COMPARISON OF EID SOLUTIONS WITH PRIVACY PRESERVING CHARACTERISTICS

Size: px
Start display at page:

Download "COMPARISON OF EID SOLUTIONS WITH PRIVACY PRESERVING CHARACTERISTICS"

Transcription

1 COMPARISON OF EID SOLUTIONS WITH PRIVACY PRESERVING CHARACTERISTICS May 2012 WHITE PAPER BY MARJO GEERS, CONSULTANT, FOR THE IDM COMPETENCE CENTER Author Marjo Geers has more than 10 years of experience as a consultant in IT security. She is specialized in electronic Identification, Authentication and Signatures (IAS), secure documents and secure electronic transactions. Marjo has been advising government and private organizations regarding eid solutions, driver and vehicle identification, and PKI infrastructures for e-passport verification and electronic signatures. Marjo is involved in standardization work via CEN TC224/WG15 (European Citizen Card) and CEN/ETSI STF 425 (Rationalized Framework for esignature Standardization). Abstract For secure electronic identification, smart card based PKI solutions and Identity Provider solutions with one-time-password generators (OTP) have been used for many years. The wish, however, to protect the user s privacy by disclosing only the minimum amount of required information, has led to privacy preserving electronic identification solutions. Although electronic identification and privacy protection may sound as a contradictio in terminis at first instance, in practice preserving the user s privacy is at current the most important concern of eid-issuing organizations and governments. In this whitepaper we discuss 4 privacy preserving solutions, namely U-prove, Idemix, the French eid, and the German eid. We compare the solutions and argue our opinion about the most suitable solution for a government issued eid. Key Words: eid, IAS, electronic identification, privacy preserving credentials, anonymous credentials. Introduction As users are getting more and more used to online transactions, they expect to be able to do all their business online. Also those transactions which require a high level of assurance regarding the identities of the parties in the transactions, or at least about the rights of those parties to perform the transactions. With users performing more and more online transactions, they also expect a user-friendly solution. For example, no need to use different credentials for different online services (username-password combinations, OTP tokens, bank cards in combination with tokens, SMS, ). Besides, issuing a separate credential for each online service is not cost-effective for the service providers (SPs). To provide users with a more user-friendly solution and to prevent the cost of resetting forgotten passwords, quite a number of web shops allow user log-in via Facebook or Twitter accounts. These social media accounts, however, give little guarantee about the authenticity of the user credentials and are therefore not suitable for those transactions requiring high assurance. For this type of transaction a trusted Credential Issuer (CI) or Identity Provider (IdP) is required. A government organization can be a suitable party to act as or delegate the role of CI/IdP for those credentials which need a high degree of certainty. The government can be responsible for this role for transactions between citizens and government organizations (C2G, public domain), but also for transactions of customers with businesses (C2B, private domain). It is obvious for the government to take this role in the private sector, since it may be government rules private SPs have to comply with. Since government issued identity documents 1/12

2 like passports and driver licenses are also used in the private sector, and since the government has a responsibility for creating and maintaining a secure environment. This is why in many countries a government issued, secure, electronic identity document for online authentication, an eid, has been issued for quite some time. Most of these government schemes for electronic identification have been based on classic PKI technology, sometimes (in combination with) an IdP. The current opinion, however, is that these solutions do not sufficiently protect the user s privacy. Protecting the user s privacy as much as possible while using these eids, is considered very important. Therefore new eid solutions have been developed with privacy preserving characteristics. In this paper we discuss the four most wellknown electronic identification solutions with privacy preserving characteristics. Two are developed as national schemes and are the eid solutions of Germany and France. The other two are developed in scientific research environments and adopted by large companies: U-prove (Microsoft) and Idemix (IBM). We consider the cases in which U-prove and Idemix make use of a hardware token, most likely a smart card, since this provides for better user authentication. The issues regarding privacy protection in electronic identification schemes are discussed in section two. The desired characteristics of privacy preserving eid solutions are discussed in section three. Then the four different eid solutions are described in section four, and in section five a comparison between the solutions is made based on the characteristics described in section three. In section six Collis vision on the most suitable solution for a government issued eid is discussed. Identification and privacy For electronic identification some different schemes are possible. Most of the government issued eids rely on PKI technology. The eid contains a public-private key pair and a certificate issued by a trusted party linking the public key to the holder. When an SP requires user authentication, it may send a challenge to the user, which the user signs with his/her private key by using his/her eid. The response, together with the certificate, is sent back to the SP. The SP will verify the response and the certificate. From the certificate the identity of the user and all attributes related to the user included in the certificate, can be extracted. An alternative is that when the user needs to be authenticated by an SP, the user is forwarded to an IdP, the user authenticates to the IdP and the IdP provides the SP with the required information. These two solutions, however, do not protect the user s privacy. In case the user authenticates directly to the SP using a certificate, the SP finds out all information contained in the certificate. In case the authentication takes place via an IdP, the IdP knows which user is doing business with which SP. Since privacy protection is highly valued in many societies, new solutions have been developed which provide a high level of trust. However, at the same time, the user s privacy must be preserved as much as possible. These solutions protect the user s privacy by only providing those credentials which are absolutely necessary for the transactions (data minimalisation) and by giving the opportunity to use a different identifier with different SPs or in different transactions with the same SP (pseudonimisation) (see Figure 1). 2/12

