Biometric Authentication. The Myths and The Facts

Size: px
Start display at page:

Download "Biometric Authentication. The Myths and The Facts"

Transcription

1 Biometric Authentication The Myths and The Facts

2 About Delaney Secure Specialising in Biometric Authentication Founded 2003 by Trevor Swainson UK and Ireland Distributor Fingerprint vendors such as Authentec (UPEK), Crossmatch, L1, DigitalPersona, Futrionics, M2SYS, Softex Inc, Neurotechnology & SecuGen Vein vendors such as M2SYS, Fujitsu-PFU & Hitachi Currently growing at 300% per annum Paul Guckian, CEO Background in IT Audit & Assurance - CISA, CISM, MSc, BSc Worked primarily in financial services, Big4 and larger audit consultancies

3 Authentication as a security priority

4 Business drivers for better authentication Business Values IT Cost savings (ROI) Staff Efficiency Regulatory Compliance & Security Increased Revenue IT Cost Reductions Single multi-factor authentication platform Self Reset & Helpdesk support for PWD reset User/Application administration under one management console Leverage current directory infrastructure Security & Compliances Multi-Factor Authentication SSO/eSSO Integrated Encryption Integrated Management Console Efficiency & Ease of Use No delays because of PWD reset Access anywhere via Roaming sessions Reduced session start-up time

5 Strong Authentication Something that you know, e.g. password, bank PIN It has the problem that things that you know can be accidentally or deliberately passed to someone else. The potential damage of such transfer may be limited by the possibility of rendering the transferred knowledge useless by changing the password, PIN etc. Something that you have, e.g. smart card, bank card, token key fob. Again, it may accidentally or deliberately be transferred. Again, the damage done by such transfer can be remedied by cancelling the device, or physically recovering it. Something that you are, e.g. your fingerprints, iris, voice. This is biometric authentication. This cannot easily be transferred to someone else, so in theory it is the ideal means of authentication. It has some other problems, however.

6 Biometric Authentication

7 Biometric Authentication Wide variety of applications throughout consumer, commercial and government organisations. Consumer Enterprise Government Convenience Convenience & Security Security focus on the commercial applications

8 Biometric Authentication in The Movies

9 Six Common Myths 1. Biometrics is a new idea Evidence of biometric identification used in the building of the pyramids Huge quality improvements in the last 10 years especially 2. Iris recognition devices use lasers to scan your eyes First company to produce such a system called itself IrisScan (now Iridian Technologies) Iris recognition camera takes a black and white picture from up to 24 inches away and uses non-invasive, nearinfrared illumination 3. Stolen body parts will work Most biometric devices there is an element of liveness detection, which can measure many variables, from a finger pulse to a pupil response. Extracted (or enucleated) eyeball quickly begins to decompose, with the cornea clouding over and obscuring the iris. A severed finger also dies rapidly typically becoming useless after around 10 minutes. 4. Inability to enrol or verify children or Asian women Recent advances in imaging have led to greater resolutions being achieved by fingerprint sensors At least 1,300 primary schools in the UK are using fingerprint technology to replace old-fashioned password-based systems in their libraries 5. Commercial fingerprint system could be used by police Stems from a misunderstanding of how a biometric system typically works in a commercial environment. Systems use a limited template which is typically encrypted, and cannot be reverse engineered The feeding of identical template data to a fingerprint system s matching engine by a hacker will normally fail, as this is almost a sure indication that the data has been stolen and that a replay attack is underway. 6. Biometrics are the silver bullet that will rid the world of terrorism/evil they are only able to confirm whether this is the same person that initially enrolled into the system e.g. if a government doesn t have a quality photograph of a known terrorist suspect, then the chances of stopping that person at a checkpoint using facial recognition are slim.

10 Commercial vs. Government Systems Objective Feature Government Commercial Beyond reasonable doubt On the balance of probability Stored Image Full Templates Security vs. Convenience Testing Requirements Hardware Specifications No of enrolled users Security Rigorous Detailed Large Balanced Reasonable High Level Limited

11 Biometric Authentication - Options Fingerprint Finger Vein (Hitachi) Palm Vein (Fujitsu) Iris Face Recognition Hand Geometry Keystroke Dynamics Retina Signature Voice DNA

12 Biometric Authentication - Options Courtesy of the International Biometric Group

13 Biometric Authentication - Options Courtesy of the International Biometric Group

14 Commerical Uses of Biometric Authentication File/Folder Lock OTP Soft Token Password Replacement Quick Launch SECURITY Secure Your Device CONVENIENCE Turbo Scrolling Application Lock Unlock NFC- Based Mobile Wallet E-Commerce Transactions Touchpad Navigation

