The concept of biometric digital signatures based on Hitachi activities in Japan
|
|
|
- Elinor Webster
- 10 years ago
- Views:
Transcription
1 The concept of biometric digital signatures based on Hitachi activities in Japan Koncepcja biometrycznego podpisu kwalifikowanego na podstawie działań Hitachi w Japonii Hitachi, Hitachi, Ltd. Ltd All All rights reserved.
2 Contents 1. Problems of Signature Infrastructure 2. The Signature System of the Server Method using Finger Vein 3. The Use Scenario of the FV Method 4. The Problem of the FV Method 5. Examples Introduction, and Future Examination Matters
3 1 Problems of Signature Infrastructure
4 1 1. A problem of signature infrastructure A problem of signature infrastructure Is this safe? Because there are many cases dealing with important personal information, safety becomes important. In addition, it must seem that It is a safe" for a user. Is this easy? If it is not easy to use, then the user is unlikely to use the system. If the system is difficult to use, costs of use and the education of users will increase. How to get an IC card? There are many cases using an IC card for security, but in this case, the distribution method and the associated costs can become a problem. False sending of cards and fraud or loss can cause serious problems. How to keep safety of the algorithm? It is necessary to shift to an extreme high thing in algorithm so that the strength of the code deteriorates with time. Depending on implementation of a system and the IC card a great deal of costs may be necessary in replacing it. What s a digital signature? Minimum knowledge is necessary to use it safely. In addition, it is importantto publicize you have what when use signature infrastructure, and where becomes convenient. It is not used by the system known nobody. 3
5 1 2. The case of Japan The problem of a signature infrastructure realized in Japan PKIin Japan There is an infrastructure called JPKI in Japan that allows the use e signature for validating transactions. A problem of the introduction In JPKI, an IC card equipped with a key and a certificate is used to sign a transaction. You must go off to the government office to get the IC card. In addition, You need to buy an IC card reader/writer to use it. For this reason, it is not always easy to introduce it. A problem of the use Because eachgovernment copes about the CA rekey/ the IC card update / the migration about cryptography algorithm individually, administrative affairs are inconvenient and are non effective. Users have to manage their Password and PINsafety. JPKI CERT. 4
6 1 3. The case of certain company The problem of the company that introduced a signature infrastructure SAFE BioPharma It is the trade group which was established to carry out the PKIinfrastructure in the pharmaceutical industry. It is going to be used by a protection of patent evidence, electronic application procedure to Government, the approval of the inside office work and cryptographic communication. Now, all top 10 company introduce SAFE digital signature, and many major companies will. 2005: Introduction In firstcompany,the IC card that stores a key and a certificate was distributed to employees. 2010: The update of the cryptographic algorithm In relation to a problem of the code strength, the update of thekey and the algorithm are necessary. Therefore companies must distribute all IC cards again and this is problematic. SAFE CERT. COMPANY CA 5
7 2 The Signature System of the Server Method using Finger Vein
8 2 1. The signature system of the server method used FV The summary of signature system of the server method used FV traditional model It is mainstream that it storesa key and a certificate in an IC card, and to sign in an IC card. FVmodel In server method, it stores a key in a server and it signs on a server. In addition, we use finger vein information for the user authentication. Prototype is working at a research institute. traditional FV SIGN SIGN user authentication by IC card and PIN. user authentication by FV. 7
9 2 2. The featuresof the FV method The merit of the FV signature You do not need to use an IC card Even if the user does not use an IC card, e signature comes to be possible. The provider does not need to think about the management of IC cards such as distribution or the updates. You donot need to manage PINs User authentication is enabled only with a finger. Therefore problems of PIN memory or the change of PIN are avoided. You do not need to waste timefor update User does not have to do something for a key and algorithm update. Update is completed only by work on the server side. It is much easier for the user User only needs to put their finger without inputting PIN and setting IC card. In addition, impersonation is very difficult since biological information is used. PIN UPDATE 8
10 3 The Use Scenario of the FV Method
11 3 1. The use scenario of the FV method Registration Office Authentication Server User User Data User visits the registrationoffice. A manual step is required to confirm identity using controlled document, for example, Citizen ID Card. After the person s identity is confirmed by staff, staff register the user s finger vein information. System generates a key pair, and connects key information, personal data ( e.g. a reference number) and the finger vein information. 10
12 3 2. The use scenario of the FV method Portal Site Application Server User manages or enters required information for an official documents using portal site via work, home, at a kiosk etc. 11
13 3 3. The use scenario of the FV method Portal Attach Signature Application Server Authentication Server If the document setup is completed successfully, User is requested to scan finger and finger vein information is transmitted to the authentication server. 12
14 3 4. The use scenario of the FV method Portal Authentication Server Signature is done Application Server OK? SIGN Systemperformsthe finger vein certification in the server side and signsit automatically. 13
15 4 The discussion point of the FV Method
16 4 1. The Discussion pontof the FV method (1) legal aspect The design concept of many e signature laws is based on the key being stored in a secure container such as an IC cards. Interpretation every country is necessary whether a method to manage the key with a server satisfies electronic signature law. In Europethe statement is secure container so it is possible if the system is secured. It is a condition of the electronic signature in Japan that an individual can sign only by himself, and the legal interpretation of the servermethod is unknown. Because there is not a rule like Japan in U.S.A., it is thought that the server method satisfies a condition. But the company that introduces this must understand that strict use, control and inspection are necessary. OK? 15