3 Figure 1: General purpose eid for authentication with several Service Providers Examples of data minimalisation also include only ascertaining the user s age is within a certain range or above/below a certain threshold. This may be required for online purchases, discounts, chat boxes, and the likes or by ascertaining the user lives in a certain city/province without disclosing the full address. In those cases it is not the actual value of the attribute which is transferred, but the answer to a question which involves comparison with the attribute. The possibility to use pseudonimisation is required to prevent data coupling between SPs and between sessions with one SP. Preserving the user s privacy is especially important in case of a multi-purpose eid, i.e. an eid issued by one party and used by several other parties. This is what is envisioned for government issued eids all over Europe. The government will issue an eid, but since it will not be profitable if it will only be used in government communication, the eid will also be available for private sector use. In addition the private sector will have a reliable authentication means. 3. eid Solution Characteristics In this section the characteristics on which an eid solution should be judged are discussed. General consensus exists in the eid community on the desired eid characteristics. The characteristics as described below are e.g. shared by the American National Strategy for Trusted Identities in Cyberspace (NSTIC) [1], the European Network and Information Security Agency (ENISA) [2], several national governments [3,4] and research groups [5,6,7]. Privacy and security are the main reasons for these characteristics. User consent The user should be in control of information regarding him/herself and be able to decide which information (attributes) will be shared and which information will not be shared with the SP. This means that the user must know which information about him/her is proposed to be shared with the SP and agree this information may indeed be shared. Note that this does not mean the assurance about the correctness of the information lies with the user. It is the CI or IdP which guarantees the attribute values. Another factor is that only the legitimate holder of the credentials may give this approval. It may not be possible that if an eid is lost or stolen someone else acts in the holder s name or that when the system is infected by malware a hacker acts in the holder s name. Therefore a form of user identification needs to take place before the eid releases the information. This may be implemented in several ways, but most commonly the user is asked for a PIN which is verified by the eid. To avoid sensitivity to malware the PIN should be entered via a secure PIN-pad. Service Provider authentication Before the user shares information about him/ herself with the SP, the user should know with a high degree of certainty with which party he/she is going to exchange information. Therefore the SP should first authenticate to the user. It is good practice that the authentication of the SP will be handled by the eid and that the result of the authentication will be shown to the user. In this way the eid can check the SP based on a certificate is- 3/12

