Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
|
|
- Alaina Whitehead
- 6 years ago
- Views:
Transcription
1 Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013
2 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000, , , , , Android Symbian ios RIM Microsoft BADA Others Source - Gartner - 3Q2011 WW Tablets Market from ~ 70 million in 2011 growing to 300 million in
3 Use Case #1 Mobile as a token Users want to use their mobile phones as the 2 nd factor authentication device The Mobile phone is a personal token of choice. Always associated to an individual and always with them. Instead of dedicated HW devices (OTP tokens, Smart Cards) Out of Band Authentication Primary use case: Remote access through their laptop / desktop Secondary use cases: Win Logon, Encryption, Signature, Physical Access Third use case: Securing an APP 3
4 Use Case #2 Mobile as a laptop Security solutions on this devices must be at par with security solutions on laptops & desktops BYOD culture becoming prevalent Users want to access corporate resources (regular mail, encrypted mail, online corporate services) through their smart phones and PADs) and they are doing so, whether CIOs/CSOs like it or not! Corporations don t want to constrain their users by imposing restrictive policies Primary Use Cases: Secure Encryption/ decryption, VPN access. Secondary Use Cases: Data at rest encryption, Digital signature, Device un/lock, SSO. 4
5 The Playing Field It is a complex, immature environment for Identity Diversity of: Mobile OS platforms: IOS, Android, Windows phone, Blackberry OS, Symbian Mobile OS versions IOS versions : Android s Gingerbread, Honeycomb, IceCream: Windows Phone 7, 8, Bada(Samsung) Phone vendors: Windows Phone: Nokia, HTC, Samsung Android: Samsung, LG, HTC, SonyEricsson, Options for storage of credentials (Secure Elements) Each one requiring specific drivers for each Mobile platform Middleware Middleware will also be specific to each Mobile OS Applications and application providers? No standard Smart Card support to rely on. PKCS11 seems best option No Base CSP on Windows Phone 7. 5
6 Mobile Platform Technology Solution options Bluetooth reader Software Certificates in Mobile device applications SD Micro Directly connected reader NFC coupled Trusted Security Module/ Trusted Execution Environment CAC/PIV applet embedded in the SIM 6
7 Bluetooth CAC reader Working today in DoD cumbersome, battery life issues, only Blackberry, expensive Blackberry OS controlled by RIM Bluetooth CAC integration achieved with RIM collaboration in O/S Blackberry Smart Card Reader Apriva BT200 Bluetooth reader 7
8 Bluetooth CAC/PIV readers with other handsets?? 8
9 Software Certificates Not an LOA4 option Soft cert considered LOA3 These certificates can be loaded into Apps such as Touchdown (Activesync ) and browsers to enable secure use of mobile. Creates a duality of credentials (One encryption cert; two signing certs) In the PIV/CAC. In the phone. FIPS 201-2, SP to define derived credential policy 9
10 Connected Reader for secure services Attach a simple reader via the Apple port in USB mode or to an Android via micro USB connector in USB mode Uses existing CAC or PIV full form factor Smart Card Requires O/S integration; & Brower support etc Low cost reader. No extra credentials needed Physically cumbersome? 10
11 CAC/PIV via NFC Phone for secure services With an NFC enabled smart phone the CAC/PIV could be connected and utilized in close proximity Uses existing CAC or PIV full form factor Smart Card Requires NFC integration into Operating System; & Brower support etc No extra credentials needed Physically easy but a little practical to hold card next to phone FIPS201-2 introduces Virtual Contact Interface for NFC operation Challenges with FIPS140-2 power-up self tests and NFC timeouts Not all NFC phones act as a reader most are acting as cards Power/Battery life issues 11
12 Solutions SD Micro integration Combine CAC/PIV chip on SD Micro device No Mobile operator involvement (no SIM impact) Handset middleware support required. SDMicro not universally supported on all handsets (Not on Apple platforms) How to provision CAC/PIV applet? On SDMicro on Laptop or via the Data connection? Needs a specific App on the phone NFC can be provided on SD Micro form factor too 12
13 Securing Mobile applications (Apps) " Software to be executed must to be secured (code and data such as cryptographic keys) Principle: isolation in a secure environment 1. Use of Trusted Execution Environment (TEE) 2. Use of external component: Secure Element " User Interface must to be secured Sensitive information entry (e.g. password) Transaction data to be validated (e.g. transaction amount) Principle: Trusted User Interface via Trusted Execution Environment 13
