AUTHENTICATION FOR STRATEGISTS AND POLICY MAKERS ! "# & $ & * +$(#, * - *. * / * * 0) $' & $ & Lockstep IQPC E-Govt Evo Workshop Mar06 HANDOUTS.
|
|
- Silvia Ward
- 5 years ago
- Views:
Transcription
1 ! "# $% & $ & () * +$(#, * - *. * / * * 0) $' & $ &
2 % 2 3#)$ ) $, 4 3 $566! / 7 * 3 * * 839 $' & $ & 1 3 $ * 3 3 * 3;< *. 89 * =$(5!!66 * > & $' & $ & :
3 3 * 0 # ;A03B&< * ))+$ * / C#$ D # D # )$ * ;@$ $< $) $' & $ &? 3 $' & $ &
4 30 * 3 * * A ;E< * 0 > * 3 0 7B 8@9 =5666 $7FF)))44 F$ F$#FG $' & $ &! %) C)$ $ ) )#) 4() 4 $' & $ & H
5 . $' & $ & 6 #, EOI Verify Authenticator Presentation Service Process Who is it? Credentials? Entitlements? Currency? $' & $ & 5
6 3$ #, Contract? Presentation Process Process Entitlements? Arrangements? Trust? Interoperability? Lifecycle? Service $' & $ & 55 $ * * D 30 * = * (3) * >B$ * - * $' & $ & 5
7 89 #, Pass-phrase Service Compare Fido Fido9 nehpets Jackson password <null> $' & $ & 51 D 30 #, Identifier Next number Compare Service $' & $ & 5:
8 = #, Measure Filter Digitise Algorithm Compare Service Template storage Template availability Accuracy Processing time $' & $ & 5? (3) #, 3 Identifier Pseudo random number Compare Service $' & $ & 5
9 8B$ 9 #, B0 Identifier Challenge Encrypt Response Compare Service $' & $ & 5! - #, B0 Identifier Transform Challenge Response Compare Service $' & $ & 5H
10 B$ #, B0 SMS Repeat Compare Service $' & $ & 56 #, & B) - Audit - Dispute Resolution - Re-wind Presentation $' & $ & Service Service Who did what to whom? - Transaction logs - Audit logs - Credentials d/b - Forensic investigation
11 #, / > Presentation Service Persistence over: - Time and - Distance $' & $ & 5 * * A03B&7 Electronic signature means data in electronic form in, affixed to or logically associated with, a data message, which may be used to identify the signatory in relation to the data message and to indicate the signatory s approval of the information contained in the data message $' & $ &
12 (3 > 10 Signature Requirement for signature (1) If, under a law of the Commonwealth, the signature of a person is required, that requirement is taken to have been met in relation to an electronic communication if: (a) in all cases a method is used to identify the person and to indicate the person s approval of the information communicated; and (b) in all cases having regard to all the relevant circumstances at the time the method was used, the method was as reliable as was appropriate for the purposes for which the information was communicated; and $' & $ & 1 > A03B&7 Enhanced electronic signature means an electronic signature in respect of which it can be shown, through the use of a security procedure, that the signature: (i) is unique to the signature holder for the purpose for which it is used; (ii) was created and affixed to the data message by the signature holder or using a means under the sole control of the signature holder; (iii) was created and is linked to the data message to which it relates in a manner which provides reliable assurance as to the integrity of the message $' & $ & :