4 sued by a trusted third party or a shared secret and stop the transaction if the SP is unknown or does not possess the right credentials. The user can perform a sanity check and stop the transaction if the SP is authenticated by the eid but differs from the SP the user thought to be involved with in a transaction. Since the information regarding the SP will be shown to the user via a user interface, this is susceptible to malware and authentication by the eid is required. Insusceptibility to malware (end-to-end secure channel) The solution should not be susceptible to malware. eids are highly resistant to malware, contrary to PCs and (to a lesser extent) mobile devices. Therefore the transaction should take place between the eid and the SP under endto-end security. This is realised by creating a secure channel which guarantees message integrity, message origin (authenticity) and confidentiality. Data minimalisation To protect the user s privacy only the information absolutely required for the transaction should be shared with the SP. This means that sometimes only name and date of birth suffice (address not required) or only the guarantee that the user belongs to a certain age group. In the latter case the SP only gets a response to its question whether a certain criterion is fulfilled, not what the exact value of the attribute is. control about the pseudonym it uses with one SP in different sessions, i.e. not even a fixed pseudonym for a certain SP. The use of pseudonyms prevents that SPs can exchange information about customers thus obtaining more data about the customer. Under certain well-defined conditions it should be possible to raise the anonymity. This should involve an independent third party which verifies fulfillment of the conditions. No hotspot (coupling between IdP & SP) It should not be possible for an Issuer or IdP to know or determine with which SP the user is performing a transaction. This will infringe the user s privacy. This requirement should hold even if the Issuer/IdP and the SP (to which the user released certain credentials but no identifying information) collaborate or coincide and try to match user identifiers with transactions based on time or transaction number. So the scheme may not contain a hotspot where information about both the transaction and a unique user identifier coincides. Revocation If an eid is lost or stolen it should be possible to revoke it. Therefore it should be possible to produce a black-list on basis of which eids are rejected. Revocation should also work in case the eid generates pseudonyms and in case the eid only indicates whether a criterion is fulfilled. This makes revocation more complicated. Pseudonimisation To protect the user s privacy even further the user should be able to use a pseudonym instead of his/her actual name for certain transactions. In many cases the SP s main interest is detecting a returning customer, not knowing the official name of the customer. Besides, some even argue that the user should be in Updateability Since the validity period of eids can be quite long, i.e. up to ten years when combined with an identity card or driving licence, it is important that the attributes associated with the eid can be updated during the operational phase. Addresses e.g. may change. It might also be convenient that the attributes are extensible, 4/12

5 i.e. that other attributes can be added. In case the attributes are provided by an IdP during the operational phase both updateability and extensibility are straight forward. In case the attributes are on the eid itself, an update mechanism must be available to update the attributes. Extension of the attributes will require an update of the applet on the eid or replacement of the eid itself. Middleware The eid will communicate with the SP and the user via a card reader, a PC, other user device (e.g. a mobile phone) or a terminal, and for the SP via the Internet or a dedicated connection. To address the eid via the card reader, middleware will be used. Middleware may also be required to communicate with the user. Preferably this middleware is generic, i.e. independent of the eid application and the device OS, and does not need to be installed by the user. Offline use In former days eids would need to be usable in offline situations, i.e. without a connection to an IdP or other eid service. Nowadays, however, almost all apparatus is online (even for a cigarette vending machine this will not be problematic) and the eid will mainly be used for online transactions anyway. If an IdP and other required services are implemented with back-up facilities, availability of the eid solution can be guaranteed with high certainty. Therefore the requirement that the eid can be used offline is not an important requirement anymore. 4. eid Solutions U-prove The U-prove solution [8] for electronic identification was developed by Stefan Brands and his company Credentia and later acquired by Microsoft who has made it publicly available as a successor of Windows Cardspace. In the U-prove solution the user together with a CI create a certificate containing a number of attributes. A public-private key pair of the user is associated with the certificate. The correctness of the attributes can be guaranteed by the CI. The user can request a short-lived certificate during a transaction with an SP (this may be required by the SP to guarantee the attributes are up-to-date) or the user can request a long-lived certificate before the transaction. The latter option prevents that even if the Issuer and SP collaborate they cannot link the request and use of a certificate based on time and in this way identify the user. Certificates can be used more than once. The CI can add data to the certificate which will always be visible when the certificate is used, e.g. an expiration date. The user can add data to the certificate which is not visible to the CI and therefore also not attested by the CI. This may e.g. be a pseudonym. The user may request as many certificates as required allowing the use of different pseudonyms. In this solution it is not possible to disclose the identity of the person using a pseudonym. When the user needs to authenticate to an SP (prove certain attributes), he/she can send a selection of the attributes in the certificate to the SP. The user will use the private key associated with the certificate in this process to prevent replay attacks. The SP is able to verify the correctness of the attributes based on the signature created partially by the CI. For this the SP needs the CI public key. The technology can be implemented in such a way that an eid is required to generate the proof for the SP. In this way the solution does not depend on software only and is insusceptible to malware/illegitimate use. A presented U-Prove token can be revoked by the user him/herself by making the token identifier available for blacklisting. Revocation is not possible by the CI without collaboration of the user. 5/12

