Finger Vein digital biometric signature: use cases
|
|
|
- Cornelius Matthews
- 10 years ago
- Views:
Transcription
1 Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock,
2 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric signature and its applications 3. Finger Vein BioPKI server-based biometric signature 4. Finger Vein B-1 card-based biometric signature 5. Summary 1
3 1. Introduction to Finger Vein technology 2
4 Why Finger Vein in banking? Technology made for banking (Japan, 2004) Highest security level (FAR < 0,0001%) Fully protects customers privacy High acceptance by bank s customers (>85%) Positive feedback from personal data protection organizations as for use in banking Complete solution, fully adapted to the needs of banks in Europe (security, working conditions) The biggest amount of references in Europe and the world (hundreds of banks, millions of users) Compatibility of implemented solutions (templates, system) possibility to connect systems The world s first biometric technology allowing electronic signing of the documents
5 The way Finger Vein works During acquisition the comparison of the template, individual differences, varation of width of blood veins and differences in the positioning of the finger are taken into account. Comparison of the finger with registered reference template takes place on the Finger Vein biometric reader on on the chip card. Comparison of the finger with registered reference template takes place in real time (is not based on vector comparison, as in the case of fingerprints) 4
6 Finger Vein applications in banking Long-time presence on the market allowed to develop a range of readers allowing the implementation of Finger Vein technology in wide range of banking services, wherever strong authentication of the identity declared by customer is required. BRANCHES ATMs CORPORATE BANKING FRANCHISE BRANCHES ACCESS CONTROL BIOMETRIC SIGNATURE DEPOSIT BOXES POS VTM 5
7 Security level Comparison with other authorization methods Finger Vein + PKI Complete identity confirmation Finger Vein / iris Complete identity confirmation Token (SecurID) One-time passwords (OTP) login / pass Fingerprint (np.. Apple Pay) NFC Payment volume 6
8 Selected references in financial sector BPS Group / SGB Group Biometric withdrawals from ATMs (including social benefits) in Polish cooperative banks (Poland) Bank BPH Biometric authentication of identity (branch without ID), cash transactions and operations in bank branches (Poland) Turkiye IS Bankasi The largest network of 3000 ATMs with biometric authentication - the Biyokilmlik service (Turkey) Getin Bank Biometric authentication of identity and transactions in new Getin Up branches and Getin Point self-service branches (Poland) Banque Accord Implementation of Finger Vein biometric payments in Auchan stores (France) Planet Cash Europe s first ATM network enabling biometric withdrawals to the customers of various banks (Poland) Barclays Bank Finger Vein authentication system in corporate and internet banking in Barclays Bank (UK) Finger Vein in Japan The largest biometric project in the world over 80 thousand ATMs, over 80% of Finger Vein share in the market (Japan) New York s Shinkin Central Bank Implementation of Finger Vein biometric access control to most protected areas (USA) 7
9 2. Digital biometric signature and its applications 8
10 Definition of digital biometric signature Digital biometric signature is a combination of biometric technology with PKI infrastructure, to ensure the integrity of the signed document by the use of biometrics to authenticate access to cryptographic keys by which the classic electronic signature is made. Biometric signature can be implemented in two models: Server-based Model Private key of the user is stored on bank s servers or servers of trusted thord party Finger Vein BioPKI Card-based Model Private key of the user is stored on the chip card Finger Vein B-1 9
11 Finger Vein biometric signature models Server-based Model Finger Vein BioPKI Area of application: bank s own branches network partner s branches network mobile advisor self-service bank branches (VTM) Scope of application: signing of documents between Bank and Customer (agreements, applications, etc.), both by the Customer and employee of the Bank signing of internal documentation by the employye of the Bank Example of implementation: Getin Bank Authorization of access to the private keys, stored in the central HSM in the Bank, through the Finger Vein biometric technology. Card-based Model Finger Vein B-1 Area of application: corporate banking (corporate customers and SME) internet banking for retail and private banking customer Scope of application: Login to electornic banking platform Authorization of transactions and signing of documents in the remote channels (on the electronic banking platform) Example of implementation: Barclays Bank Authorization of access to the private keys, stored on the user s chip card, through the Finger Vein biometric technology. 10
12 Finger Vein biometric signature and handwritten signature biometrics 11
13 3. Finger Vein BioPKI server-based biometric signature 12
