AUTHENTICATION FOR STRATEGISTS AND POLICY MAKERS ! "# & $ & * +$(#, * - *. * / * * 0) $' & $ & Lockstep IQPC E-Govt Evo Workshop Mar06 HANDOUTS.

Size: px
Start display at page:

Download "AUTHENTICATION FOR STRATEGISTS AND POLICY MAKERS ! "# & $ & * +$(#, * - *. * / * * 0) $' & $ & Lockstep IQPC E-Govt Evo Workshop Mar06 HANDOUTS."

Transcription

1 ! "# $% & $ & () * +$(#, * - *. * / * * 0) $' & $ &

2 % 2 3#)$ ) $, 4 3 $566! / 7 * 3 * * 839 $' & $ & 1 3 $ * 3 3 * 3;< *. 89 * =$(5!!66 * > & $' & $ & :

3 3 * 0 # ;A03B&< * ))+$ * / C#$ D # D # )$ * ;@$ $< $) $' & $ &? 3 $' & $ &

4 30 * 3 * * A ;E< * 0 > * 3 0 7B 8@9 =5666 $7FF)))44 F$ F$#FG $' & $ &! %) C)$ $ ) )#) 4() 4 $' & $ & H

5 . $' & $ & 6 #, EOI Verify Authenticator Presentation Service Process Who is it? Credentials? Entitlements? Currency? $' & $ & 5

6 3$ #, Contract? Presentation Process Process Entitlements? Arrangements? Trust? Interoperability? Lifecycle? Service $' & $ & 55 $ * * D 30 * = * (3) * >B$ * - * $' & $ & 5

7 89 #, Pass-phrase Service Compare Fido Fido9 nehpets Jackson password <null> $' & $ & 51 D 30 #, Identifier Next number Compare Service $' & $ & 5:

8 = #, Measure Filter Digitise Algorithm Compare Service Template storage Template availability Accuracy Processing time $' & $ & 5? (3) #, 3 Identifier Pseudo random number Compare Service $' & $ & 5

9 8B$ 9 #, B0 Identifier Challenge Encrypt Response Compare Service $' & $ & 5! - #, B0 Identifier Transform Challenge Response Compare Service $' & $ & 5H

10 B$ #, B0 SMS Repeat Compare Service $' & $ & 56 #, & B) - Audit - Dispute Resolution - Re-wind Presentation $' & $ & Service Service Who did what to whom? - Transaction logs - Audit logs - Credentials d/b - Forensic investigation

11 #, / > Presentation Service Persistence over: - Time and - Distance $' & $ & 5 * * A03B&7 Electronic signature means data in electronic form in, affixed to or logically associated with, a data message, which may be used to identify the signatory in relation to the data message and to indicate the signatory s approval of the information contained in the data message $' & $ &

12 (3 > 10 Signature Requirement for signature (1) If, under a law of the Commonwealth, the signature of a person is required, that requirement is taken to have been met in relation to an electronic communication if: (a) in all cases a method is used to identify the person and to indicate the person s approval of the information communicated; and (b) in all cases having regard to all the relevant circumstances at the time the method was used, the method was as reliable as was appropriate for the purposes for which the information was communicated; and $' & $ & 1 > A03B&7 Enhanced electronic signature means an electronic signature in respect of which it can be shown, through the use of a security procedure, that the signature: (i) is unique to the signature holder for the purpose for which it is used; (ii) was created and affixed to the data message by the signature holder or using a means under the sole control of the signature holder; (iii) was created and is linked to the data message to which it relates in a manner which provides reliable assurance as to the integrity of the message $' & $ & :

13 / * # $ $#$ $ * * I # $ D 44$ $' & $ &? # * $ * * B$ $' & $ &

14 = $ *.$B;.B< D. D. D 3$ *.B,B;.BB< D.0 D 3$5 *. B2 D #J D J # $ $' & $ &! MEASURE FILTER DIGITISE ANALYSE DATABASE LOOK-UP Yes/No Dirt, sensor damage Angle / pressure / volume Injury, ageing Environmental noise Sensor error Sensor-to-sensor variation Filtering Modeling assumptions $' & $ & H