6 A high-level schematic representation of U- prove is given in Figure 2. For more information regarding U-prove see [8]. and corresponding certificate. When the user needs to prove an attribute, he/she uses the public key of the SP and his/her master secret key. The SP in turn, needs its private key in the protocol and the public key certificate of the CI to verify the attribute. Showing attributes involves a zero-knowledge proof. The actual credential is not transferred. Figure 2: Schematic representation of U-prove Idemix Idemix, short for Identity Mixer, was developed by Jan Camenisch et al. for IBM [9]. At a high level Idemix functions quite similar to U-prove. Differences exist on a cryptographic level and Idemix has some other options. Idemix, just like U-prove, has a CI sign a number of credentials, from which the user can later choose, when authentication is required, which to present. The Issuer can attest the credentials. A user master secret key is associated with the certificate to link all attributes and pseudonyms of one certificate together. In this way it is prevented that attributes from different users are provided in one authentication process. Pseudonyms are derived from the secret key. This can be done in such a way that only the user can show certain pseudonyms belong to him/her. It can also be that the SP requires the same pseudonym will be used each time the user performs a transaction with the SP. In that case the SP will require a so-called domain pseudonym which is derived from the user secret key by using the SP (or domain) identifier. With Idemix SPs need a public-private key pair The technology can be implemented in such a way that an eid is required. In this way the solution does not depend on software only and is insusceptible to malware/illegitimate use. Performance of a smart card based solution, however, is challenging for Idemix. Revocation by the CI is not a standard feature of Idemix. A high-level schematic representation of Idemix is given in Figure 3. For more information regarding Idemix, see [9]. Figure 3: Schematic representation of Idemix Idemix and U-prove are anonymous credential schemes. Anonymous credentials essentially are privacy-enhancing public-key infrastructures which require standardization to be widely used. Anonymous credential systems are far more complex than ordinary signature schemes since they provide more functionality in order to address all of the requirements of 6/12

7 a public key infrastructure with privacy-protection. In the ABC4Trust project [10] the goal is to address the federation and interchangeability of technologies that support trustworthy yet privacy-preserving Attribute-Based Credentials (ABC). This means that ABC4Trust strives to define a common unified architecture for ABC systems like U-prove and Idemix to allow comparing their respective features and combining them on common platforms. French eid The specifications for the French eid solution have been developed by smart card vendors Gemalto and Oberthur in collaboration with the French National Agency for Secure Documents (ANTS). The French eid is not yet operational. Implementation is held back by the French Senate. In the French eid solution [3] (unsigned) attributes are stored on the eid itself. The eid Issuer assures the correctness of these attributes (at issuance). In a transaction where user authentication is required (i.e. prove certain attributes), the SP must first authenticate to the eid. This is done on basis of a symmetric SP specific key, which the eid can derive from a master key on basis of the SP identifier. The SP will then indicate to the eid which attributes are required. The eid will send this criteria list to the IdP after it has authenticated itself to the IdP (method not specified). By sending the criteria list via the eid, the IdP is not aware which SP sent the list. The SP and IdP together, however, seem to be able to determine together, based on the point in time, which user has been in contact with the SP. The IdP will verify that the eid has not been revoked and does not need to be updated. Then it will obtain the required attribute values from the card or just the result of a comparison. The IdP could also add attributes not present on the card. The IdP will sign these attributes or comparison results and send them back to the eid. The eid will open a new secure session with the SP in which the SP has to authenticate again. This time SP authentication takes place on basis of a Card Verifiable certificate issued by a trusted party. The session with the SP is linked to the previous session on basis of an ephemeral eid key pair. Then the eid will send the IdP signed certificate to the SP. The SP can verify this by using the IdP public key. Pseudonyms can be chosen by the user him/herself. The SP can ask whether the name filled-out by the user corresponds to his real name. Revocation can be done by a central party since the IdP is able to check revocation during each session with the eid. A high-level schematic representation of the French eid solution is given in Figure 3. For more information on the French eid, see [3]. Figure 4: Schematic representation of French eid German eid The German eid has been issued on the German national identity card since November 1, The card is issued by the Bundesdrückerei while the specifications [4] have been developed and made publicly available by the Federal Office for Information Security (BSI). In the German eid solution [4] unsigned attributes are stored on the eid. The Issuer guarantees the correctness of the attributes (at issuance). During a transaction in which user authentication is 7/12