13 / * # $ $#$ $ * * I # $ D 44$ $' & $ &? # * $ * * B$ $' & $ &
14 = $ *.$B;.B< D. D. D 3$ *.B,B;.BB< D.0 D 3$5 *. B2 D #J D J # $ $' & $ &! MEASURE FILTER DIGITISE ANALYSE DATABASE LOOK-UP Yes/No Dirt, sensor damage Angle / pressure / volume Injury, ageing Environmental noise Sensor error Sensor-to-sensor variation Filtering Modeling assumptions $' & $ & H
15 .B>.BB K$ MEASURE FILTER DIGITISE ANALYSE LOOK-UP No K MEASURE FILTER DIGITISE ANALYSE LOOK-UP Yes $' & $ & 6 = * $ * ) $ * 55$$#!>5L! Matsumoto et al Imact of Artificial Gummy Fingers on Fingerprint Systems Proceedings of SPIE Vol $' & $ & 1
16 = $ 3.BB.B.$.M: L L..MB3 5>L 5L M 03 5>L >?L.MN.$M $ B.B3N.B M 3 03N0 3 $' & $ & 15 /% Reference: Biometric Authentication Technologies: Hype Meets the Test Results Jim Wayman San Jose State University, 2002 $' & $ & 1
17 AI$ (3 O5"#,;4!?#< 3 3 ;#< ;#< L?H!H 6 L.!1 H H5L? $' & $ & 11 = + * $ 2 *. * * -$ >$ * $7FF)))44FFFF55F55:F * $7FF)))4)#44FF * $7FF$ 4 F4 $' & $ & 1:
18 / $' & $ & 1? K ) 2 * &2 D & )>>K D >=>= D = P>> $' & $ & 1
19 K ) 2 * / )# 2 * 44K $ ) D ( D ( D (#J * =J D ## D D D K) $' & $ & 1! B 54 D # $2 D $ 2 4 $ D $ 2 D #2 14 & D # 2 D K ) 2 $' & $ & 1H
20 4B;5< > D 3 ; " "$< D D + D 8 39 $' & $ & 16 4B;< >$ D ;(< 5$ ;2< D ;/M< D 0 ;# 2< D I )Q 44 $' & $ & :
21 4B;1< D * 3). * * = #8 9 ;2< D * ) ;# < D # D K$ $' & $ & :5 # 54 3). D ) " 4 D $ "$ D :4 B #?4 B# 4 ;$ $$< $' & $ & :
22 $$# B #2 2.;?< B#;?< 5 RRRRR RRRR = R RR - 5 R RRRRR RRRRR RRR (34 R RRRRR I RRRRR RRRRR $' & $ & :1 $' & $ & ::
23 # PUBLIC READ_MAG1 EXTERN MD1_SEF (XDATA) ;buffer EXTERN XP (BIT) ;present EXTERN M1_CLK (BIT) ;clk bit M1_SS EQU 5 ;start sentinel M1_ES EQU 1FH ;end sentinel SEG CODE READ_1 PROC CALL MAG_ JZ L?RM1 CALL L?RM1: RET MAG_SAMP PROC MOV DPTR,#MS1_BUF MOV R1, ;sample ctr L?MS1: MOV R0,#8 ;bit start L?MS2: JB CP,L?MS4 JB M1_CLK,L?MS2 MOV C,M1_DQ L?MS3: JNB M1_CLK,L?MS3 INC DP INC R1 sample counter CJNE R1,IM,L?MS1 L?MS4: MOV A,R1 ;final counter $' & $ & :? # $' & $ & :
24 ) :7 ;<?! A 1L$ $ S56L $:7 Non-lending losses increased [through 2004] with higher levels of phishing and cheque fraud =. #".B.Q:?7 =$ $$ L T?7 ASIC issues alert as phishing reports double $7FF)4 4 F5>!1:6G1>?1:5??4 $7FF#P4 4 F#)F? 1F1?65424L1/5 $7FF)))4$4 F%GGGB$ G$G?4$ $' & $ & :! 3)#2 $' & $ & :H
25 3$ # E 3& M ) $7FF)))44 4 F F:F 6:4 $7FF)))44 4 F F:F 4F $' & $ & :6 The Failure of Two-Factor Authentication [Regular] Two-factor authentication won t work for remote authentication over the Internet =$ >? )))44 F$ >>?14U $' & $ &?
