Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions



Similar documents
Intel Identity Protection Technology (IPT)

with PKI Use Case Guide

Deeper Levels of Security with Intel Identity Protection Technology

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Media SDK Library Distribution and Dispatching Process

CLOUD SECURITY: Secure Your Infrastructure

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel SSD 520 Series Specification Update

Intel Desktop Board D945GCPE Specification Update

Intel Desktop Board DP55WB

Intel Desktop Board D945GCPE

Intel Desktop Board DG41BI

Intel Desktop Board DG43RK

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011

Intel Desktop Board DG41TY

Intel Desktop Board DG41WV

Intel Desktop Board DG31PR

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel Desktop Board DQ43AP

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel Desktop Board D945GCL

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Desktop Board DP43BF

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Intel Desktop Board DQ35JO

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Desktop Board DQ965GF

Intel Desktop Board DG965RY

Intel Service Assurance Administrator. Product Overview

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

The Case for Rack Scale Architecture

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel Desktop Board DG33TL

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Desktop Board D101GGC Specification Update

Intel Platform Controller Hub EG20T

Software Token Security & Provisioning: Innovation Galore!

RAID and Storage Options Available on Intel Server Boards and Systems

Cloud based Holdfast Electronic Sports Game Platform

Citrix and Intel Deliver Client Virtualization

Intel Modular Server System MFSYS25

Intel Virtualization Technology (VT) in Converged Application Platforms

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum

Resetting USB drive using Windows Diskpart command

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel System Event Log (SEL) Viewer Utility

Intel Trusted Platforms Overview

Specification Update. January 2014

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

Intel Technical Advisory

Intel Network Builders

Intel vpro Technology Module for Microsoft* Windows PowerShell*

System Image Recovery* Training Foils

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Intel Extreme Memory Profile (Intel XMP) DDR3 Technology

Software Solutions for Multi-Display Setups

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Intel RAID RS25 Series Performance

System Event Log (SEL) Viewer User Guide

iscsi Quick-Connect Guide for Red Hat Linux

Intel HTML5 Development Environment Article Using the App Dev Center

RAID and Storage Options Available on Intel Server Boards and Systems based on Intel 5500/5520 and 3420 PCH Chipset

Running Windows 8 on top of Android with KVM. 21 October Zhi Wang, Jun Nakajima, Jack Ren

Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

How To Reduce Pci Dss Scope

Intel Data Migration Software

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0*

DDR2 x16 Hardware Implementation Utilizing the Intel EP80579 Integrated Processor Product Line

Intel Desktop Board DG43NB

Intel Desktop Board D945GCZ

How To Get A New Computer For Your Business

Hormuzd Khosravi, Principal Engineer, Intel Corporation

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Douglas Fisher Vice President General Manager, Software and Services Group Intel Corporation

How To Manage A Plethora Of Identities In A Cloud System (Saas)

Intel Internet of Things (IoT) Developer Kit

Intel Solid-State Drives Increase Productivity of Product Design and Simulation

Intel Small Business Advantage (Intel SBA) Release Notes for OEMs

Intel Desktop public roadmap

Version Rev. 1.0

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Intel Matrix Storage Console

Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Unite Solution. Standalone User Guide

Intel Atom Processor E3800 Product Family

Intel Server Board S3420GPRX Intel Server System SR1630GPRX Intel Server System SR1630HGPRX

VNF & Performance: A practical approach

Intel 815 Chipset Platform for Use with Universal Socket 370

Transcription:

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation 1 Copyright 2013, Intel Corporation. All rights reserved.

Your questions coming into this session 1. What improved user-friendly authentication is this all about? 2. What is it that Intel offers to support this? 3. What is it that VASCO offers to support this? 2

3 ebanking use case

4 Garanti example existing login using hardware token generated OTP

Garanti example existing login using hardware token generated OTP Enter hardware token generated One-Time Password for 2 nd factor authentication 5