8 required the attributes or the result of a comparison are provided to the SP by the eid itself without intervention of an IdP or CI. During a transaction the SP first needs to authenticate to the card via a public-private key pair and Card Verifiable certificate containing information about the attributes to which the SP is entitled. After the SP has been authenticated by the eid and the user has agreed with providing the required attributes the eid authenticates to the SP as a genuine eid using a non-unique key pair and a secure channel is set-up between the eid and the SP. Then the attributes to which the SP is entitled or the results of a comparison are transferred to the SP via this secure channel. In this way the keys used for setting up the secure channel cannot be used to identify the eid unambiguously and the data are not signed and therefore the proof-of-evidence is non-transferable. The eid can calculate an SP (or sector) specific pseudonym based on the SP (or sector) identifier. This pseudonym will be determined by the eid and be the same for each transaction with the SP. The attributes can be updated, also online, by authorities with the proper authorizations. This, however, will require the user offering his/her eid at one of these authorities. Revocation can be done by a central party via an SP (or sector) specific black-list. The German eid uses mechanisms like PACE, EAC (TA and CA) and PA which have also been used in electronic passports for quite some time. A high-level schematic representation of the German eid solution is given in Figure 4. For more information on the German eid, see [4]. 8/12

9 Characteristic U-prove Idemix French eid German eid User consent - Requested attributes shown to user via IdP - Distinction in mandatory and optional attributes - Requested attributes shown to user via Bürger client SP authentication by eid Not incorporated but can be added (via publicprivate key pair) 1 (via shared secret key & later in transaction via CV certificate) 1 (via EAC-TA) Insusceptibility to malware (end-toend security) (in case an eid is used. An eid though is no mandatory part of the U-prove scheme) (in case an eid is used. An eid though is no mandatory part of the Idemix scheme) Secure Channel via DH or ECDH key exchange - eid key pair ephemeral - eid public key signed by IdP - requires IdP certificate at SP - SP key pair ephemeral Secure Channel via ECDH key exchange (EAC-CA) - eid key pair NOT unique - eid public key signed by Issuer - requires Isser certificate at SP - SP key pair ephemeral Data minimalisation Attributes in certificate. eid used for cryptographic calculation. Result of comparison can be transferred to SP Attributes in certificate. eid used for cryptographic calculation. Result of comparison can be transferred to SP Attributes on eid. eid can perform Comparison - Attribute value or result of Comparison signed by IdP - IdP can indicate validity period. Attributes on eid. eid can perform Comparison - Attributes are not signed because of portability of evidence. SP relies on correctness on basis of trust in eid. 1 The mechanisms used for SP authentication are quite similar for the German eid, French eid, and Idemix although different names are used to identify the mechanism. 2 Earlier on in the transaction before user authentication by the eid takes place a secure channel is established via PACE. 9/12

10 Characteristic U-prove Idemix French eid German eid Pseudonimisation, between SPs & between sessions with same SP. User may obtain as many certificates as required. Pseudonyms not known to CI and therefore not revocable without additional measures, between SPs & in some cases between sessions with same SP. SP can require same domain pseudonym in each session. Pseudonyms calculated on basis of user master key and in case of domain pseudonym on basis of SP identifier Pseudonyms not known to CI and therefore not revocable without additional measures, between SPs & between sessions with same SP (different possibilities). User can choose pseudonym in transaction with SP. SP can check via transaction process whether the user provided a pseudonym. Pseudonym not on eid or in certificate. Hash over certificate is identifier for SP. User may obtain as many certificates as required. (Alternatively a (one) pseudonym may be present on the eid.) Revocation on basis of eid via IdP., between SPs Pseudonyms calculated by eid on basis of SP identifier. Revocation on basis of pseudonyms possible via SP specific black-list No hotspot Revocation No hotspot in case of long-lived certificates, hotspot in case of shortlived certificates No, not in basic model, although extensions may provide it No hotspot No, not in basic model, although extensions may provide it linking of eid to SP by IdP and SP seems possible based on transaction time Revocation via IdP check of eid No hotspot Revocation via SP specific black list Updateability (extensibility) Of attributes, extensibility via IdP Of attributes, no extensibility Middleware Offline use Requires some form of middleware in case an eid is used in case of long-lived certificates Requires some form of middleware in case an eid is used. Requires generic middleware according to ISO No Requires generic middleware according to ISO and Bürgerclient 10/12