26 A # NIST Special Publication v1.0.1 Level 4 remote authentication 2 factors: hard token Must resist eavesdroppers Must resist man-in-the-middle attacks Only practical solution today uses PKI ==" "03.#? $7FF>$ 4 F#G F03G=4$ $' & $ &?5 M # Inquiry into Fraud and E-Commerce, Drugs and Crime Prevention Committee, 2004 The Victorian government should support the early roll-out of EMV standard computer-chip plastic cards for use in electronic transactions B 5H"$5!6 )))4$44 4F$FB$ F/G. G?>5>:4$ $' & $ &?
27 54K&&0 4B(0 %# $' & $ &?1 ; 4< K $' & $ &?:
28 0 3). E One reason phishing attacks are successful is that unsuspecting customers cannot determine they are being directed to spoofed Web sites during the collection stage of an attack. Digital certificate authentication is generally considered one of the stronger authentication technologies, and mutual authentication provides a defence against phishing and similar attacks. A.. - S)))44 F$F$55?4 $' & $ &?? 54K&&0 4B(0 K $' & $ &?
29 . $' & $ &?! &#.7 8 ) #) ) $ 9 8$"# # $ )# # P$ ) >" ) $$) 9 )))4$,#4 $' & $ &?H
30 * &# * ## * & D $& * " "/" $' & $ &?6 * / D = $$4 * K )> 2 D%C 2 * ) $ 2 D( ) $2 $' & $ &
31 I $' & $ & 5 IC * D = $ * D $ * D I * 80 >$ 9 D $' & $ &
32 IC# 54 3$" 8) ) ) 9 4 /# ); < 44"" 14 I8 $ V $$+,W 9 ==;03<I. "3 ".#? $7FF>$ 4 F#G F03G=4$ $' & $ & 1 A ;5< (I 8$$ 9 0)I # $> B $$ > (7$# >P> > > > /$ $==$$ ; " $ "J< $" #< - ## $' & $ & :
33 A ;< /4$I; >3.IX%< 8. #"$$ $$ ") -$49 I. "3$"$#? $' & $ &? 7 $ Security Printer Distribute bar codes Listing Rules Listings Satisfy Listing Rules & $ - Announcements Announcement Fax $' & $ &
34 7 $;< Distribute certificate Listing Rules Listings Satisfy Listing Rules & $ - Announcements Announcement Eform $' & $ &! I#$ * A+3( 5L XYNY $4 * * K * &M (#F * AI$+0M * #&##I> $# - * A.>5$ $' & $ & H
35 Bill Gates January 2003: Over time we expect most businesses will go to smart card ID 77M 65M 48M 100M Bill Gates February 2006: The password is dead New Queensland Driver Licence weeks Dell Latitude with built-in smartcard reader 04 26M UK Chip and PIN rollout $' & $ & 6 05 Smart Medicare card 06? Human Services smartcard?? =B5:FF 8 ) 43 " )C$) "$) $) CJ ) 4 )#>> $$$ J C ## V% )W49 )))4 4 F#F$F F>5:B 4$ $' & $ &!
36 # 7 Z 0[. T$7 5 K I 7 : B3; < A7 : / / ;5:MQ < 5H M+- 3)7 AI7 55 $+0 M #716;$?L T?< $' & $ &!5 ( ;5</ $$ Prescription EVENT SUMMARY Sig (Dr) ;<( Test EVENT SUMMARY Sig (Dr) Sig (Pt Card) Medicare $' & $ &!
37 = * * # * $ ) ;$$$ $ < * # " ) $ $ * $ 8 $ V $$,W 9 * 4 $' & $ &!1 J 2203 $' & $ &!:
38 J E $' & $ &!?. * )))4 $4 4F# * )))4$ 4 F * $44 * )))4$4 $' & $ &!
39 / $% & $ ) \ $4 4 :5::HHH?5 $' & $ &!!