15 Typical Commercial Applications Network Access (Windows Domain) Single or multi-factor options (passwords, biometric, smartcards, token, OTP) Easy to integrate as standalone or Windows AD integrated solutions Looks and feels like Windows AD administration Application Authentication (via SDKs) Particularly payment applications Non-repudiation of user authentication Free or low cost SDKs Physical Access Control Integrated with door entry or club membership systems Single or multifactor (PIN, smartcard and iris recognition) Time and Attendance Stops buddy punching

16 Growth in Commercial Biometric Authentication Embedded biometric readers driving growth Top 9 Laptop OEMs Shipping Models in 2011 Over 13 Million Phones Shipped with Biometric Sensors Maturity of the fingerprint technology It works Its cheap Its convenient

17 Key Advantages Convenience Cannot forget, lose or share biometric data easily Reduces costs and risks of password resets Little user education Improved security - address the weak human element Users never know their password Cannot be easily socially engineered via remote methods Complex passwords without user education Non-repudiation of transactions Unequivocally link an individual to a transaction or event. Varying quality of proof (e.g. vein vs. fingerprint) Cost Lower cost of ownership than other multi-factor solutions Full integrated platforms with biometric, smartcard and token options

18 Key Limitations User Enrolment needs to be robust Systems provide authentication, not identification Need good quality template for matching Replay Attacks Biometric templates don t change over time, but can change algorithm Some systems don't have a replay detection mechanism, and some do. Forgery Biometric templates are difficult but not impossible to duplicate Fingerprints are left behind, but typically not good enough quality. Vein, Iris and others leave no residual trace Scalability Huge advances in fingerprint matching algorithms, but some progress required for vein and other larger templates to scale to national level

19 Comparison with Other Authentication Solutions Courtesy of IEEE, Vol. 91, No 12, Dec 2003

20 How Fingerprint Authentication Works?

21 Template Verification in action CAPTURE Fingerprint Sensor FEATURE EXTRACTION Mathematical Function Template TEMPLATE REGISTRATION Touch Sensor 4 Times Registration Template Store in Database 21

22 Template Matching in Action MATCH (verification) Touch Sensor FEATURE EXTRACTION Template COMPARE (Mathematically) OK FAIL Registration Template Enable Authentication NO Authentication DigitalPersona Company CONFIDENTIAL 22

23 Hardware Features finger RF signal Injection (508 dpi) FIPS 201 certified Technique: reads live skin, improving capture reliability and quality Performance: Delivers excellent performance: FMR, FRR, FTE Operation: Works for many finger types (wet/dry/damaged) and capture conditions e.g. light Protection: SteelCoat protective coating for better sensor durability Security: Eliminates the capture of latent images & replay attacks Certification: FBI Certified or FIPS-201 Certified readers

24 Image Quality vs. Fingerprint Pressure Image Quality (NFIQ) vs Finger Pressure (N) NFIQ (1=Best, 5=Poor N (v.soft) 5N(soft) 7N (med) 9N (hard) 11N (v. hard) Finger Pressure (N) CrossMatch V300 UPEK TCS1-EIM Image quality score consistently better, over wide range of finger capture pressures Ref: Purdue University study: Dr Eric Kukula Aug 2007

25 Impact of light on fingerprint readers Placement Fingerprint Sensors Keeps image quality (Unaffected) Optical Fingerprint Sensors Images wash out (Effected) Dynamic range: 184 (meets FIPS-201) Dynamic range: 59 (not meet FIPS-201)

26 Mainstream SDK s Application Authentication: Biometric SDKs Consumer market software suite APP Packaged Application Full Application Software High level SDK (identity infrastruct. level) HIGH Application Bolt-On PBA + user authentication Mainstream library (SDK) MID Tight Integration With Software Application Suitable for 3 rd party application development on all major OS; Access to most commonly required features (image capture, enroll, match) Low level, device dependant interface LOW Tight Integration with Hardware Basic Biometric Operations & Low level access to the sensor/module features DRV Device Driver USB