11 6. Collis Vision on eid The German eid solution is an elegant and relatively simple solution providing more or less all required characteristics. It has proven itself in practice. Not only has the German eid been in use since the end of 2010 without any serious issues being identified up till now, it is also based on cryptographic mechanisms which have been in use for quite some time in epassports. This means it has been available on a broad scale and been submitted to tests by hackers. The German eid solution is much more straightforward than the French eid solution. In the French eid solution the use of both an Issuer (which provides and attests the attributes on the eid) and an IdP (to create a certificate) seems superfluous. Also the use of both a symmetrical cryptographic key and a public-private key pair with CV certificate to identify the SP seems superfluous. Besides, in case of the French eid solution the privacy protection of the user seems not optimal since it deems possible to identify the user by combining the times of contact with SP and IdP. If this is correct, this is a serious flaw of the French eid solution. It will protect the user s privacy while at the same time provide good security to both user and SP. References 1. rss_viewer/nsticstrategy_ pdf national-strategy-trusted-identities-cyberspaceand-your-privacy 2. Privacy Features of European eid Card Specifications by ENISA, see activities/identity-and-trust/privacy-and-trust/eid/ eid-cards-en The U-prove and Idemix solutions must be mathematically sound solutions since they have been publicly known and studied for quite some time in the academic world. However, they have not yet proven themselves in practice and some implementation security flaws may be detected if they are rolled-out on a large scale. In fact Idemix has some performance issues in case it needs to be implemented on a smart card. Revocation is not incorporated by default, requiring additional mechanisms to be added. The same holds for SP authentication in case of U-prove. Based on these arguments we consider the German eid solution the most suitable solution for a government issued eid to be used in the public and private sector TR-Privacy_Preserving_Cr 4. blob=publicationfile html 5. cardis.html 11/12

12 6. publications.html Collis Sparked your interest? Want to learn more? Collis provides training courses on Contactless and Mobile Payments and the Trusted Service Manager. Furthermore, Collis has been technology partner for a wide range of NFC Implementations around the world. To learn more about Collis go to the website: About Collis Collis the market leader in secure transaction technology. Collis strong global team is dedicated to delivering innovative solutions to the finance, government, transport and telecom sectors. Collis is the independent, trusted party assisting MNOs, SPs and TSM operators with setting up their NFC/TSM infrastructure and defining their mobile payments strategy. Collis delivers the required expertise through consulting services, test tools and simulators and our mobile test centre concept. All these offerings are essential for a successful implementation of mobile payments, wallets or TSM infrastructures. With over 15 years experience in the secure technology industry, Collis has served hundreds of customers globally with successful implementations of EMV, NFC, mobile payments ID documents and TSM. Collis offers technical and business consultancy, accredited training courses, state-of-the art test tools and simulators and test centre services. Collis has been accredited to perform MasterCard Formal Approval Services and consulting services. Our test tools and simulators have been certified and qualified by the world s leading payments associations (Visa, MasterCard, JCB, American Express and others) as well as industry bodies (EMVco, GlobalPlatform). Collis was acquired by UL in April 2012 to provide end-to-end transaction security globally. Collis locations Collis Global Leiden, The Netherlands Collis GB Edinburgh, Scotland Collis Middle East & Africa Dubai, United Arab Emirates Collis Pacific Auckland, New Zealand Collis Latin America & Caribbean Sao Paolo, Brazil Collis Asia Singapore Collis America Minneapolis, USA Collis Nordic Helsinki, Finland 12/12

Transaction Security. Advisory Services

Transaction Security. Advisory Services Transaction Security Advisory Services Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Transaction Security. Test & Certification and Security Evaluation

Transaction Security. Test & Certification and Security Evaluation Transaction Security Test & Certification and Security Evaluation Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over

More information

Transaction Security. Test Tools & Simulators

Transaction Security. Test Tools & Simulators Transaction Security Test Tools & Simulators Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

White Paper PalmSecure truedentity

White Paper PalmSecure truedentity White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server

More information

Whitepaper on identity solutions for mobile devices

Whitepaper on identity solutions for mobile devices Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 The EMV Readiness Collis America Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools

