Securing Smart Meters with MULTOS Technical Overview

Size: px
Start display at page:

Download "Securing Smart Meters with MULTOS Technical Overview"

Transcription

1 Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level. Its purpose is to give an initial technical overview of MULTOS and demonstrate why it is a good fit for that marketplace. Further, in-depth, technical documentation is available at In this document the applications running within the MULTOS chip are termed firmware (as opposed to applications ) as this is more in line with the terminology used in smart metering. This document makes reference to some of the main specifications related to the UK market and highlights where MULTOS does implement or could help to implement those requirements. Suggestions are also made as to how MULTOS could improve the proposed scheme. Such sections are in green text. Referenced documents are: Smart Metering Implementation Programme Great Britain Companion Specification (GBCS) v0.7 rev 6 [GBCS] SMLT-SC-0002 ESME v0-22 CPA Security Characteristic Electricity Smart Metering Equipment [CAP ESME] (the Gas equivalent is very similar so not referenced separately) RFC 5934 Trust Anchor Management Protocol [RFC 5934] Technical Overview: Version 1, 8 th April MAOSCO Ltd

2 Problems in need of a solution, and how MULTOS helps MULTOS is a secure operating system for secure devices. Traditionally it has been used in payment cards, ID cards, passports and transit applications. The high level of security needed for those applications, and provided by MULTOS, makes it an ideal choice for securing high-value and infrastructure-critical assets in the power distribution network. This paper discusses how the features of MULTOS can be used to solve security problems associated with Smart Meters in particular. Providing secure communications The security mechanisms of communications channels used in metering networks cannot be relied upon. A more credible approach is to implement a cryptographically based secure channel that logically connects devices end-to-end over any and all intermediate channels. By using a MULTOS device in a smart meter, it is possible to implement a secure protocol based on modern, up-to-date, cryptographic standards for a low cost, including physical tamper protection. Knowing that you are talking to a genuine meter There are several key points in a meter s lifecycle when you need to know that you are talking to a genuine meter. Loading firmware and/or keys for the first time, possibly after the meter has been installed on site Updating firmware and/or keys after the meter has been installed on site When taking readings When issuing commands to write to, or control the meter At the heart of the MULTOS Scheme, is the Key Management Authority (KMA) the Certificate Authority for MULTOS. This is an extremely secure facility based in the UK but serves MULTOS globally. All keys related to identifying a MULTOS chip, its initialisation for use and the loading / deletion of firmware are generated and/or certified by the KMA. Only genuine, bonafide manufacturers and suppliers can register with the KMA. Each MULTOS chip has a unique serial number and transport key injected into it by the silicon manufacturer. These serial numbers and keys are based on master values held by the KMA. This is all done before a meter manufacturer would obtain the MULTOS chips, which are at this point generic MULTOS chips and could be used for anything. At some point, depending on the scenario, the generic chip gets bound to an owner through a step called Enablement. This is done by loading data generated by the KMA (which is encrypted by the unique transport key of each chip) into the chip. Technical Overview: Version 1, 8 th April MAOSCO Ltd

3 As well as setting the owner identifier and product identifier (e.g. to identify the model of the meter), the enablement data includes a unique asymmetric key pair and public key certificate which are used for loading and deleting firmware (see later). This certificate includes the owner identifier and serial number as well so it is possible to check if a MULTOS chip and (by extension the meter) is genuine by asking for its public key certificate and verifying it with the KMA public key. Once you have loaded the firmware to the MULTOS chip, the secure protocol it implements (whatever that may be) can be reliably used to verify the authenticity of the meter for commands related to its active state (readings, write commands etc). There are several issues with [GBCS ]: There is no mechanism for validating that the entity requesting a Device Certificate Signing Request (DCSR) is actually a genuine meter. It assumes that the meter is capable of generating sufficiently random key pairs. The process of protecting and handling the remote DCSR itself is complex. MULTOS can solve these issues as follows: The generation of the Device Key Pair and certificate can be done using a FIPS approved Hardware Security Module (HSM) off meter and embedded securely into the firmware load package (as discussed in Remotely loading and updating keys below). Note that this is the approach used in the finance industry. Because the firmware package is cryptographically linked to, and can only be loaded to the intended MULTOS chip (i.e. the intended meter) it is possible to guarantee that the correct and genuine credentials have been loaded to any meter. Providing secure processing and storage (at low cost & low power) Secure protocols based on cryptography need well implemented cryptographic functionality, a safe way of storing keys and a closed environment for the cryptographic computations. This is exactly what MULTOS chips are designed for, having been proven worldwide in over half a billion devices to date. Furthermore some MULTOS products already have Common Criteria certification, giving meter designers added reassurance they are using proven secure products. In addition to this, the low cost and low power requirements make them ideal. Firmware loaded into MULTOS chips is safe; it cannot be modified by unauthorised parties or infected with viruses. Confidential data (identity data, readings, UTRNs, tamper indicators) cannot be accessed or modified except by the firmware to which it belongs or through a secure process called Delegation. Using MULTOS satisfies at least the following requirements related to the secure environment: [RFC ] requirements for a Cryptographic Module as required by [GBCS ]. [CAP ESME DEV.M846] Secure failure recovery [CAP ESME DEV.M926] Protected software environment [CAP ESME DEV.1.M902] Check firmware integrity before execution* [CAP ESME DEV.2.M847] Minimise interfaces [CAP ESME DEV.4.M138 and DEV.4.M290 etc] on random number generation [CAP ESME DEV.4.M349] Sanitise temporary variables [CAP ESME DEV.5.M897] Protection of security-related physical structure** [CAP ESME DEV.6.M943 and DEV.6.M944] on PIN handling *[GBCS] does not seem to include provision for ensuring the integrity of firmware and data once it has been safely delivered to the meter. ** This includes the keys used. Technical Overview: Version 1, 8 th April MAOSCO Ltd