15 .B>.BB K$ MEASURE FILTER DIGITISE ANALYSE LOOK-UP No K MEASURE FILTER DIGITISE ANALYSE LOOK-UP Yes $' & $ & 6 = * $ * ) $ * 55$$#!>5L! Matsumoto et al Imact of Artificial Gummy Fingers on Fingerprint Systems Proceedings of SPIE Vol $' & $ & 1

16 = $ 3.BB.B.$.M: L L..MB3 5>L 5L M 03 5>L >?L.MN.$M $ B.B3N.B M 3 03N0 3 $' & $ & 15 /% Reference: Biometric Authentication Technologies: Hype Meets the Test Results Jim Wayman San Jose State University, 2002 $' & $ & 1

17 AI$ (3 O5"#,;4!?#< 3 3 ;#< ;#< L?H!H 6 L.!1 H H5L? $' & $ & 11 = + * $ 2 *. * * -$ >$ * $7FF)))44FFFF55F55:F * $7FF)))4)#44FF * $7FF$ 4 F4 $' & $ & 1:

18 / $' & $ & 1? K ) 2 * &2 D & )>>K D >=>= D = P>> $' & $ & 1

19 K ) 2 * / )# 2 * 44K $ ) D ( D ( D (#J * =J D ## D D D K) $' & $ & 1! B 54 D # $2 D $ 2 4 $ D $ 2 D #2 14 & D # 2 D K ) 2 $' & $ & 1H

20 4B;5< > D 3 ; " "$< D D + D 8 39 $' & $ & 16 4B;< >$ D ;(< 5$ ;2< D ;/M< D 0 ;# 2< D I )Q 44 $' & $ & :

21 4B;1< D * 3). * * = #8 9 ;2< D * ) ;# < D # D K$ $' & $ & :5 # 54 3). D ) " 4 D $ "$ D :4 B #?4 B# 4 ;$ $$< $' & $ & :

22 $$# B #2 2.;?< B#;?< 5 RRRRR RRRR = R RR - 5 R RRRRR RRRRR RRR (34 R RRRRR I RRRRR RRRRR $' & $ & :1 $' & $ & ::

23 # PUBLIC READ_MAG1 EXTERN MD1_SEF (XDATA) ;buffer EXTERN XP (BIT) ;present EXTERN M1_CLK (BIT) ;clk bit M1_SS EQU 5 ;start sentinel M1_ES EQU 1FH ;end sentinel SEG CODE READ_1 PROC CALL MAG_ JZ L?RM1 CALL L?RM1: RET MAG_SAMP PROC MOV DPTR,#MS1_BUF MOV R1, ;sample ctr L?MS1: MOV R0,#8 ;bit start L?MS2: JB CP,L?MS4 JB M1_CLK,L?MS2 MOV C,M1_DQ L?MS3: JNB M1_CLK,L?MS3 INC DP INC R1 sample counter CJNE R1,IM,L?MS1 L?MS4: MOV A,R1 ;final counter $' & $ & :? # $' & $ & :

24 ) :7 ;<?! A 1L$ $ S56L $:7 Non-lending losses increased [through 2004] with higher levels of phishing and cheque fraud =. #".B.Q:?7 =$ $$ L T?7 ASIC issues alert as phishing reports double $7FF)4 4 F5>!1:6G1>?1:5??4 $7FF#P4 4 F#)F? 1F1?65424L1/5 $7FF)))4$4 F%GGGB$ G$G?4$ $' & $ & :! 3)#2 $' & $ & :H

25 3$ # E 3& M ) $7FF)))44 4 F F:F 6:4 $7FF)))44 4 F F:F 4F $' & $ & :6 The Failure of Two-Factor Authentication [Regular] Two-factor authentication won t work for remote authentication over the Internet =$ >? )))44 F$ >>?14U $' & $ &?