27 Audit of Biometric Systems

28 Common Biometric Standards Standard Description Details FIPS (NIST) FIPS (NIST) IAFIS (FBI) Cryptographic modules produced by private sector vendors that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. Architecture and technical requirements for a common identification standard for Federal employees and contractors Integrated Automated Fingerprint Identification System (IAFIS) Image Quality Specifications (IQS) L1: cryptographic only; L2: cryptographic & anti-tampering L3: cryptographic & anti-tampering and data deletion L4: Protection of critical security parameters - Assurance provided by the issuer of an identity credential that the individual in possession of the credential has been correctly identified - Protection provided to an identity credential stored within the PIV Card and transmitted between the card and the PIV issuance and usage infrastructure - Protection provided to the identity verification system infrastructure and components throughout the entire life cycle. The certification process is not intended to endorse one product over a competitor's product but merely to certify that the product meets FBI standards

29 Biometric System Functions Enrolment Data Storage Data acquisition Transmission Signal processing Decision The step with ensures identification of the end user, and registration of a high quality template. Check the FTER rate. TIP: Use you best quality reader here Storage of the template in a data repository (e.g. SQL database or Active Directory) TIP: Use FIPS-401 compliant software The user input to the matching process. Need a good quality, consistent and clean input for best matching Check the security of the data transmission between hardware and the software. Encryption is highly recommended. Matching algorithm which matches and validates the data. Ensure that the right level of sensitivity is set The output of the matching algorithm leads to FAR and FRR statistics

30 Performance Measures Measurement Description Calculation Improvements False Rejection Rate (FRR) False Acceptance Rate (FAR) A valid subject is rejected by the system A invalid subject is accepted by the system Number of false rejections / Number of attempts Number of invalid user acceptances / Number of attempts Re-enrol the user - Better hardware - Better environment - Better biometric characteristic Improve user input Failure to Enrol (FTER) User not registered by the system No of failed enrolments / Number of attempts Adjust software sensitivity Enrolment Time Time to register new user Time from submission to confirmation Throughput Rate Time taken to validate Time from submission to confirmation Improved matching algorithm

31 Data Storage Security of the template transmission and storage is key (think RSA security breach) Considerations between local (cached storage) and centralised storage Speed Security Resilience Scalability of solutions Key decisions about system architecture Consider size of templates and speed of matching Protect the templates for replacement, tampering, loss and destruction

32 Three types of attacks Trial-and-error attack Classic way of measuring biometric strength Digital spoofing Transmit a digital pattern that mimics that of a legitimate user s biometric signature Similar to password sniffing and replay Biometrics can t prevent such attacks by themselves Physical spoofing Present a biometric sensor with an image that mimics the appearance of a legitimate user Example Type of Attack Note: Assumes that token is not stolen Average Attack Space Reusable Passwords Interactive or Off-Line 2 1 to 2 45 Biometrics Team 2 6 to 2 19 One-Time Password Tokens Interactive 2 19 to 2 63 or Off-Line Public Key Tokens Off-Line 2 63 to 2 116

33 Common technical attacks

34 Common management challenges

35 Audit procedure using ISACA G36 Selecting & Acquiring the Biometric System Risk analysis of security controls User acceptance of the biometric characteristic selected Operation and Maintenance of the Biometric System User access management enrolment, updating and removal System interface with other applications User Training & Acceptance User enrolment procedures, and template quality scores User understanding of the use of templates (e.g. privacy concerns) System Performance Monitoring of FRR, FAR and FTER, and review of system security parameters Application & Database Controls Controlling access to the back-end stored data and parameters Audit Trails Ensuring the audit logs are secured and stored for review

36 Quick guides to better audit reports Use certified hardware (e.g. FIPS-201, FBI) Use certified software (e.g. FIPS-201, FBI) Tightly control user enrolment with the best quality hardware and environmental conditions Ensure secure communication between the hardware and software Use as a multi-factor authentication, with token for external and password internally for example Consider the convenience, but don t forget the security

37 Quick guide to better biometric projects Hardware Usability tightly control enrolment, no exceptions Durability pick the best hardware, not the most expensive, ask for independent reports Security consider certifications, consider communication security & tampering Cost more expensive doesn t mean better, but cheap may undermine the entire project Software Features balance convenience with security Integration (Scalability) select a biometric characteristic that scales suitably (1:N), or adapt system to use 1:1 matching (e.g. using username) Security consider certification, ensure encryption of template and communications Cost - more expensive doesn t mean better, but cheap may undermine the entire project

38 The future

39 Tokens and biometrics Soft or hard tokens integrated with biometric readers Swipe releases or enables a unique token Can be used as part of a soft-token generation algorithm