17 4 2. The discussion pointof the FV method (2) technical aspect large scale When a nation uses it, finger vein information to be managedincreases in volume. Systems must search for input finger vein information from the finger vein information of all users in a 1 to Manytransaction. This can become difficult with large user populations if a reference number is not used. Therefore the algorithm reinforcement of the finger vein authentication is required. The provision by the user of simple information (e.g. National ID Number) to make a 1 to 1 or 1 to a few transaction solves the problem but adds some additional work forthe user. security As a matter of course, finger vein authentication is powerless for the man in the middle attack. When a userhasauthenticationinformation stolen, the userwill perform password changes if usual. However, because wecannot change the biologicalinformation,some kind of technological countermeasures are necessary. In a matching Just a minute, please. 16
18 5 Examples Introduction, and Future Examination Matters
19 5 1. Example of epass in Canada Example of epass in Canada The Canadian Government offers registrationand authenticationservices to providesafe access to online government services to be called epassfrom September, Utilizing PKI technology, it is used as an infrastructure for electronic signature for using online government services. epass APP APP User ID Key abc123 registration download signature document Client PKC SIGN 18
20 5 2. Example of company introducing SAFE BioPharma Example of company introduced SAFE BioPharma Utilizing the IC card which is already distributed. System performsthe user authentication by IC card, but performsthe signature in a server. PKI APP APP PKC SIGN authentication Client signature document access 19
21 5 3. Future Examination Matters Method of Combination with Applications What is the target applications Combine with Workflow system Method of user management Combine with SSO system, LDAP server or MS Active Directory User I/F Usability, security and safety 20
22
23
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Finger Vein digital biometric signature: use cases
Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Agenda 1. Biometric e-signature: what is it? 2. Possible Biometric Signature Applications 3. Biometric Electronic
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Accredited Certification Services on Cloud Environment. SungEun Moon KOSCOM [email protected]. 17 September, 2012
Accredited Certification Services on Cloud Environment SungEun Moon KOSCOM [email protected] 17 September, 2012 Index Existing Accredited Certificate Use and Enhanced Security Measure Accredited Certificate
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton
Trust Elevation Using Risk-Based Multifactor Authentication Cathy Tilton 1 Caveat Intent is to present an approach for risk-based multifactor authentication and how it might be used in a trustelevation
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers
Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 What kind of call volume reduction can I expect? 1 2 Can I integrate
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Aloaha Sign! (English Version)
Aloaha Sign! (English Version) Aloaha Sign! (English Version) All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,
SECURITY. Konica Minolta s industry-leading security standards SECURITY
Konica Minolta s industry-leading security standards In the digital age, we have seen global communications undergo unprecedented growth and the potential for security breaches has grown in parallel. In
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
PrivateServer HSM Integration with Microsoft IIS
PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document
Ericsson Mobile digital identity
Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
1. Lifecycle of a certificate
1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it
What Are They, and What Are They Doing in My Browser?
Digital Certificates, p.1 07/29/02 Digital Certificates What Are They, and What Are They Doing in My Browser? By Judith V. Boettcher and Amanda Powell Digital certificates provide a means to authenticate
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
VeriSign Code Signing Digital Certificates for Adobe AIR Technology
VeriSign Code Signing Digital Certificates for Adobe AIR Technology Realizing the Possibilities of Internet Software Distribution Contents + What is Code Signing and Why is it Important? 3 + Who Needs
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to
If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Using Exclaimer Signature Manager with Office 365
Using Exclaimer Signature Manager with Office 365 www.exclaimer.com How does Signature Manager Work? Signature Manager takes an email signature template and fills it out for a specific individual using
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
Required changes to Table 6 2 in FIPS 201
The PIV Working Group appreciates the opportunity to provide guidance on the initial scope for ICAM Part B. In addressing your request we created three bodies of content: Required changes to Table 6 2
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
Apache Milagro (incubating) An Introduction ApacheCon North America
Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer
Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use
White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Working with Portecle to update / create a Java Keystore.
Working with Portecle to update / create a Java Keystore. Backup your stoneware.keystore file before starting. Download Portecle from http://sourceforge.net/projects/portecle/ Unzip the files and double
National Certification Authority Framework in Sri Lanka
National Certification Authority Framework in Sri Lanka By Rohana Palliyaguru Manager Operations & Principal Information Security Engineer What is digital Signature? According to UNCITRAL Text 25. Digital
Technical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