26 A # NIST Special Publication v1.0.1 Level 4 remote authentication 2 factors: hard token Must resist eavesdroppers Must resist man-in-the-middle attacks Only practical solution today uses PKI ==" "03.#? $7FF>$ 4 F#G F03G=4$ $' & $ &?5 M # Inquiry into Fraud and E-Commerce, Drugs and Crime Prevention Committee, 2004 The Victorian government should support the early roll-out of EMV standard computer-chip plastic cards for use in electronic transactions B 5H"$5!6 )))4$44 4F$FB$ F/G. G?>5>:4$ $' & $ &?

27 54K&&0 4B(0 %# $' & $ &?1 ; 4< K $' & $ &?:

28 0 3). E One reason phishing attacks are successful is that unsuspecting customers cannot determine they are being directed to spoofed Web sites during the collection stage of an attack. Digital certificate authentication is generally considered one of the stronger authentication technologies, and mutual authentication provides a defence against phishing and similar attacks. A.. - S)))44 F$F$55?4 $' & $ &?? 54K&&0 4B(0 K $' & $ &?

29 . $' & $ &?! &#.7 8 ) #) ) $ 9 8$"# # $ )# # P$ ) >" ) $$) 9 )))4$,#4 $' & $ &?H

30 * &# * ## * & D $& * " "/" $' & $ &?6 * / D = $$4 * K )> 2 D%C 2 * ) $ 2 D( ) $2 $' & $ &

31 I $' & $ & 5 IC * D = $ * D $ * D I * 80 >$ 9 D $' & $ &

32 IC# 54 3$" 8) ) ) 9 4 /# ); < 44"" 14 I8 $ V $$+,W 9 ==;03<I. "3 ".#? $7FF>$ 4 F#G F03G=4$ $' & $ & 1 A ;5< (I 8$$ 9 0)I # $> B $$ > (7$# >P> > > > /$ $==$$ ; " $ "J< $" #< - ## $' & $ & :

33 A ;< /4$I; >3.IX%< 8. #"$$ $$ ") -$49 I. "3$"$#? $' & $ &? 7 $ Security Printer Distribute bar codes Listing Rules Listings Satisfy Listing Rules & $ - Announcements Announcement Fax $' & $ &

34 7 $;< Distribute certificate Listing Rules Listings Satisfy Listing Rules & $ - Announcements Announcement Eform $' & $ &! I#$ * A+3( 5L XYNY $4 * * K * &M (#F * AI$+0M * #&##I> $# - * A.>5$ $' & $ & H

35 Bill Gates January 2003: Over time we expect most businesses will go to smart card ID 77M 65M 48M 100M Bill Gates February 2006: The password is dead New Queensland Driver Licence weeks Dell Latitude with built-in smartcard reader 04 26M UK Chip and PIN rollout $' & $ & 6 05 Smart Medicare card 06? Human Services smartcard?? =B5:FF 8 ) 43 " )C$) "$) $) CJ ) 4 )#>> $$$ J C ## V% )W49 )))4 4 F#F$F F>5:B 4$ $' & $ &!

36 # 7 Z 0[. T$7 5 K I 7 : B3; < A7 : / / ;5:MQ < 5H M+- 3)7 AI7 55 $+0 M #716;$?L T?< $' & $ &!5 ( ;5</ $$ Prescription EVENT SUMMARY Sig (Dr) ;<( Test EVENT SUMMARY Sig (Dr) Sig (Pt Card) Medicare $' & $ &!

37 = * * # * $ ) ;$$$ $ < * # " ) $ $ * $ 8 $ V $$,W 9 * 4 $' & $ &!1 J 2203 $' & $ &!:

38 J E $' & $ &!?. * )))4 $4 4F# * )))4$ 4 F * $44 * )))4$4 $' & $ &!

39 / $% & $ ) \ $4 4 :5::HHH?5 $' & $ &!!

