Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs
|
|
|
- Philomena Walker
- 10 years ago
- Views:
Transcription
1 Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1
2 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize services Benefits Significant economic growth and savings ($50B to $114B) for a trusted online environment Help governments go green and promote effective natural resource management Stimulate economic growth and promote social inclusion KEY ENABLERS Online Services Big Data Social Media Mobile Apps Cloud Computing Empowering people through eparticipation Providing stronger security and authentication 2
3 POWERFUL COMBINATION OF PHYSICAL AND DIGITAL SECURITY Physical Security Trusted Identity Digital Security Substrate Paper PVC Polycarbonate Smartcard Carrier We innovate across platform technologies HSM USB Mobile Smartcard Form Factor Personalisation Inkjet Dye Sublimation Retransfer Laser Credential We create the personalised credential X509 ICAO BAC/EAC ISO7816 PIV Identity Certificate Laminates Hologram STOP Laser Authenticity We protect and seal for integrity Encryption Hash Keys PKI Identity Digital Signature P Key Security Features Digital Signature Document Validation Secure Transactions evalidation We enable access to services and resources 3
4 Physical Security Carrier Digital Security The way in which we present identity details or attributes to be validated ISO 7816 ID3 ID1 The Secure Element (chip) is our common platform ISO Standards based on physical form factor to enable machine readability Standards based on electronic interface 4
5 Physical Security Carrier Digital Security Teslin PVC Polyester (PET) PVC/PET Composite Polycarbonate (PC) PC/PET Composite What s the required security level? How is document stored and carried? Wallet, pocket or badge? How often is it carried, handled or swiped through a reader? Hardware Security Module Software Secure Element Network/USB/PCI Connectivity What is the desired lifetime? New ISO standard (ISO 24789) helps define durability tests to meet selected usage profile of the document 5
6 Physical Security Credential Digital Security Physical or logical binding of identity to attributes & privileges assigned by an authority Multiple credentials for single identity Name: Tim Klabunde Birth Date: July 29, 1967 Street: Bren Road South City: Minnetonka State: Minnesota Zip: Country: USA 6
7 Physical Security Credential Digital Security Inkjet Dye Sublimation Retransfer Pigment Laser Engraving Majority of passports Crisp imagery Low cost Requires overlay Dye sublimation used in most cards Brilliant, life-like images Retransfer pigment more UV light resistant & better on irregular surface Higher security Uses no print ribbons or overlays Passport National ID Driving Licence Resident Permits Healthcare Benefits Voter ID Access Control Transport Emergency Response State/Local Gov ID Military ID Standardised Passport: ICAO Document 9303 EU Driving Licence PIV X509 ISO 7816 PIV Smart Card Logon Secure Encryption Digital Signature Authentication Card Verifiable Certificates EMV epassport (EAC & BAC) eid Logical & Physical Applications Smart Card Logon, Secure etc. Building Access Encryption Digital Signature 7
8 Physical Security Authenticity Digital Security Type of attacks Document is Authentic: Verify that the document is a genuine original and not a counterfeit ROM EEPR OM RAM CPU Coproces sor Log ic Make IT! Take IT! Data is Authentic: Verify that the data was personalised by a genuine, known issuer and is not counterfeit data Data has Integrity: Verify the data is the same as originally put there and has not been tampered with or forged Commercial & criminal Academia for prowess & public interest Government organisations try to break the chip Export control Dedicated certification scheme Third party evaluation Common Criteria & FIPS 140 Fake IT! 8
9 Physical Security Authenticity Digital Security Strong security features bring together 3-elements: specialized engineering, restricted components, knowhow & expertise Integration of Overt, Covert and Forensic Features Pre-print Personalization Laminate A Secure ID document is resistant to simulation ( counterfeiting ), alteration ( tamper), and easy to verify with confidence. Design and training are key A digital certificate is an electronic file securely linking an individual to encryption keys and identification data, and belongs to a person and resides on a mobile token A set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates HASH Keys PKI One Way unique Digital Fingerprint of data Varying strengths (MD5, SHA-1, SHA- 256) Public and Private Keys Used to encrypt/decrypt hash so has can be verified Trust Infrastructure for the issuance of keys, Certs, CRLs Provides lifecycle management for credentials 9
10 Content supplied by: Government of Canada Canada Border Services Agency National Document Centre E-PASSPORT FRAUD Counterfeit RFID Chips Digital vs. Physical security features
11 Case #1 - Counterfeit RFID Chips June 2010: CBSA intercepted a UK e-passport. It was one of hundreds of genuine stolen blanks. A functioning counterfeit RFID chip was inserted into the back cover. 11
12 The counterfeit chip displays the information on the biopage. 12
13 Case #2 - May-Oct 2014: CBSA intercepted multiple Slovenian e-passports altered with biopage substitution. Functioning counterfeit RFID chips were inserted into the biopage. 13