4 Remotely loading/updating firmware This presents a number of challenges:- Ensuring the right firmware gets loaded to the intended meter(s), and only the intended meter(s). Ensuring that the firmware arrives unaltered. Ensuring that only authorised firmware is loaded. Keeping the firmware s associated data confidential during transit. With MULTOS, all load and delete actions require a valid load or delete certificate issued from the KMA. These certificates prove the authenticity of an application, its integrity and the right to be loaded / deleted on the target chip. Load certificates contain: The firmware identifier: each certificate is specific to a single firmware identifier and this is checked against the identifier of the firmware package. The owner identifier: this must match that loaded into the chip during enablement. This gives permission for the firmware to be loaded. A hash of the code segment of the firmware: to allow the chip to check the integrity and identity of the code specifically. A list of valid products: it is possible to ensure that firmware can only be loaded to particular (meter) products (as defined in the chip s enablement data). A signature of the whole firmware package, using a firmware signing key: The signing public key is also contained in the load certificate, allowing the chip to check the firmware signature when loading, guaranteeing authenticity and integrity. The serial number of the chip the certificate is for (optional): usually certificates are issued for a whole class of chips belonging to an owner, but it is possible to issue, and therefore control loading permission, at a per-chip level. Confidentiality of the data contained in the firmware load package is achieved by encrypting the data with each chip s unique public key. In that way, only the target chip can successfully decrypt the confidential data, as only it has the corresponding private key. If firmware for an external chip needs to be updated, it is still possible to use the MULTOS chip to provide the cryptographic validation of that external firmware. Because you can securely load the MULTOS chip s firmware, you are able to trust it fully to validate the external firmware. Using MULTOS hugely simplifies the process for downloading firmware images ref [GBCS 11.3] and eliminates any concerns around secure handling of firmware updates in transport as they are cryptographically protected from source. There is no need to define a totally new process or build a completely new infrastructure to support it. Remotely loading and updating keys Any secure protocol running within the firmware loaded into the MULTOS chip will use cryptographic keys. MULTOS provides the perfect option for populating the original keys needed. This is because, as detailed above in the section on remotely loading firmware, the firmware package can contain data, and that data can include keys and be encrypted using the individual public keys of the target chips. To issue a new set of firmware keys to an active meter, there are two options: use the secure protocol of the firmware itself or load a new firmware package containing new keys. Having used MULTOS to safely deliver firmware and data (including certificates and keys) to a meter, with respect to [GBCS] there is the opportunity to redefine, and massively simplify, the whole communication protocol basing it around symmetric keys managed by the suppliers (or their subcontractors) instead. Technical Overview: Version 1, 8 th April MAOSCO Ltd