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking Optimised to Fail: Card Readers for Online Banking Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org Financial Cryptography

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Payment Security: Attacks & Defences

Payment Security: Attacks & Defences Payment Security: Attacks & Defences Dr Steven J Murdoch University College London COMPGA03, 2014-12-02 UK fraud is going up again Chip & PIN deployment period Losses ( m) 0 50 100 150 200 250 300 Card

More information

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,

More information

Smart Cards, Tokens, Security And Applications

Smart Cards, Tokens, Security And Applications Smart Cards, Tokens, Security And Applications ComSignTrust e-signature Smart Card Tokens - ComSignTrust e-signature Smart Card Tokens - Gemalto, the world leader in digital security and ComSignTrust (CST),

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

Towards a uniform solution to identity theft

Towards a uniform solution to identity theft Towards a uniform solution to identity theft November 2006 (V2.1) Lockstep Technologies www.lockstep.com.au Everybody s talking about identity theft. And many banks and other institutions are doing something

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards

More information

Advanced Crypto. Introduction. 5. Disk Encryption. Author: Prof Bill Buchanan. Bob. Alice. Eve.

Advanced Crypto. Introduction. 5. Disk Encryption.   Author: Prof Bill Buchanan. Bob. Alice. Eve. Advanced Crypto Bob Alice 5. Disk Encryption Eve Introduction Trent http://asecuritysite.com/crypto Market Microsoft Bitlocker File/Folder Encryption Disk Encryption Check Point Full Disk Encryption Software

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE Verifi ENTERPRISE Start Here IMPORTANT. Always install the Software prior to Hardware Installation Quick Installation Guide Windows XP Fast User Switching Compatible QAS 097 022505 PG1 RA About the Reader

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Development Authority of the North Country Governance Policies

Development Authority of the North Country Governance Policies Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...

More information

Digital Identity Modelling and Management

Digital Identity Modelling and Management Digital Identity Modelling and Management by Sittampalam Subenthiran Supervisor Dr Johnson Agbinya Thesis submitted to the University of Technology, Sydney in total fulfilment of the requirement for the

More information

How I Learned to Stop Worrying and Love the Internet of Things

How I Learned to Stop Worrying and Love the Internet of Things SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity

More information

Comodo Authentication Solutions Overview

Comodo Authentication Solutions Overview Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates Mutual Authentication Foreword Conducting business online offers

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

System to assure authentication and transaction security. Presentation of the concept and product May 2009

System to assure authentication and transaction security. Presentation of the concept and product May 2009 System to assure authentication and transaction security Presentation of the concept and product May 2009 AXSionics AG, Neumarktstrasse 27, 2503 Biel, Switzerland Information: Dr. Lorenz Müller Lorenz.mueller@axsionics.ch

More information

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

The PKI Lie. The OWASP Foundation  Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name:_Gale_Cengage Learning Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Lecture 9. Authentication & Key Distribution

Lecture 9. Authentication & Key Distribution Lecture 9 Authentication & Key Distribution 1 Where are we now? We know a bit of the following: Conventional (symmetric) cryptography Hash functions and MACs Public key (asymmetric) cryptography Encryption

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Dissecting NIST Digital Identity Guidelines

Dissecting NIST Digital Identity Guidelines Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Electronic Signature Systems

Electronic Signature Systems Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document

More information

Authentication and Fraud Detection Buyer s Guide

Authentication and Fraud Detection Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric

More information

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

Measuring Authentication: NIST and Vectors of Trust

Measuring Authentication: NIST and Vectors of Trust SESSION ID: IDY-F01 Measuring Authentication: NIST 800-63 and Vectors of Trust auth Sarah Squire Senior Identity Solution Architect Engage Identity @SarahKSquire Eyewitness News 3 A Play in Five Acts

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

InCommon Federation: Participant Operational Practices

InCommon Federation: Participant Operational Practices InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity

More information

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS)

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3.1 Introduction In any public key infrastructure deployment, the protection of private key material (application keys) associated with the public/private

More information

Security of the Lin-Lai smart card based user authentication scheme

Security of the Lin-Lai smart card based user authentication scheme Security of the Lin-Lai smart card based user authentication scheme Chris J. Mitchell and Qiang Tang Technical Report RHUL MA 2005 1 27 January 2005 Royal Holloway University of London Department of Mathematics

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

Interagency Advisory Board Meeting Agenda, March 5, 2009

Interagency Advisory Board Meeting Agenda, March 5, 2009 Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Acadia University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena

Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall 2009 Nitesh Saxena *Adopted from a previous lecture by Gene Tsudik Course Admin HW3 Problem 3 due Friday midnight

More information

Who What Why

Who What Why Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico 1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking PIN Optimised to Fail: Card Readers for Online Banking SecureBank Inc. login: Vic Tim code: 7365 5748 PIN $20 Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Mobile Identity Management

Mobile Identity Management Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

ACH Clearing Rules. Guidance Note No. 5 NEW CLIENTS ELECTRONIC CLIENT AGREEMENTS KEY TOPICS ACH CLEARING RULES. Guidance Note History.