14 Integration into Trusted Execution Environment Gemalto, ARM and Giesecke & Devrient are forming a joint venture to offer an open software-hardware security platform to provide a Trusted Execution Environment in connected devices Trusted Execution Environment Protects input and output and transient processing of sensitive data Applicable to a broad array of new connected devices Secure Element (Removable or Embedded) Certified tamper-resistant For secure storage and processing of the most valuable and sensitive data 14
15 Solutions Mobile CAC/PIV in SIM Physical Access & Remote services 15
16 SIM/UICC architecture UICC MNO TSM Keys Security Domain 1 Vendor TSM Keys Security Domain 2 Vendor TSM Keys PIV Security Domain PIV TSM Keys Vendor App 1-1 Vendor App 1-2 Vendor App 2-1 Vendor App 2-2 PIV Applet 16
17 Provisioning & usage 17
18 Government/Enterprise owned TSM, IDM, CA & CMS xmno Government/Enterprise Owned API Exposure Point External PKI Certification Authority PKI 18
19 Mobile Operating Systems IOS controlled by Apple tightly. Android Led by Google Open source. NFC supported Windows Mobile Controlled by Microsoft Blackberry OS Controlled by RIM All require support for PKI credentials where ever stored/implemented.
20 Mobile Apps Within the Identity Ecosystem there will be different levels of Identity Assurance credentials. For example: LOA4 Digital PKI Credential in hardware + PIN LOA3 Soft PKI Certs with PIN (in app) LOA2 Username/Password + OTP LOA1 Username/Password (in app)
21 Where to store the Identity credentials? Badge via NFC MicroSD Software Apps TEE UICC ese Hardware Embedded Credentials Semidetached credentials Badge via Bluetooth Badge via Mobile Contact reader Detached credentials 21
22 Secure Element Options 22
23 Conclusion Mobiles and how they fit into the Identity Ecosystem There are several implementation options emerging which address a subset of the problem space. Use cases will drive the adoption, along with various LOA credentials Requirements must be defined for each LOA credential. Handsets; Operating Systems; Mobile Operators; Provisioning, Management, soft or hard etc Security Policies critical for technology selection and secure trusted implementations. Standard are needed for implementation and interoperability 23
24 Neville Pattinson SVP Government Sales, Gemalto, Inc. Office Mobile Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ (800)
IDGo Middleware and SDK for Mobile Devices
Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationIdentity and Authentication PKI Portfolio
Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime
More informationJrsys Mobile Banking Solutions
Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile
More informationFIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013
FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS
More informationFIPS and Mobility (SP Derived PIV Credentials) Sal Francomacaro FIPS201/PIV Team NIST ITL Computer Security Division
FIPS 201-2 and Mobility (SP 800-157 Derived PIV Credentials) Sal Francomacaro FIPS201/PIV Team NIST ITL Computer Security Division salfra@nist.gov 2013 Smart Card Alliance Member Meeting Coral Gables,
More informationSecuring Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication Strong Authentication is the Foundation for Securing Mobile Access Executive Summary The consumerization
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationDefense Manpower Data Center CAC/PKI NFC
Defense Manpower Data Center CAC/PKI NFC Bob Gilson Jonathan Shu cacsupport@mail.mil Sep 2012 2 Authentication in the US Government US Government employees must use Personal Iden7ty Verifica7on (PIV) smart
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationSafeNet MobilePKI for BlackBerry V1.2. Administration Guide
SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have
More informationAn Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication
An Overview of Draft SP 800-157 Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov
More informationStrong Authentication for Physical Access using Mobile Devices
Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationhidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL
Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION
ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION A Guide to Meet NIST SP 800-157 Requirements +1-888-690-2424 entrust.com Table of contents The Need for Mobile Credentials Page 3 Entrust Datacard: The
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationSmart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012
Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationCertificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between
Certificate Enrollment- and Signing Services for the Cloud A behind-the-scenes presentation of a successful cooperation between Introduction Based on our experience and the request from the market we would
More informationJunos Pulse Supported Mobile Platforms
Junos Pulse Supported Mobile Platforms Updated: Dec 10, 2013 VERSION: 5.0R1 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationState of US Mobile Payments (NFC)