5 Example Scenario This is one possible scenario in which MULTOS could be used to secure Smart Meters. The exact function of the MULTOS chip in the overall architecture of the meter is not specified but is assumed to at least include all the functionality related to secure communications, secure firmware updates and storage of critical data items. Meter Manufacturers Serial Number List Data File The meter manufacturer requests enablement data* from the KMA for a batch of meters. This is done on-line. The meter manufacturer loads the enablement data to the MULTOS chips in the meters. * Using the owner ID of the Meter Asset Provider who is buying the meters. Along with the meters, they deliver the MULTOS public key certificate for each meter and the firmware for that meter model. Meter Asset Provider (MAP) These companies actually own the meters installed in homes and businesses and the owner identifier in the MULTOS chip is set to them. It is their role to control the issuing of MULTOS load and delete certificates to Energy Suppliers. They do this by using the on-line interface to the KMA. Energy Suppliers Each supplier has an asymmetric key used for signing firmware. On receipt of new firmware from a meter manufacturer, the supplier requests a load certificate for that firmware from each MAP (which contains the public part of the Energy Supplier s signing key). The firmware identifier is unique to the supplier and model of meter. For each meter they are supplying, they need to record The meter owner, serial number and model (all of which are MULTOS identifiers) The MULTOS public key certificate (so they can encrypt firmware to send to that meter) The firmware version currently deployed If taking over supply from another supplier, the new supplier obtains the following The meter owner, serial number and model details (from the old supplier) The MULTOS public key certificate for the meter (from the old supplier) A MULTOS delete certificate for that meter s current firmware (from the MAP) A MULTOS load certificate (from the MAP) for the firmware for that meter model, if they don t already have one. The supplier then personalises the firmware for that make and model of meter with the data needed. For example: Customer Reference number Keys specific to that meter and customer as used by the secure protocol Remote Party security credentials Credit limits / Prepaid unit cost applicable to that customer Technical Overview: Version 1, 8 th April MAOSCO Ltd

6 The resulting firmware package is encrypted by the MULTOS public key for the meter and signed using the private part of the supplier s signing key. This personalisation process should make use of a Hardware Security Module (HSM). The supplier connects to the meter (using whatever communication channel is in place) and Submits the delete certificate to erase any old firmware o either from an old supplier or because the firmware is being upgraded Submits the new personalised firmware and load certificate. If the meter is not genuine, or not the intended meter, the delete and load processes will fail (as described earlier). Any of the above processes could be outsourced by the supplier to a secure, competent third party (including the KMA itself). There are many to choose from who do this all the time, many of whom are MULTOS Consortium members. More about the KMA As well as providing the keys needed for the MULTOS scheme, the KMA has the capability to Securely host third-party systems in its high security vault Provide data preparation and key management services to energy companies Provide firmware management services to energy companies Technical Overview: Version 1, 8 th April MAOSCO Ltd

Using Established, Proven Standards to Build a Secure Smart Meter Infrastructure

Using Established, Proven Standards to Build a Secure Smart Meter Infrastructure Using Established, Proven Standards to Build a Secure Smart Meter Infrastructure Abstract The very need for flexibility in the global Smart Meter market could make it very difficult for vendors to build

More information

GLDA MAO-DOC-TEC-008 v2.28

GLDA MAO-DOC-TEC-008 v2.28 Guide to Loading and Deleting Applications GLDA MAO-DOC-TEC-008 v2.28 GLDA Guide to Loading and Deleting MAO-DOC-TEC-008 v2.28 2017 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited. Guide

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Remote Key Loading Spread security. Unlock efficiency

Remote Key Loading Spread security. Unlock efficiency Remote Key Loading Spread security. Unlock efficiency Cut costs increase security A smarter way to do business The hacker community is growing increasingly sophisticated which means the financial community

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

HARDWARE SECURITY MODULES (HSMs)

HARDWARE SECURITY MODULES (HSMs) HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical

More information

Version Deleted: 8. SMETS1 Supporting Requirements

Version Deleted: 8. SMETS1 Supporting Requirements Version 0009 Deleted: 8 SMETS1 Supporting Requirements 1 1 Introduction 1.1 This document lays out supporting requirements in relation to SMETS1 Devices and communications relating to SMETS1 Devices. None

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

DNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d

DNSSEC Trust tree:  (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 December 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

QUANTUM SAFE PKI TRANSITIONS

QUANTUM SAFE PKI TRANSITIONS QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 June 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY HARDWARE SECURITY MODULES Deployment strategies for enterprise security Organizations around the world are creating open, flexible

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong Smart Cards By: Definition Smart cards, chip card, or integrated circuit card (ICC) are card with embedded integrated circuits that contain a computer chip capable of carrying out a cryptographic protocol.

