experience in the field of Mobile applications 2004 - launch of first e-channel for DSK Bank Provided to business clients. Run by dedicated
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationfor iphone for iphone
for iphone for iphone Table of Contents: Two-Factor Authentication...3 Overview...4 Card reader...4 Bluetooth Card reader...5 Receipt Printer...6 Logging in to ipayment MobilePay...7 Demo Mode...7 Reset
More informationCipherMail encryption. CipherMail white paper
CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More informationMobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000
More informationCPET 581 E-Commerce & Business Technologies. References
CPET 581 E-Commerce & Business Technologies The E-Commerce Security Part 2 of 2 Paul I-Hai Lin, Professor http://www.etcs.ipfw.edu/~lin A Specialty Course for M.S. in Technology IT/Advanced Computer Applications
More informationPhone-Based One-Time Password User Guide November 2017
Phone-Based One-Time Password User Guide November 2017 Table of Contents About Phone One-Time Password... 2 OTP Acquisition and Activation Process Overview... 2 Step 1: Determine Your Need for an OPT Credential...
More informationFrequently Asked Questions
Frequently Asked Questions 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service. You can add your SBI Debit Card issued on Visa and MasterCard platform on your Samsung
More informationProduct names and symbols mentioned in this presentation and this document content are trademarks or registered trademarks owned by respective companies. We highlight them here for educational purpose
More informationDHS ID & CREDENTIALING INITIATIVE IPT MEETING
DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationWells Fargo Merchant Services. Wells Fargo Mobile Merchant User Guide for Apple ipad Version 3.2
Wells Fargo Merchant Services Wells Fargo Mobile Merchant User Guide for Apple ipad Version 3.2 Table of Contents Overview...3 Key Features...3 Download Wells Fargo...4 Mobile Merchant...4 Demo Mode...4
More informationFEITIAN Technologies, Co., Ltd.
POWER CARD www.ftsafe.com FEITIAN Technologies, Co., Ltd. Power Card Power Cards are security solutions in ISO standard card form factor and are able to combine various security functions into one card
More informationFAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication
FAMILY BROCHURE Gemalto Authenticators Diverse Form Factors for Convenient Strong Diverse Form Factors for Convenient Strong. Offering the broadest range of authentication methods and form factors supported
More informationCertificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between
Certificate Enrollment- and Signing Services for the Cloud A behind-the-scenes presentation of a successful cooperation between Introduction Based on our experience and the request from the market we would
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationINTEGRATION OF TURKISH EID WITH E-GOVERNMENT & E-BUSINESS SERVICES
INTEGRATION OF TURKISH EID WITH E-GOVERNMENT & E-BUSINESS SERVICES Oktay Adalier TÜBİTAK BİLGEM UEKAE, 41470, Kocaeli, Turkey Mucahit Mutlugun TÜBİTAK BİLGEM UEKAE, 41470, Kocaeli, Turkey Ahmet Fatih Mustacoglu
More informationSurePassID ServicePass User Guide. SurePassID Authentication Server 2017
SurePassID ServicePass User Guide SurePassID Authentication Server 2017 Introduction This technical guide shows how users can manage their SurePassID security tokens that are compatible with SurePassID
More informationUser Guide. mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android
mpos Readers RP350x & RP457c Mobile Payment Acceptance User Guide for Android Disclosure Statements Confidential Notice The information contained herein is the property of Total System Services, Inc. (TSYS
More informationFlorence Blanc-Renaud Senior Software Engineer - Identity Management - Red Hat
TOO BAD... YOUR PASSWORD HAS JUST BEEN STOLEN! DID YOU CONSIDER USING 2FA? Florence Blanc-Renaud (flo@redhat.com) Senior Software Engineer - Identity Management - Red Hat A GOOD PASSWORD: SECURITY THROUGH
More informationManaged Access Gateway One-Time Password Guide Version 1.0 February 2017
1 Managed Access Gateway One-Time Password Guide Version 1.0 February 2017 2 Contents About One Time Password (OTP)... 3 OTP Credential Types... 3 What is the Proofing Upgrade?... 3 How to Determine if
More informationThe Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication
White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...
More informationMoser Baer Group 25 years of excellence
Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationThe Future of Smart Cards: Bigger, Faster and More Secure
The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview
More informationAbout MagTek. PIN Entry & Management
About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification
More informationOneID An architectural overview
OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities
More informationHardware One-Time Password User Guide August 2018
Hardware One-Time Password User Guide August 2018 Copyright 2017 Exostar LLC. All rights reserved 1 Version Impacts Date Owner Hardware One-Time Password User Guide Image updates August 2018 M. Williams
More informationMCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?
MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.
More informationB2B Portal User Guide
B2B Portal User Guide Table of Contents Introduction..3 Logging In.4 Changing your original password......6 Ordering Product....7 Product Waiting Lists......8 Payment Options.. 14 Finalizing your Order...
More informationSpiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP
Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos
More informationCongratulations on the purchase of your new Clover Mobile
Congratulations on the purchase of your new Clover Mobile Set Up the Hardware What s included Optional Accessories USB wall charger USB cable Clover Mobile Dock Clover Mobile Printer Clover Mobile Clover
More informationDigitalisation and electronic signatures
Digitalisation and electronic signatures eidas - a game changer Cryptomathic 2017 - All rights reserved Agenda Digitalisation - a global trend Key challenges in the implementation of digital Signatures
More informationWhite Paper Implementing mobile electronic identity
Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing
More informationApple Pay - Frequently Asked Questions
Apple Pay - Frequently Asked Questions What is Apple Pay? Apple Pay is a payments feature integrated into the Wallet app on your ios device that lets you add your Century Bank (CB) MasterCard Debit Card
More informationCongratulations on the purchase of your new Clover Flex
Congratulations on the purchase of your new Clover Flex Set Up the Hardware What s included Clover Flex Charging cradle Receipt paper Power cord (2 for EU) Power brick Screwdriver Clover Flex Features
More informationACR101I SIMicro (CCID)
ACR101I SIMicro (CCID) Smart Card and Micro SD Reader Technical Specifications V1.06 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. SIM-sized Smart Card Reader...
More informationSymantec Managed PKI Overview. v8.15
Symantec Managed PKI Overview v8.15 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of
More informationSagem Orga Strong, Global, Innovative.
Sagem Orga Strong, Global, Innovative. CTST François Blanchard Global Account Marketing Manager 2 Market drivers The game has changed Mobile Network Operators are now WEB service providers Convergence
More informationCitizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development
Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...
More informationFIDO Alliance and Asia PKI Consortium White Paper: FIDO UAF and PKI in Asia Case Study and Recommendations
FIDO Alliance and Asia PKI Consortium White Paper: FIDO UAF and PKI in Asia Case Study and Recommendations Editor: Ms. Karen Chang, APKIC (Asia PKI Consortium) Table of Contents 1. Development of PKI in
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationMDES to support converged wallets CEESCA 2015 Dubrovnik
László Szetnics, MasterCard Europe 30 September 2015 MDES to support converged wallets CEESCA 2015 Dubrovnik From the basics to the latest P2P Digitization MCBP NFC HCE PAN MasterPass Token DSRP MDES MDEXpress
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationThe Business of Identity: Business Drivers and Use Cases of Identity Web Services
The Business of Identity: Business Drivers and Use Cases of Identity Web Services Roger Sullivan, Vice President, Liberty Alliance Vice President, Oracle Corporation Liberty s Architecture Liberty Identity
More information