14 The counterfeit chip displays the information on the biopage. 14
15 Low Quality Fraud The Optically Variable Ink does not change color. The Optically Variable Device is low quality. 15
16 The Variable Laser Image does not change when tilted. The tactile features were not reproduced. 16
17 The serial numbers have been altered by hand.
18 The genuine biopage was damaged and the original chip was disabled. The counterfeit chip was placed under the counterfeit biopage. 18
19 19
20 20
21 Thank you 21
DOCUMENT SECURITY ISSUES
DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase
TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions
TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS Mary Olson, Senior Marketing Manager, Citizen Solutions INTRODUCTION Government organizations are regularly challenged
More Power and Performance With Each Printed Card
s tan d ar d ID SOlutions GUIDE More Power and Performance With Each Printed Card the importance of secure identity Today s society shares information at incredible speeds. A technologically advanced world
THE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Durability of Smart Cards for Government eid
Durability of Smart Cards for Government eid Part of a Series of Datacard Group White Papers for the Secure Document Issuer DURABILITY OF SMART CARDS FOR GOVERNMENT EID Overview To be successful, a Government
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
Complete. security. begins with 3M
Complete security begins with : Global Helping to protect people, documents and goods Leadership in the Security Industry For more than 30 years, Security has been a trusted partner, helping governments
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Establishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security [email protected]
Electronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
Printing/Encoding and Engraving Solutions
Printing/Encoding and Engraving Solutions FARGO HDP8500LE Industrial Card Laser Engraver Engrave durability and confidence into ultra-high security credentials. Laser Engraving Technology in the FARGO
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
Entrust Smartcard & USB Authentication
Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Best Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
DNP CX-330 Card Printer
Advanced Network & Security Features DNP CX-330 Card Printer NEW September 2007 Dai Nippon Printing Co., Ltd. Product Concept CX-330 is a network & security enhanced version of CX-320. CX-320 + Network
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
Future directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
Integrated Identity Management Whitepaper
Integrated Identity Management Whitepaper Tom Stiles, Identification Systems Group 9600 N. Locust Drive Kansas City, MO 64155 Phone: 816.582.1596 [email protected] Contents 1. Introduction......
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
Checking Identification
ServSafe Alcohol Fundamentals of Responsible Alcohol Service 3 Checking Identification After completing this chapter, you should be able to: Identify acceptable forms of identification. Identify the characteristics
Understanding Technologies for Creating High-Security ID Cards
Understanding Technologies for Creating High-Security ID Cards ID CARDS AND PRINTERS Security is an important priority for organizations today more than ever. Having secure access control and identification
EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
ID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
European Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Zebra ZXP Series 8 Retransfer Card Printer. F r e q u e n t l y A s k e d Q u e s t i o n s
Zebra ZXP Series 8 Retransfer Card Printer F r e q u e n t l y A s k e d Q u e s t i o n s Copyrights 2009 ZIH Corp. Zebra and the Zebra head graphic are registered trademarks of ZIH Corp. All rights reserved.
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
DATACARD ARTISTA VHD RETRANSFER COLOR PRINTING MODULE. Innovative Technology for the Datacard MX6000 Card Issuance System
DATACARD ARTISTA VHD RETRANSFER COLOR PRINTING MODULE Innovative Technology for the Datacard MX6000 Card Issuance System EVERYTHING YOU EVER WANTED IN INLINE COLOR PRINTING The Datacard Artista VHD retransfer
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Deputy Chief Executive Netrust Pte Ltd
ICAO Public Key Directory R Rajeshkumar R Rajeshkumar Deputy Chief Executive Netrust Pte Ltd The trust imperative E-Passports are issued by entities that assert trust Trust depends on the requirements
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
Integration of Access Security with Cloud- Based Credentialing Services
Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
NC CJIN Governing Board. 13 October, 2011. George A. White
Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements
Smart Cards for Payment Systems
White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Zebra Card Printers Supplies List P330i/P430i with UHF Gen 2 RFID Encoder
Zebra Card Printers Supplies List P330i/P430i with UHF Gen 2 RFID Encoder Genuine Zebra Supplies Your choice of card printer supplies is critical - the quality of cards, ribbons and other items affects
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
EMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
For Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
intertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version 3 2011
intertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version 3 2011 Copyright 2003-2011 by Salamander Technologies, Inc. Protected by US Patents 5,573,278;
EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards
Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart
Operational and Technical security of Electronic Passports
European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal
The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group
The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group Abstract: Visa Inc. and MasterCard recently announced plans to accelerate chip migration in the
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