14 Business case Reduction of paper documents workflow at the Bank (paperless) - reducing the cost of printing, scanning, indexing, transport, archiving and culling the paper documents Increased security comparing to traditional handwritten signature verification No after-sales forwarding, dropping, abuse documents Short sales processes (time-to-cash) - to increase sales effectiveness by reducing the duration of the signing documents procedure and gain time for advisory services The possibility of moving FTE used for the processing of documents for the sales processes Automatic control of Who (completeness of signatures), Where (location in which signature was made) and When (time stamp) signed the document, enabling streamlining of audit procedures (no change since the signing of the document). 13
15 Principle of functioning Finger Vein BioPKI biometric signature solution allows for issuance and management of customer certificates, and for the ability to sign documents / agreements at the branch using Finger Vein reader. The signed document in electronic form may be submitted to the bank repository. Bank may offer to the customer placing the signed agreement in electronic form on customer s internet account. 14
16 Sulotion elements Finger Vein Server central software (heart of the system) Obrazowanie wzorców FingerVein Finger Vein BioPKI Server and Finger Vein CA biometric signature software FV Monitor Management Module and FV Content Management Module monitor s software network (ethernet) Finger Vein reader network (ethernet) Finger Vein monitor (12 ) 3 Finger Vein infrastructure 2 FV 1 15
17 4. Finger Vein B-1 card-based biometric signature 16
18 Business case Reduction of frauds in remote channel, caused by users sharing the access to their account, by introducing the strongest method of user identity authentication Reduction of frauds in remote channel, caused by the action of hackers, through the introduction of technology, which allows for 100% authentication of identity of the user who confirm the operation in the electronic banking system Faster and easier support for users of corporate banking system by eliminating the access codes (PIN) Reduction of costs associated with the issuance, personalization and distribution of smart cards to corporate customers, as well as handling the claims related to PIN codes, comparing with the standard card-based PKI 17
19 Change of approach Unique combination of established technologies Security and Customer Experience Links the individual clearly to the transaction Replaces the PIN with high performance biometric identifier. Secure biometrics (Finger Vein) Cryptographic SIM Achieves individual non-repudiation Eliminates card-sharing.. Gives the possibility to eliminate the necessity of sharing the date, including personal data, ssimplify card management and lower costs Generate keys and certificates onsite, at user enrolment Possible no pre-personalisation of cards Low impact on current infrastructure build on standard authentication platforms and protocols such as PKCS11 minimal impact on endpoints Sign What You See 18
20 Solution components Banking portal 1. Finger Vein B-1 biometric PC (customer) Finger Vein reader 2. CAP card applet (PKI + Finger Internet browser PLUG-IN 4 Vein biometrics) 3. LIB middleware PKCS#11 3 LIB CCID driver (Windows) library 4. PLUG-IN plug-in to the browser (fo the purpose of integration) Bank Hitachi 1 SIM card CAP 2 Others PIN 19
21 Card personalisation modes (workflow) Key Generic blank SIM card SIM with keys and finger vein CA Hitachi PKI+FV CAP CardCo1 CardCo2 blank SIM Bank blank SIM Customer1 Customer2 Customer3 POST-PERSONALISATION MODE Certificate Key SIM with keys and PIN CA PIN Customer1 Bank CardCo Customer2 Certificate PIN Customer3 PRE-PERSONALISATION MODE Registration 20
22 Customer HTTPS PKCS#7 UTF8 Bank Transaction signing workflow Create parameters for signing application Check signature and payload Store and log transaction data Checks and compiles business txn Create signing web page Internet Send txn data to back-end Presents SWYS window SHA256 digest Build signed data package Verify finger Data is signed Create transaction Click Sign Place finger 21
23 5. Summary 22
24 Summary The use of biometric signature technology enables fully to implement the idea of "paperless" and "digital banking" in the Bank. Security of biometric signature is mainly based on the level of security of the used biometric technology (necessity to use biometrics with the highest security factors available on the market => Finger Vein) Depending on the area of using the biometric signatures necessary is to select the appropriate fuctioning model of the biometric signature: 1. Server-based model (Finger Vein BioPKI) - ideal for applications in the relationship with the retail customer (bank branches) 2. Card-based model (Finger Vein B-1) - dedicated to internet banking, with an indication on corporate banking The necessity of use of the card-based model of digital biometric signature (Finger Vein B-1) in the corporate banking channel stems from the fact that the Bank has repeatedly does not have a direct relationship with the user of the system (employee of a company that uses the services of the Bank). Such situation generates controversy for a central processing and storage of biometric templates of the user. 23