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

ITIL 2011 Foundation Certification Training - Brochure

ITIL 2011 Foundation Certification Training - Brochure ITIL 2011 Foundation Certification Training - Brochure The Launchpad for a Career in IT Service Management Course Name : ITIL Foundation Version : INVL_ITILF_BR_02_026_1.2 Course ID : ITSM - 109 www.invensislearning.com

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS)

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3.1 Introduction In any public key infrastructure deployment, the protection of private key material (application keys) associated with the public/private

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

The Next Generation of Credential Technology

The Next Generation of Credential Technology The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.

More information

Standard. Use of Cryptography. Information Security Manager. Page 1 of 12

Standard. Use of Cryptography. Information Security Manager. Page 1 of 12 Standard Use of Cryptography Information Security Manager Page 1 of 12 Document control Distribution list Name Title Department Adrian Ellison Assistant Director, Infrastructure IT Services Services Amber

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Overview of Authentication Systems

Overview of Authentication Systems Overview of Authentication Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

More information

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Revision 1.1 June 2017 Document Changes Date Use with Version

More information

Hardware Security Modules: Where Businesses Puts Its Trust

Hardware Security Modules: Where Businesses Puts Its Trust Hardware Security Modules: Where Businesses Puts Its Trust As Public Key Infrastructure (PKI) is now the predominant way to assure trust in business, HSMs are the predominant way to assure trust in PKI.

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

Hypervisor Security First Published On: Last Updated On:

Hypervisor Security First Published On: Last Updated On: First Published On: 02-22-2017 Last Updated On: 05-03-2018 1 Table of Contents 1. Secure Design 1.1.Secure Design 1.2.Security Development Lifecycle 1.3.ESXi and Trusted Platform Module 2.0 (TPM) FAQ 2.

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Security: The Key to Affordable Unmanned Aircraft Systems

Security: The Key to Affordable Unmanned Aircraft Systems AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY

More information

SMart esolutions Information Security

SMart esolutions Information Security Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information

TELIA MOBILE ID CERTIFICATE

TELIA MOBILE ID CERTIFICATE Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

ETSI TS V7.1.0 ( )

ETSI TS V7.1.0 ( ) TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route

More information

Cuttingedge crypto graphy

Cuttingedge crypto graphy The latest cryptographic solutions from Linux on the System z platform BY PETER SPERA Cuttingedge crypto graphy Can Linux* for the IBM* System z* platform meet the cryptographic needs of today s enterprise

More information

WP24 CFD Settlement: Required Information

WP24 CFD Settlement: Required Information WP24 Settlement: Required Information Working Practice Public Version: 3.0 Date: 16 May 2018 Table of Contents Change Amendment Record 3 1. Introduction 4 1.1 Scope and Purpose 4 1.2 Main Users and Responsibilities

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

White Paper. Deploying CKMS Within a Business

White Paper. Deploying CKMS Within a Business White Paper Deploying CKMS Within a Business 1 Introduction The Cryptomathic Crypto Key Management System (CKMS) is a market-leading lifecycle key management product that can manage cryptographic keys

More information

SONERA MOBILE ID CERTIFICATE

SONERA MOBILE ID CERTIFICATE Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005 Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...

More information

Nigori: Storing Secrets in the Cloud. Ben Laurie

Nigori: Storing Secrets in the Cloud. Ben Laurie Nigori: Storing Secrets in the Cloud Ben Laurie (benl@google.com) April 23, 2013 1 Introduction Secure login is something we would clearly like, but achieving it practically for the majority users turns

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1

More information

INFO-H-415 Project Overview- Security Database and SQL Server

INFO-H-415 Project Overview- Security Database and SQL Server INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Key Lifecycle Security Requirements. Version 1.0.2

Key Lifecycle Security Requirements. Version 1.0.2 Key Lifecycle Security Requirements Version 1.0.2 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: eid@bsi.bund.de Internet: https://www.bsi.bund.de

More information

Introduction to Security

Introduction to Security to Security CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 31 October 2012 CSS322Y12S2L01, Steve/Courses/2012/s2/css322/lectures/introduction.tex,

More information

PIN Security Requirements

PIN Security Requirements Payment Card Industry (PCI) PIN Security Requirements PCI SSC Modifications Summary of Significant Changes from v2.0 to v3.0 August 2018 PCI SSC Modifications to PCI PIN Security Requirements In the table

More information

Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide

Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide Version 1.0 February 14, 2018 Contents Introduction 3 Operational Environment 3 Setup and Configuration

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

Grid Computing Fall 2005 Lecture 16: Grid Security. Gabrielle Allen

Grid Computing Fall 2005 Lecture 16: Grid Security. Gabrielle Allen Grid Computing 7700 Fall 2005 Lecture 16: Grid Security Gabrielle Allen allen@bit.csc.lsu.edu http://www.cct.lsu.edu/~gallen Required Reading Chapter 16 of The Grid (version 1), freely available for download