State of US Mobile Payments (NFC) (NFC State of the Industry Panel) Chandra Srivastava Business Leader, Visa SCA Mobile & NFC Council 2013 Payments Summit February 6, 2013 Draft - For Discussion Only 1
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationInteragency Advisory Board Meeting Agenda, Wednesday, April 24, 2013
Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationMobile/NFC Security Fundamentals. Secure Elements 101. Smart Card Alliance Webinar March 28, 2013
Mobile/NFC Security Fundamentals Secure Elements 101 Smart Card Alliance Webinar March 28, 2013 Introductions Brent Bowen, INSIDE Secure Chair, Mobile & NFC Council, Smart Card Alliance Mobile & NFC Council
More informationDoD Wireless Smartphone Security Requirements Matrix Version January 2011
DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation
More informationFAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication
FAMILY BROCHURE Gemalto Authenticators Diverse Form Factors for Convenient Strong Diverse Form Factors for Convenient Strong. Offering the broadest range of authentication methods and form factors supported
More informationOperated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA LANL s Multi-Factor Authentication (MFA) Initiatives NLIT Summit 2018 Glen Lee Network and Infrastructure Engineering
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationJUNIPER NETWORKS PRODUCT BULLETIN
PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable
More informationNatural Security Alliance
Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationGSM Association (GSMA) Mobile Ticketing Initiative
GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative
More informationOverview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT
DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor
More informationDissecting NIST Digital Identity Guidelines
Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationIndeed Card Management Smart card lifecycle management system
Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These
More informationMobile Derived Credentials Purebred Information Brief
Mobile Derived Credentials Purebred Information Brief Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the
More informationMAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User
More informationSecure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices
Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco
More informationPractical Attack Scenarios on Secure Element-enabled Mobile Devices
Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March
More informationEXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD
More informationNFC Payment Solutions for Transit
NFC Payment Solutions for Transit Easing Regional Mobility David dekozan Vice President, Strategic Initiatives, CTS Worldwide June 4, 2014 Transit in Transition TVM, retail outlet, mail Open Payment Card
More informationSecure Lightweight Activation and Lifecycle Management
Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationUsing Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager
Using Workspace ONE PIV-D Manager VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationLeveraging HSPD-12 to Meet E-authentication E
Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy
More informationSSH Communications Tectia SSH
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationNFC embedded microsd smart Card - Mobile ticketing opportunities in Transit
NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical
More informationiclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationEntrust Soft Token User Guide. About Entrust Soft Tokens. Installing the Soft Token on a device
Entrust Soft Token User Guide Information Technology Division This guide should be used to learn how to set-up and use an Entrust soft token on your mobile device. Last revised: April 2017 Last reviewed:
More informationSecuring the System with TrustZone Ready Program Securing your Digital World. Secure Services Division
Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1 ARM Secure Services Division Established in Q4 2010 To enable a market for secure applications and
More informationImporting your or Personal Authentication certificate to Android Devices
Personal Authentication Certificates Importing your Email or Personal Authentication certificate to Android Devices This document explains how you can import your CPAC/Email onto Android devices. Background
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationDr. Jassine Boulkheir International Sales and Marketing Manager
Dr. Jassine Boulkheir International Sales and Marketing Manager ybo@bit4id.com www.bit4id.com About BIT4ID Established in 2004 with headquarters in Italy, Bit4id was born to make simple, secure and consistent
More informationEND OF SALE ANNOUNCEMENT
Gemalto IDPrime.Net /.Net Bio Smart Cards END OF SALE ANNOUNCEMENT The purpose of this bulletin is to announce End-of-Sale (EOS) and Last-Time-Buy (LTB) plans for Gemalto s IDPrime.Net and IDPrime.Net
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.
ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet
More informationGuardium UI Login using a Smart card
IBM Security Guardium Guardium UI Login using a Smart card Overview Guardium Smart card support meets the United States government mandate that all vendors must support multi-factor authentication for
More informationHCE security implications. Analyzing the security aspects of HCE
HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:
More informationThis version of the IDGo 800 middleware contains the following components: IDGo 800 Credential Provider build 01
What s New? Now Supported Doc Ref: D1379783A Date: October 16, 2015 This document presents information about the IDGo 800 V1.2.4-01 for Windows middleware. It shows what has changed since IDGo 800 V1.2.3-04.
More informationGUIDE. Mobiles and Tablets
GUIDE Mobiles and Tablets While there will be some individuals who retain both a personal PC and a tablet, especially those who use either or both for work and play, most will be satisfied with the experience
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationWhite Paper Implementing mobile electronic identity
Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing
More informationState of the Industry and Councils Reports. Access Control Council
State of the Industry and Councils Reports Access Control Council Chairman: Lars R. Suneborn, Sr. Manager, Technical Marketing, Government ID, Oberthur Technologies Property of the Smart Card Alliance
More informationApple Product Security
Apple Product Security Meeting IT Security Needs Fed/Ed XIV Washington,DC - December 14, 2006 Shawn Geddis Enterprise Security Consulting Engineer geddis@apple.com December 2006 Certificates and Keys Everywhere
More informationEnd User Device Strategy: Interoperability Standards
End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and
More informationCreating Trust in a Highly Mobile World
Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security
More informationIntel and Symantec: Improving performance, security, manageability and data protection
Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO
ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium
More informationArchitecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions
SecureToken Architecture 1 3 2 32-bit microprocessor smart chip Support onboard RSA key pair generation Built-in advanced cryptographic functions 4 5 6 7 8 9 10 Support onboard digital signing Supports
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationJunos Pulse Supported Mobile Platforms
Junos Pulse Supported Mobile Platforms Updated: Sept 21, 2012 VERSION: 12.09R21.01 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible
More informationThe Innovation Connection: How NFC is Driving New Global Opportunities. Koichi Tagawa Sony Chairman, NFC Forum
The Innovation Connection: How NFC is Driving New Global Opportunities Koichi Tagawa Sony Chairman, NFC Forum NFC World Congress September 19, 2011 Marketplace Situation 2 Global Market Developments Business
More informationSmart Cards, Tokens, Security And Applications
Smart Cards, Tokens, Security And Applications ComSignTrust e-signature Smart Card Tokens - ComSignTrust e-signature Smart Card Tokens - Gemalto, the world leader in digital security and ComSignTrust (CST),
More informationMobile Handset Population in Finland
Mobile Handset Population in Finland 2005-2010 Antti Riikonen Aalto University March 3 rd, 2011 MoMIE: Comprehensive view on mobile service usage HANDSET POPULATION MoMIE RESEARCH: Surveys on handset panel
More informationPLATFORM CONVERGENCE JOURNEY
Windows 10 Client PLATFORM CONVERGENCE JOURNEY Converged OS kernel Converged app model Windows 10 DEPLOYMENT CHOICES Wipe-and-Load In-Place Provisioning Traditional process Capture data and settings
More informationAdding value to your MS customers
Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,
More informationVMware PIV-D Manager Deployment Guide
VMware PIV-D Manager Deployment Guide AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected
More informationTo configure Exchange ActiveSync on the device the following information is needed.
Smart Device Syncing Practices The Novell Data Synchronizer for Mobility is the product used to synchronize GroupWise mail, contacts and calendar items to a mobile device. First the GroupWise account must
More informationJunos Pulse Supported Mobile Platforms
Junos Pulse Supported Mobile Platforms Updated: Sep 19, 2013 Copyright 2013, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform... 1 Related
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationAugust, Actividentity CTO Office
The Open Protocol for Access Control Identification and Ticketing with PrivacY For the Secure Enablement of converged Access and Contactless Transactions August, 2010 Actividentity CTO Office 2 What is
More information