25 Thank you for attention Arkadiusz Buroń Presales & Account Director Information Systems Group Serock,
26
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Agenda 1. Biometric e-signature: what is it? 2. Possible Biometric Signature Applications 3. Biometric Electronic
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST [email protected]
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal
TouchPay Enabling the Future of Payments. Concept Document Stadium Ticketing and Registration Solutions
TouchPay Enabling the Future of Payments Concept Document Stadium Ticketing and Registration Solutions Problem Statement Stadiums in Southern Africa are seeking a simplified way of dealing with the following
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Hospital Certified Electronic Health Record (EHR) Technology Questionnaire
Page 1 of 10 Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire. The Office of Inspector General (OIG) is conducting this
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Jrsys International Corp.
Jrsys International Corp. Advance Mobile/Cloud Security Solutions James Wu www.jrsys.com.tw Jrsys Introduction Friends from 128 countries Mobile and Cloud security solution provider Secure mobile devices:
MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Authentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
PostFiles. The file sharing and synchronization solution dedicated to professionals. www.oodrive.com
PostFiles The file sharing and synchronization solution dedicated to professionals www.oodrive.com Share all file types, regardless of size or format. Synchronize and read files across several devices.
SAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Electronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta [email protected] Content
Document Digital Signature
Supplier handbook Software Configuration for Digital Signature and Timestamp to certificate-based signature Document objectives and structure The document aims to support suppliers during the following
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
The concept of biometric digital signatures based on Hitachi activities in Japan
The concept of biometric digital signatures based on Hitachi activities in Japan Koncepcja biometrycznego podpisu kwalifikowanego na podstawie działań Hitachi w Japonii Hitachi, Hitachi, Ltd. Ltd. 2010.
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1
QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Shakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
AADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
Multifactor authentication systems Jiří Sobotka, Radek Doležel
Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: [email protected] Fakulta elektrotechniky a komunikačních technologií
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE
MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE Hospitals that have received Medicare incentive payments for meaningful use of electronic health records have been asked by the Office of Inspector General of
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
id center definitely with biometrics strong authentication
id center definitely with biometrics strong authentication ID Center Functions Convenient, secure, efficient - ID Center recognizes a person s identity within sec-onds via their fingerprint, palm vein
FBZ General Information. Cloud Mobile Banking 13,10,14-5. Copyright FBZ 2012-2013 All rights reserved
FBZ General Information Cloud Mobile Banking 13,10,14-5 Copyright FBZ 2012-2013 All rights reserved FBZ General information Cloud Banking Copyright (c) 2012-2013 Page 1 Read this first Thank you for choosing
Secured Signing for Documents
Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local
Deploying Smart Cards in Your Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The merging of physical access technology with public key-enabled smart card technology has been an emerging trend that has occurred in the security industry
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
RAPIDS Self Service User Guide
Page 1 RAPIDS Self Service User Guide https://www.dmdc.osd.mil/self_service Page 2 Introduction The RAPIDS Self Service (RSS) application provides sponsors with the capability to generate a DD Form 1172-2
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
PalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
How Secure is Authentication?
FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
PrivateServer HSM Integration with Microsoft IIS
PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document
Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)
Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components
Your responses will be saved every time you click the NEXT button.
Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire The Office of Inspector General (OIG) is conducting this survey as part
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