6 Garanti example existing login using hardware token generated OTP

7 Garanti example existing login using SMS generated OTP

8 Garanti example existing login using SMS generated OTP

9 Garanti example existing login using SMS generated OTP

10 Garanti example NEW : login on an IPT system

11 Garanti example NEW : login on an IPT system

I see the benefits so it s most likely giving up some security No, it s not 12

13 Enterprise VPN use case

14 VPN example existing login by typing in a hardware token generated OTP

VPN example NEW : login by copy - paste of OTP My VPN token - X 16834096 copy 15

I see the benefits but it s not really something new is it well it is 16

17 B2B and B2C Websites

18 B2B / B2C example traditional login with username and password only

19 B2B / B2C example NEW : login with Mydigipass.com OTP

20 B2B / B2C example NEW : login with Mydigipass.com OTP phone or token needed

21 B2B / B2C example NEW : login with Mydigipass.com OTP no phone / no token

Same as before, I see the benefits But aren t you giving up some security here Same answer: no, we re not 22

Add more security NEW : PIN protect the automatic OTP release My VPN token 0 9 7 4 1 6 3 8 2 5 My VPN token - X Enter PIN 16834096 copy 23

I get it But it s really nothing special Not if you re not a malware 24

Here s what malware, MitB, MitM sees My VPN token 0 9 7 4 1 Confirm $50,000 transfer to account 3 # 8 9237-4602 5 2 6 Enter PIN What User Sees My VPN token 0 9 7 4 3 1 8 2 What Malware Sees 6 5 Enter PIN X My VPN token - X 16834096 copy 25

26 Embedded in Webpage.

27 This is what malware sees

Protected Transaction Display Bank generates an encrypted image with transaction details and sends it to the user s PC View seen by a user View seen by malware Encrypted bitmap; On screen randomly placed keypad Remote PTD can run any size overlay and include text, logos, etc. 28

Your questions coming into this session 1. What improved user-friendly authentication is this all about? 2. What is it that Intel offers to support this? 3. What is it that VASCO offers to support this? 29

Hardware-based Security into the platform Win Apps Browsers Main OS Malware Win OS ME-based Apps ME DLL Separate RAM/Crypto ME Firmware + Security Hardware Main CPU chipset Hardware based security isolated from the host 30

Hardware-based Security into the platform Win Apps Browsers Main OS Malware Win OS ME-based Apps ME DLL Separate RAM/Crypto ME Firmware + Security Hardware Main CPU chipset Security and Manageability Firmware Improved isolation from Host execution environment Separate memory, Separate Crypto, Security building blocks: Protected Timers, Secure Key Storage, 31 Separate Work Space Enables Strong Root of Trust for Security Services

How It Works: Intel Components Intel Identity Protection Technology (IPT) Security features built into the chipset Security Service algorithm applet runs in the firmware Intel IPT generates OTP in isolated space (Intel ME) 698731 32

Intel Identity Protection Technology roadmap Atom Phones Atom Tablets Install Base Ultrabooks vpro Desktops & Laptops Core Desktops Core Tablets Core Laptops 2012 2013 2014 Mid 2013 on all Core systems and extending to Atom based phones and tablets in 2H 2013 To become ubiquitous in worldwide Intel platforms 33 Intel, Intel Core, Ultrabook, Insider, vpro, Atom and the Intel logo are trademarks or registered trademarks of Intel Corporation. *Other names and brands may be claimed as the property of others.

Your questions coming into this session 1. What improved user-friendly authentication is this all about? 2. What is it that Intel offers to support this? 3. What is it that VASCO offers to support this? 34

Intel Identity Protection Technology Service building solution blocks Internet In Premise or Cloud or Mixed Website Consumer - Enterprise Authentication Server Provisioning & Verification Services Token Record Storage 35 *Other names and brands may be claimed as the property of others.

Intel Identity Protection Technology integration into VASCO s solutions Website -- Application VASCO s methods for 2FA 36

Intel Identity Protection Technology Intel Identity Protection Technology complements / extends the existing 2FA with: Hardware based User friendly strong authentication solution 37 *Other names and brands may be claimed as the property of others.

Why is this relevant to you? Your Customer s Benefits Easy to use Protects against many types of attacks Opt-in gives you freedom Complements existing 2FA with : Hardware based User friendly strong authentication solution Enhance brand value & reputation Complements existing 2FA with 38

Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. No system can provide absolute security under all conditions. Requires an Intel Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel Core processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com. Intel, Intel Core, Ultrabook, Insider, vpro, Atom and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2013, Intel Corporation. All rights reserved. 39