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationOptimised to Fail: Card Readers for Online Banking
Optimised to Fail: Card Readers for Online Banking Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org Financial Cryptography
More informationSystem-Level Failures in Security
System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00
More informationInteragency Advisory Board Meeting Agenda, February 2, 2009
Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationPayment Security: Attacks & Defences
Payment Security: Attacks & Defences Dr Steven J Murdoch University College London COMPGA03, 2014-12-02 UK fraud is going up again Chip & PIN deployment period Losses ( m) 0 50 100 150 200 250 300 Card
More informationBiometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS
www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,
More informationSmart Cards, Tokens, Security And Applications
Smart Cards, Tokens, Security And Applications ComSignTrust e-signature Smart Card Tokens - ComSignTrust e-signature Smart Card Tokens - Gemalto, the world leader in digital security and ComSignTrust (CST),
More informationLeveraging the LincPass in USDA
Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass
More informationDoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics
DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military
More informationMobile: Purely a Powerful Platform; Or Panacea?
EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA
More informationTowards a uniform solution to identity theft
Towards a uniform solution to identity theft November 2006 (V2.1) Lockstep Technologies www.lockstep.com.au Everybody s talking about identity theft. And many banks and other institutions are doing something
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationIdentity Management as a Service
Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards
More informationAdvanced Crypto. Introduction. 5. Disk Encryption. Author: Prof Bill Buchanan. Bob. Alice. Eve.
Advanced Crypto Bob Alice 5. Disk Encryption Eve Introduction Trent http://asecuritysite.com/crypto Market Microsoft Bitlocker File/Folder Encryption Disk Encryption Check Point Full Disk Encryption Software
More informationAdobe Sign and 21 CFR Part 11
Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted
More informationStart Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE
Verifi ENTERPRISE Start Here IMPORTANT. Always install the Software prior to Hardware Installation Quick Installation Guide Windows XP Fast User Switching Compatible QAS 097 022505 PG1 RA About the Reader
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationPro s and con s Why pins # s, passwords, smart cards and tokens fail
Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationDevelopment Authority of the North Country Governance Policies
Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...
More informationDigital Identity Modelling and Management
Digital Identity Modelling and Management by Sittampalam Subenthiran Supervisor Dr Johnson Agbinya Thesis submitted to the University of Technology, Sydney in total fulfilment of the requirement for the
More informationHow I Learned to Stop Worrying and Love the Internet of Things
SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity
More informationComodo Authentication Solutions Overview
Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates Mutual Authentication Foreword Conducting business online offers
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationSecure Lightweight Activation and Lifecycle Management
Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution
More informationSystem to assure authentication and transaction security. Presentation of the concept and product May 2009
System to assure authentication and transaction security Presentation of the concept and product May 2009 AXSionics AG, Neumarktstrasse 27, 2503 Biel, Switzerland Information: Dr. Lorenz Müller Lorenz.mueller@axsionics.ch
More informationThe PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference
The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationIDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO
IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Gale_Cengage Learning Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationLecture 9. Authentication & Key Distribution
Lecture 9 Authentication & Key Distribution 1 Where are we now? We know a bit of the following: Conventional (symmetric) cryptography Hash functions and MACs Public key (asymmetric) cryptography Encryption
More informationDFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationDissecting NIST Digital Identity Guidelines
Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationElectronic Signature Systems
Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
More informationBiometric Use Case Models for Personal Identity Verification
Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationAuthentication and Fraud Detection Buyer s Guide
Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric
More informationKey Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature
Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper
More information2 Electronic Passports and Identity Cards
2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional
More informationMeasuring Authentication: NIST and Vectors of Trust
SESSION ID: IDY-F01 Measuring Authentication: NIST 800-63 and Vectors of Trust auth Sarah Squire Senior Identity Solution Architect Engage Identity @SarahKSquire Eyewitness News 3 A Play in Five Acts
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInCommon Federation: Participant Operational Practices
InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity
More information3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS)
3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3.1 Introduction In any public key infrastructure deployment, the protection of private key material (application keys) associated with the public/private
More informationSecurity of the Lin-Lai smart card based user authentication scheme
Security of the Lin-Lai smart card based user authentication scheme Chris J. Mitchell and Qiang Tang Technical Report RHUL MA 2005 1 27 January 2005 Royal Holloway University of London Department of Mathematics
More informationThe Match On Card Technology
Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Acadia University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationLecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena
Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall 2009 Nitesh Saxena *Adopted from a previous lecture by Gene Tsudik Course Admin HW3 Problem 3 due Friday midnight
More informationWho What Why
Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationStop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico
1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become
More informationOptimised to Fail: Card Readers for Online Banking
PIN Optimised to Fail: Card Readers for Online Banking SecureBank Inc. login: Vic Tim code: 7365 5748 PIN $20 Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationMobile Identity Management
Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks
More informationSmart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security
Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds
More informationACH Clearing Rules. Guidance Note No. 5 NEW CLIENTS ELECTRONIC CLIENT AGREEMENTS KEY TOPICS ACH CLEARING RULES. Guidance Note History.