More information

INTRODUCTION AND HISTORY

INTRODUCTION AND HISTORY INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD DELIVERS PEACE OF MIND PRODUCT FLYER ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD ENABLE FULL SUPPORT OF THE MOBILE PAYMENTS PROCESS FOR EMBEDDED

More information

Meet The Family. Payment Security Standards

Meet The Family. Payment Security Standards Meet The Family Payment Security Standards Meet The Family Payment Security Standards Payment Processing Electronic payments are increasingly becoming part of our everyday lives. For most people, it can

More information

Electronic Citizen Identities and Strong Authentication

Electronic Citizen Identities and Strong Authentication Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Electronic Identity Cards for User Authentication Promise and Practice

Electronic Identity Cards for User Authentication Promise and Practice Electronic Identity Cards for User Authentication Promise and Practice Andreas Poller Ulrich Waldmann Sven Vowé Sven Türpe Fraunhofer Institute for Secure Information Technology (SIT) Rheinstraße 75, 64295

More information

Qualified Electronic Signatures Act (SFS 2000:832)

Qualified Electronic Signatures Act (SFS 2000:832) Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

A Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann

A Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann A Movie Streaming Application & ABC4Trust as Services in the Cloud Dr. Anja Lehmann IBM Research Zurich A research project funded by the European Commission s 7th Framework Programme. Lessons learned from

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions. Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,

More information

Using Strong Authentication for Preventing Identity Theft

Using Strong Authentication for Preventing Identity Theft Position Paper Using Strong Authentication for Preventing Identity Theft Robert Pinheiro Consulting LLC Better identity authentication has been proposed as a potential solution not only to identity theft,

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

Privacy in e-ticketing & e-identity

Privacy in e-ticketing & e-identity Privacy in e-ticketing & e-identity Attribute-proving for Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Institute for Computing and Information Sciences Digital Security 17th May 2011 Pim Vullers Collis

More information

Secure & privacy-preserving eid systems with Attribute-based credentials

Secure & privacy-preserving eid systems with Attribute-based credentials University of Twente Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Master Thesis Secure & privacy-preserving eid systems with Attribute-based credentials Brinda Badarinath

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Cloud based ticketing. Next generation fare collection

Cloud based ticketing. Next generation fare collection Cloud based ticketing Next generation fare collection Cloud based ticketing Next generation fare collection For more than 20 years transport operators have experience with automating their fare collection

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

A Survey on Untransferable Anonymous Credentials

A Survey on Untransferable Anonymous Credentials A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches

More information

Position Paper European Citizen Card: One Pillar of Interoperable eid Success

Position Paper European Citizen Card: One Pillar of Interoperable eid Success Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance

More information

Digital identity: Toward more convenient, more secure online authentication

Digital identity: Toward more convenient, more secure online authentication Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

Credential-based access control extensions to XACML

Credential-based access control extensions to XACML Gregory Neven, IBM Research Zurich W3C Workshop on Access Control Scenarios, Nov. 18 th, 2009, Luxembourg Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer Credential-based

More information

FAQs - New German ID Card. General

FAQs - New German ID Card. General FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new

More information

How Secure are Contactless Payment Systems?

How Secure are Contactless Payment Systems? SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2

More information

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2

More information

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

Smart Card Solutions: Bringing Value to Citizens

Smart Card Solutions: Bringing Value to Citizens Smart Card Solutions: Bringing Value to Citizens by Thomas Röder The focus of modern smart card applications, especially in the electronic identity card landscape, has shifted from an approach purely driven

More information

D7.1 Application Description for Students

D7.1 Application Description for Students Attribute-Based Credentials for Trust D7.1 Application Description for Students Joerg Abendroth, Vasiliki Liagkou, Apostolis Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

2015-11-02. Electronic Payments Part 1

2015-11-02. Electronic Payments Part 1 Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced

More information

Debit MasterCard. Conditions of Use. These are the conditions of use that apply to your Rabobank Debit MasterCard. You must read and retain them.