ACH Clearing Rules. Guidance Note No. 5 NEW CLIENTS ELECTRONIC CLIENT AGREEMENTS KEY TOPICS ACH CLEARING RULES. Guidance Note History. ACH Clearing Rules Guidance Note No. 5 KEY TOPICS 1. Conditions 2. Electronic Methods 3. Written Agreement. 4. Requirement for a signature 5. The method must be as reliable as appropriate in the circumstances

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

ASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan

ASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Best Practice In Data Security

More information

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing Chapter 6: Digital Certificates Introduction Methods PKI Digital Certificate Passing Prof Bill Buchanan OBE http://asecuritysite.com/crypto06 http://asecuritysite.com/encryption Identity on the Internet

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

Design and Implementation of a RFC3161-Enhanced Time-Stamping Service

Design and Implementation of a RFC3161-Enhanced Time-Stamping Service Design and Implementation of a RFC3161-Enhanced Time-Stamping Service Chung-Huang Yang, 1 Chih-Ching Yeh, 2 and Fang-Dar Chu 3 1 Institute of Information and Computer Education, National Kaohsiung Normal

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

2. Write an 8051 program to generate a square wave of 25 khz at pin P2.3 using XTAL = 12 MHz. Solution:

2. Write an 8051 program to generate a square wave of 25 khz at pin P2.3 using XTAL = 12 MHz. Solution: Assignment 2 1. Assume that 5 binary data items are stored in RAM locations starting at 50h, as shown below. Write a program to find the sum of all the numbers. The calculation is in 16-bit format and

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD

More information

IBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure

IBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure IBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure Dr. Manfred Gnirss IBM Client Center, Boeblingen 21.3.2018 2 Trademarks The following are trademarks

More information

Control Transfer Instructions Jump, Loop, and Call. ECE473/573 Microprocessor System Design, Dr. Shiue

Control Transfer Instructions Jump, Loop, and Call. ECE473/573 Microprocessor System Design, Dr. Shiue Control Transfer Instructions Jump, Loop, and Call 1 Jump Instructions JZ label ; Jump if A=0 JNZ label ; Jump if A!=0 DJNZ reg, label ; Decrement and Jump if A (or reg.)!=0 CJNE A, byte ; Compare and

More information

Fingerprint Please...

Fingerprint Please... Alex Dunn Fingerprint Please... Is the government storing your personal information? Fingerprint Please... Alex Dunn Touch ID is a recognition feature which requires the finger being scanned. This allows

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

Overview of cryptovision's eid Product Offering. Presentation & Demo

Overview of cryptovision's eid Product Offering. Presentation & Demo Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information

Business ebanking Online Wire Transfers

Business ebanking Online Wire Transfers Business ebanking Online Wire Transfers This guide instructs users how to originate Wire transfers through Business ebanking. If you need support, please contact Treasury Services Support at (877) 920

More information

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19, Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Transparent Multi-Factor Authentication June 2015 910 E HAMILTON AVENUE. SUITE 430. CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview...

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

The Need for Biometric Authentication

The Need for Biometric Authentication The Need for Biometric Authentication Presented previously at: InfoTec 2002 DefCon 10 in Las Vegas NebraskaCERT 2002 Mutual of Omaha ConAgra Foods Presented by: Nate Rotschafer Peter Kiewit Institute Revised:

More information

Past & Future Issues in Smartcard Industry

Past & Future Issues in Smartcard Industry Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Okanagan College Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

DigitalPersona Altus. Solution Guide

DigitalPersona Altus. Solution Guide DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona

More information

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr. Applied IT Security Device Security Dr. Stephan Spitz Stephan.Spitz@gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System Security

More information