More information

Understanding Layer 2 Encryption

Understanding Layer 2 Encryption Understanding Layer 2 Encryption TECHNICAL WHITEPAPER Benefits of Layer 2 Encryption Lowest cost of ownership Better bandwith efficiency (up to 50%) Minimal ongoing maintenance routing updates transparent

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

M2MD Communications Gateway: fast, secure and efficient

M2MD Communications Gateway: fast, secure and efficient Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular

More information

T Cryptography and Data Security

T Cryptography and Data Security T-79.159 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Kaufman et al: Ch 11.6; 9.7-9; Stallings:

More information

Remote Key Loading. Decoding RKL

Remote Key Loading. Decoding RKL Remote Key Loading Decoding RKL What is Remote Key Loading (RKL)? Discover the power of our industry-leading Remote Key Loading (RKL) solution, and find out how your financial institution (FI) will benefit

More information

An Introduction to Trusted Platform Technology

An Introduction to Trusted Platform Technology An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK Siani_Pearson@hp.com Content What is Trusted Platform technology and TCPA? Why is Trusted Platform technology

More information

A roadmap to migrating the internet to quantum-safe cryptography

A roadmap to migrating the internet to quantum-safe cryptography A roadmap to migrating the internet to quantum-safe cryptography William Whyte, Security Innovation 2013-09-26 Conditions for successful deployment Post-quantum crypto must be: Agreed Standardized in core

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

ITIL Intermediate Service Strategy Certification Exam Training - Brochure

ITIL Intermediate Service Strategy Certification Exam Training - Brochure ITIL Intermediate Service Strategy Certification Exam Training - Brochure Gain the Knowledge to become an ITIL Service Strategy Specialist Course Name : ITIL Service Strategy Version : INVL_ITILSS_BR_02_013_1.2

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

Introducing Hardware Security Modules to Embedded Systems

Introducing Hardware Security Modules to Embedded Systems Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors

More information

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) Point-to-Point Encryption Payment Card Industry (PCI) Point-to-Point Encryption Solution Requirements and Version 2.0 (Revision 1.1) July 2015 Document Changes Date Version Revision Description 14 September 2011 1.0 Initial release

More information

SMKI Code of Connection

SMKI Code of Connection SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5

More information

Instructions for Manufacturer's Agent New Registration. e-file

Instructions for Manufacturer's Agent New Registration. e-file Instructions for Manufacturer's Agent New Registration e-file Navigate to the Bingo and Raffles home page When you are ready, select forms list. Scroll down the Forms List page until you reach the Suppliers

More information

Securing Connections with Digital Certificates in Router OS. By Ezugu Magnus PDS Nigeria

Securing Connections with Digital Certificates in Router OS. By Ezugu Magnus PDS Nigeria Securing Connections with Digital Certificates in Router OS By Ezugu Magnus PDS Nigeria About the Presenter MikroTik Certifications My Contact details: Mikrotik Certified Engineer (MTCNA,MTCRE,MTCWE,MTCTCE,MTCUME,MTCINE)

More information

Security Solutions. End-to-end security. Protecting your physical access control system.

Security Solutions. End-to-end security. Protecting your physical access control system. Security Solutions End-to-end security Protecting your physical access control system. www.nedapsecurity.com security common practice Bringing IT best practices to physical security Often, companies don

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M GSMA Embedded SIM Specification Remote SIM Provisioning for M2M Purpose of this Reference Messaging Pack Appropriate slides may be selected to be used for within different presentations for multiple audiences

More information

ADMINISTRATORS GUIDE

ADMINISTRATORS GUIDE ADMINISTRATORS GUIDE Corporate Online Give your business the edge Contents Introduction 1 Overview 1 Preparatory steps to login 2 Logging in 4 Signing 5 Logging out 5 Navigating around the system 5 Section

More information

Message exchange with. Finnish Customs

Message exchange with. Finnish Customs Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish

More information

Database data security through the lens of cryptographic engineering

Database data security through the lens of cryptographic engineering Database data security through the lens of cryptographic engineering Eugene Pilyankevich, Chief Technical officer, Cossack Labs Data breaches, annually 1093 419 447 614 783 781 2011 2012 2013 2014 2015

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

TopSec Product Family Voice encryption at the highest security level

TopSec Product Family Voice encryption at the highest security level Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption

More information