Debit MasterCard. Conditions of Use. These are the conditions of use that apply to your Rabobank Debit MasterCard. You must read and retain them. Debit MasterCard Conditions of Use These are the conditions of use that apply to your Rabobank Debit MasterCard. You must read and retain them. May 2013 Contents 1. Signing your card... 3 2. Ownership

More information

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust

More information

Attribute-proving for Smart Cards

Attribute-proving for Smart Cards Attribute-proving for Smart Cards progress made over the past two years ir. Pim Vullers p.vullers@cs.ru.nl Institute for Computing and Information Sciences Digital Security 5th October 2011 Pim Vullers

More information

Strong Security in Multiple Server Environments

Strong Security in Multiple Server Environments White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

Digital Identity Management

Digital Identity Management Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University bertino@cs.purdue.edu Digital Identity Management What is DI? Digital identity (DI)

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

Outline. IRMA Math. Background about IRMA. Mathematical basis of IRMA. What is authentication? Nijmegen s contribution.

Outline. IRMA Math. Background about IRMA. Mathematical basis of IRMA. What is authentication? Nijmegen s contribution. Outline IRMA Math Bart Jacobs Institute for Computing and Information Sciences Digital Security May 17, 2013, Kaleidoscoop, Nijmegen irmacard.org Bart Jacobs May 17, 2013 IRMA Math 1 / 45 Background about

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

EBA STRONG AUTHENTICATION REQUIREMENTS

EBA STRONG AUTHENTICATION REQUIREMENTS EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Transnet Registration Authority Charter

Transnet Registration Authority Charter Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

SecureStore I.CA. User manual. Version 2.16 and higher

SecureStore I.CA. User manual. Version 2.16 and higher User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

ComSign Ltd. Certification Practice Statement (CPS)

ComSign Ltd. Certification Practice Statement (CPS) ComSign Ltd. Certification Practice Statement (CPS) Procedures relating to issuing electronic certificates that comply with provisions of the Electronic Signature Law and its regulations. Version 3. 1.1.

More information

Telia hardware based e-legitimation v2. Certification Practice Statement. Revision Date: 10 th June 2009. Version: 1.0

Telia hardware based e-legitimation v2. Certification Practice Statement. Revision Date: 10 th June 2009. Version: 1.0 Document no 4/011 01-AZDA 102 213 TeliaSonera Sverige AB Certification Practice Statement Rev. 1.0 Telia hardware based e-legitimation v2 Certification Practice Statement Revision Date: 10 th June 2009

More information

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN

More information

IBM i Version 7.3. Security Digital Certificate Manager IBM

IBM i Version 7.3. Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize

More information

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW July 2012 WHITEPAPER BY MARK BAAIJENS, MANAGING CONSULTANT FOR THE PAYMENT COMPETENCE CENTER Author Mark finished his Master of Science degree

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

OPC UA vs OPC Classic

OPC UA vs OPC Classic OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING

More information

Security Model in E-government with Biometric based on PKI

Security Model in E-government with Biometric based on PKI Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute

More information

CS 392/681 - Computer Security

CS 392/681 - Computer Security CS 392/681 - Computer Security Module 3 Key Exchange Algorithms Nasir Memon Polytechnic University Course Issues HW 3 assigned. Any lab or course issues? Midterm in three weeks. 8/30/04 Module 3 - Key

More information

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this

More information

Mobile Security. IIIIII Security solutions for mobile as an endpoint. financial services & retail. enterprise. public sector. telecommunications

Mobile Security. IIIIII Security solutions for mobile as an endpoint. financial services & retail. enterprise. public sector. telecommunications Mobile Security IIIIII Security solutions for mobile as an endpoint financial services & retail enterprise public sector telecommunications transport IIIIII Table of Contents The challenges of mobile security....

More information

PRIME. Privacy and Identity Management for Everyone/Europe. Thomas Gross (IBM Research) with a PRIME hat on. www.prime-project.eu

PRIME. Privacy and Identity Management for Everyone/Europe. Thomas Gross (IBM Research) with a PRIME hat on. www.prime-project.eu PRIME Privacy & Identity Management for Europe PRIME Privacy and Identity Management for Everyone/Europe Thomas Gross (IBM Research) with a PRIME hat on www.prime-project.eu May 2007 2007 IBM Corporation

More information

Copyright 2005-2007 MyPW LLC.

Copyright 2005-2007 MyPW LLC. Simple & Secure Authentication It's common knowledge that most people use the same or similar passwords wherever they have an online account. Because of this, it can only take one security breach for Identity

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon -

Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon - Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon - Birgit Pfitzmann 28.3.2003 PET 2003, Dresden Content Privacy options in the design space of Passport, Liberty, etc. Exact

More information