Guard All Security Symposium. Identity and Access Management

Similar documents
NACCU Migrating to Contactless:

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

advant advanced contactless smart card system

Readers and Credentials. from Security Technologies

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

The Convergence of IT Security and Physical Access Control

CRESCENDO SERIES Smart Cards. Smart Card Solutions

Integrated Identity Management Whitepaper

The Convergence of IT Security and Physical Access Control

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Executive Summary P 1. ActivIdentity

Training MIFARE SDK. Public. MobileKnowledge June 2015

Smart Cards and Biometrics in Physical Access Control Systems

Student ID card and campus security solutions. Colleges and universities

SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

FACILITY PHYSICAL ACCESS CONTROL SYSTEM SURVEY for use by the NMSAC TWIC Working Group ONLY ****************************************

Functional Specification Document

AD-Series. Selection Guide

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

iclass MHz Contactless Cards and Readers ACCESS SECURE IDENTITY

Jolly Encoder Configuration Guide

SYMMETRY PRODUCT OVERVIEW

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Using Contactless Smart Cards for Secure Applications

Contactless Solutions

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

John Beckwith Loyola Marymount. Access Control - Where are we and where are we going?

Enhancing the Contactless Cards UAT. Enabling faster and efficient transactions.

Time & Access System An RFID based technology

Card Personalization Software. Asure ID 7

The Future Of Cloud based Ticketing. Ernst Bovelander Director Advisory Services

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Bridging the Great Divide. The Convergence of Physical and Logical Security

A Fully Integrated Online Hotel Locking System

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Credential and Workflow Design with TruCredential. DataCard Corporation. All rights reserved.

Contactless Technology for Secure Physical Access: Technology and Standards Choices

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

Access Professional Edition Selection Guide

Using Smart Cards for Secure Physical Access

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Audio: This overview module contains an introduction, five lessons, and a conclusion.

ACR120 Technical Specifications version 2.9 November 2005

Trust: When Physical and Logical Security Worlds Collide

Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST A, Date: 8 juli 2013

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

L-1 Fingerprint Reader Solutions. V-Flex 4G

Cogito Security Management System

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

An Effective Approach to Open Payment Systems

Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution.

Integrated Building Management and Security System. Building Automation & Security.

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

CHIPDRIVE Time Recording V7.5 CD

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV USDA

The Canadian Migration to EMV. Prepared By:

ACCESS CONTROL SYSTEM

More Power and Performance With Each Printed Card

NFC Tags & Solutions. Understanding Near Field Communication (NFC) Technology. Executive Summary

Required changes to Table 6 2 in FIPS 201

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

RFID Penetration Tests when the truth is stranger than fiction

Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World!

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Gemalto Mifare 1K Datasheet

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance

Information Technology Policy

Edge Metrics Data Center User Manual

Allegion AD-300 Installation Application Note. 1.0 Hardware Requirements. 2.0 Software/Licensing Requirements

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Electronic Access Control Catalogue

IP Card Reader Interface User Manual

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Tailored integration to suit you

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

Integrated Security System

Using RFID Techniques for a Universal Identification Device

Sell Allegion. Reap rewards.

Vendor Questionnaire

Integrated Building Management and Security System. Building Automation & Security.

mcard CPK Supported Solutions

Transcription:

Guard All Security Symposium Identity and Access Management

The Complex Digital World

Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing Integrated security systems Payment systems Ticketing & transportation systems Multi-application card Enterprise-scale logical and physical access Consumer loyalty systems Transportation and payment systems NFC targeted marketing ID Products Physical / logical access readers Readers & terminals Smart inlays & transponders ASICs Transportation ticketing Loyalty, transportation and event tickets Animal / object tracking Pharmaceutical labels / ID s

Identity Markets Served by Identive People-Based Non-People-Based Citizen ID Employee ID Consumer ID Food & Animal ID Object & Pharma ID Integration & Services Software System Readers & Transponders

Government Agency Customers

Government Agency Customers

Government Agency Customers

Government Agency Customers

What We Do Identity and Credentials Authenticate Authorize Alarm Audit Text; Graphics Email; SMS; Video; Integration Print; Email User Mgmt Integration

Identity and Credentials UNDERSTANDING IDENTITY

What is Identity? We don t have a clue to his identity!

The Evolution of Identity Paper ID Photo ID Digital ID 1950 1980 2010 Implementation of identity proof evolves with technology

Identity Consolidation Facebook 401k Driver s License Payroll Twitter ebenefits Passport Assets Bank Credit/FICO Personal HR Certs IT Hirsch Physical IDMS Bio PACS #1 Convergence Active Directory VPN Parking PACS #2 Public/Private Cloud SSO Identive Group, Inc. 2012

CREDENTIALS and CREDENTIALING Identity and Credentials

What Type of Credential Level of Security Required Logistics of Issuance

Proximity Functional Was the gold standard Not secure in today s world Cost is same or more than new standards. Read-only

Contactless Smart Cards Very secure. Safety is the most important reason. Read/Write Capability Multiple applications on a single card. ISO 14443 Standards. Direction of education, government, financial and commercial markets. Can be Proprietary!

Contactless Card Technology ISO 14443, 13.56 MHz Standards. Most widely used in the world. Mifare Classic Plus Desfire Desfire EV1 I-Class (ISO 15693) Felica Others

Secure Sectors Keys to doors open rooms to data blocks of various sizes and uses. Transportation Logical Access Cafeteria Biometrics Vending Physical Access

Card Security Comparison Data Encryption Message Authentication Coding Mutual Authentication Secure Common Prox

Proprietary vs. Open Proprietary cards may mean you can only use the applications provided by the vendor. Applications & sectors already defined. You are locked into that vendor and card. What if you want to add an application, like mass transit, that is not provided by the vendor? Costs ( priming cards)

Credential Consolidation Building Access Secure Network Access Information Security Time and Attendance Mobile Communications Username Password Parking Cashless Vending Cafeteria

Authentication Authenticate Authenticate

Authentication Devices Wiegand ISO/ABA Mag Stripe ISO 14443 Smart Card ISO 7816 Contact Smart Card SIA OSDP Data in from Cards Data out to Controllers

Authorization Authorize Authorize

Authentication Devices Distributed Intelligence Independent Decisions Encrypted Communications RS232, RS485, TCP/IP

Alarm Alarm Monitoring

Alarm Viewer Unacknowledged Panel Instructions to Operator Notes by Operator Acknowledged Pane

Real Time Dynamic Graphics

Auditing Audit Audit

Audit Reports Database of all Activity Paper Reports Email Reports Automatic Generation Integration