ACH Clearing Rules Guidance Note No. 5 KEY TOPICS 1. Conditions 2. Electronic Methods 3. Written Agreement. 4. Requirement for a signature 5. The method must be as reliable as appropriate in the circumstances
More informationTransportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005
Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that
More informationASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Best Practice In Data Security
More informationChapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing
Chapter 6: Digital Certificates Introduction Methods PKI Digital Certificate Passing Prof Bill Buchanan OBE http://asecuritysite.com/crypto06 http://asecuritysite.com/encryption Identity on the Internet
More informationeid Applications Cross Border Authentication
eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?
More informationDesign and Implementation of a RFC3161-Enhanced Time-Stamping Service
Design and Implementation of a RFC3161-Enhanced Time-Stamping Service Chung-Huang Yang, 1 Chih-Ching Yeh, 2 and Fang-Dar Chu 3 1 Institute of Information and Computer Education, National Kaohsiung Normal
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More information2. Write an 8051 program to generate a square wave of 25 khz at pin P2.3 using XTAL = 12 MHz. Solution:
Assignment 2 1. Assume that 5 binary data items are stored in RAM locations starting at 50h, as shown below. Write a program to find the sum of all the numbers. The calculation is in 16-bit format and
More informationEXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD
More informationIBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure
IBM Multi-Factor Authentication in a Linux on IBM Z environment - Example with z/os MFA infrastructure Dr. Manfred Gnirss IBM Client Center, Boeblingen 21.3.2018 2 Trademarks The following are trademarks
More informationControl Transfer Instructions Jump, Loop, and Call. ECE473/573 Microprocessor System Design, Dr. Shiue
Control Transfer Instructions Jump, Loop, and Call 1 Jump Instructions JZ label ; Jump if A=0 JNZ label ; Jump if A!=0 DJNZ reg, label ; Decrement and Jump if A (or reg.)!=0 CJNE A, byte ; Compare and
More informationFingerprint Please...
Alex Dunn Fingerprint Please... Is the government storing your personal information? Fingerprint Please... Alex Dunn Touch ID is a recognition feature which requires the finger being scanned. This allows
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationSafelayer's Adaptive Authentication: Increased security through context information
1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient
More informationBusiness ebanking Online Wire Transfers
Business ebanking Online Wire Transfers This guide instructs users how to originate Wire transfers through Business ebanking. If you need support, please contact Treasury Services Support at (877) 920
More informationTest Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,
Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code
More informationVidder PrecisionAccess
Vidder PrecisionAccess Transparent Multi-Factor Authentication June 2015 910 E HAMILTON AVENUE. SUITE 430. CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview...
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationThe Need for Biometric Authentication
The Need for Biometric Authentication Presented previously at: InfoTec 2002 DefCon 10 in Las Vegas NebraskaCERT 2002 Mutual of Omaha ConAgra Foods Presented by: Nate Rotschafer Peter Kiewit Institute Revised:
More informationPast & Future Issues in Smartcard Industry
Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets
More informationAuthentication Objectives People Authentication I
Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Okanagan College Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationDigitalPersona Altus. Solution Guide
DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona
More informationApplied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.
Applied IT Security Device Security Dr. Stephan Spitz Stephan.Spitz@gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System Security
More information