40 Biometric Tokens: Applications Mobile Banking Enhancement to token only solutions Replaces PIN numbers, or acts as 3 rd factor Secure Remote Access Enhancement to token only solutions Replaces PIN numbers, or acts as 3 rd factor Payment Applications Enhancement to token only solutions Replaces PIN numbers, or acts as 3 rd factor

41 Smartcard and biometrics Match-on-card Person's fingerprint and face templates on a smart card and performs template matching in a microprocessor embedded in the card instead of matching biometric information on a PC processor. Biometric template stored on the card Matching applet stored on the card Match on terminal Person's fingerprint and face templates on a smart card and performs template matching in a microprocessor embedded in the card instead of matching biometric information on a PC processor. Biometric template stored on the card Matching applet stored on the terminal The native level fingerprint matching implementation requires less than 8 kilobytes for algorithm code, less than 1,700 bytes RAM for data and 1,300-1,700 bytes for template storage. The Java Card postissuance library for fingerprint matching requires less than 13 kilobytes for algorithm code, less than 600 bytes RAM for data and less than 1 kilobyte for template storage.

42 Biometric Card: Applications Chip and PIN replacement ATM Machines (Deutsche Bank, Bank of Tokyo-Mitsubishi) epos PDQ machines Age verification Nightclubs - Reduction in nightclub violence in Oz Off-licence Club membership Prevents membership sharing Enables unmanned gyms and other services

43 Summary: Why biometrics? Convenient Secure Scalable Cost effective Easy to Deploy Manageable Integration Addresses some of the human weaknesses of password security and other two-factor solutions Eliminates insecure passwords that are used to protect operating systems, database access, server and client data, s, applications and more Designed to scale from one user to thousands of users with multiple types of authentication devices Available as single multi-factor platforms - costs of other mix and match solutions can cost much more. Can be deployed on customer images and connected to a centralized Enterprise server at any time. Ties into standard tools used by IT managers to manage user information and users (e.g. Windows MMC) Can be adapted and re-engineered as required to meet customer requirements, with smartcards and tokens if required

44 Questions & Discussion Thank You Paul Guckian DelaneySecure Ltd W: T: (01342) E: Disclaimer: This presentation is intended for private entertainment and general educational purposes only in the context of the BCS IRMA group, and contains some references to restricted and copyright information. The information is of a general nature, and no reliance should be placed on the information contained herein.

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006 HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

SCB Access Single Sign-On PC Secure Logon

SCB Access Single Sign-On PC Secure Logon SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Strong Authentication for PIV and PIV-I using PKI and Biometrics

Strong Authentication for PIV and PIV-I using PKI and Biometrics Strong Authentication for PIV and PIV-I using PKI and Biometrics Adam Shane PSP, Product Manager and Sr. Systems Design Architect AMAG Technology Bob Fontana CSCIP/G, Vice President-Federal Identity Codebench/HID

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

Finger Vein digital biometric signature: use cases

Finger Vein digital biometric signature: use cases Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

White paper Fujitsu Identity Management and PalmSecure

White paper Fujitsu Identity Management and PalmSecure White paper Fujitsu Identity Management and PalmSecure To protect your business, it s critical that you can control who accesses your data, systems and premises. Today, many organizations rely on passwords

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

2 factor + 2. Authentication. way

2 factor + 2. Authentication. way 2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

ADVANCE AUTHENTICATION TECHNIQUES

ADVANCE AUTHENTICATION TECHNIQUES ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

True Identity solution

True Identity solution Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007 White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

Trends in Finger Vein Authentication and Deployment in Europe

Trends in Finger Vein Authentication and Deployment in Europe Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:

More information

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company 3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Alternative authentication what does it really provide?

Alternative authentication what does it really provide? Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies

More information

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Digital identity: Toward more convenient, more secure online authentication

Digital identity: Toward more convenient, more secure online authentication Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based

More information

Two Factor Authentication for VPN Access

Two Factor Authentication for VPN Access Trends in cloud computing, workforce mobility, and BYOD policies have introduced serious new vulnerabilities for enterprise networks. Every few weeks, we learn about a new instance of compromised security.

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Authentication Levels. White Paper April 23, 2014

Authentication Levels. White Paper April 23, 2014 Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s) Frequently Asked Questions (FAQ s) November, 2013 This list of FAQs is a subset of a larger list derived by the Agency. This list is tailored to meet the needs of users at Headquarters. If you do not find

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Scalable Authentication

Scalable Authentication Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

2 FACTOR + 2. Authentication WAY

2 FACTOR + 2. Authentication WAY 2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information