IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Similar documents
ImageWare Systems, Inc.

Improving Online Security with Strong, Personalized User Authentication

The Leading Provider of Identity Solutions and Services in the U.S.

IDENTITY SOLUTIONS FOR A BETTER WORLD

Moving to Multi-factor Authentication. Kevin Unthank

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Framework for Biometric Enabled Unified Core Banking

Digital identity: Toward more convenient, more secure online authentication

Automated Travel and Entertainment (T&E) Expense Management

Guide to Evaluating Multi-Factor Authentication Solutions

Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

French Justice Portal. Authentication methods and technologies. Page n 1

STRONGER AUTHENTICATION for CA SiteMinder

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Application of Biometric Technology Solutions to Enhance Security

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

solutions Biometrics integration

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

ADDING STRONGER AUTHENTICATION for VPN Access Control

Compare versions with Maximizer CRM 12: Summer 2013

SCB Access Single Sign-On PC Secure Logon

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Secure Your Enterprise with Usher Mobile Identity

CoSign by ARX for PIV Cards

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

PRIME IDENTITY MANAGEMENT CORE

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

BROCHURE. KenCloud TM Asset Management System. Brochure- KenCloud TM AMS. Swash Convergence Technologies Limited

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Top 5 Reasons to Choose User-Friendly Strong Authentication

Device-Centric Authentication and WebCrypto

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

BROCHURE. KenCloud TM Customer Relationship Management. Brochure- KenCloud TM CRM. Swash Convergence Technologies Limited

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Entrust IdentityGuard

Voice Authentication On-Demand: Your Voice as Your Key

Mobile Wallet Platform. Next generation mobile wallet solution

IDaaS: Managed Credentials for Local & State Emergency Responders

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Why Cloud BI? of Software-as-a-Service Business Intelligence. Executive Summary. This white paper explores the 10 substantial

Authentication Solutions Through Keystroke Dynamics

Automated Travel and Entertainment (T&E) Expense Management

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

NFC & Biometrics. Christophe Rosenberger

MORPHO CRIMINAL JUSTICE SUITE

Global Deployment of Finger Vein Authentication

Biometric SSO Authentication Using Java Enterprise System

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Coesys Border Management

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

May For other information please contact:

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

W.A.R.N. Passive Biometric ID Card Solution

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

SA Series SSL VPN Virtual Appliances

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Expertise for biometric solution

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

BehavioSec participation in the DARPA AA Phase 2

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH

ComSignTrust e-signing Solutions

Biometrics and Cyber Security

De-duplication The Complexity in the Unique ID context

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Advanced Biometric Technology

The ForeScout Difference

Full chain integration with your mobile field engineers

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Comprehensive Device Management Platform comprising of Management Suites specialized in addressing different problem domains, extensively

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Communications in the Cloud Why It Makes Sense for Today s Business

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Communications in the Cloud: Why It Makes Sense for Today s Business

U-LINC : Workflow and Notifications Anytime and Anywhere for Microsoft Dynamics GP

Trends in Finger Vein Authentication and Deployment in Europe

Modern two-factor authentication: Easy. Affordable. Secure.

Transcription:

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics

ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of experience in biometric identity management, law enforcement, border control, airport security, biometric smart-cards, military, intelligence, and more David Harding Chief Technology Officer & Vice President dharding@iwsinc.com

IWS Has Been the Pioneering Force and Established Innovator in biometric security for over 15 years, with a strong installed-base, providing advanced solutions to: San Bernardino County Sheriff s Department U.S. Department of Veteran Affairs Country of Mexico¹ LAX Los Angeles World Airports Arizona Department of Public Safety Canadian Air Transport Security Authority New South Wales Police (Australia) ¹Indirect via a prime contractor partnership

Wired Magazine Recently Ran the Headline... KILL THE PASSWORD: WHY A STRING OF CHARACTERS CAN T PROTECT US ANYMORE

MOBILE DEVICES ARE EVER-PRESENT AND ARE REPLACING THE PC Almost 40% of Americans used smart mobile devices for banking and purchases Source: Federal Reserve 2012 Android devices are expected to almost triple over 5 years, while ios could grow about 140% Source: Gartner Group 2013

SECURITY REMAINS THE BIGGEST CONCERN Among consumers who do not use mobile financial services, the principal reasons cited for not using the services are perceptions of limited usefulness and benefits, and concerns about security. Source: U.S. Federal Reserve Bank 2014 6

Cloud Computing and The Pervasive Growth of Smart, Mobile Devices has made secure identity authentication an absolute necessity. And an essential reality.

THAT REALITY IS MULTI-MODAL BIOMETRICS. 8

MULTI-MODAL BIOMETRICS UNITES MULTIPLE BIOLOGICAL TRAITS TO SECURELY CONFIRM AN IDENTITY Voice Finger Veins Palm Face Hand Geometry DNA Fingerprint Iris Signature Behavioral Retina

MULTI-MODAL BIOMETRICS OFFERS A GREATER LEVEL OF SECURITY Single-modal biometrics, historically and effectively, have serviced a defined and limited-size populous and situation. Multi-modal biometrics can be used together and/or singularly based on the situation and environment.

THE U.S. GOVERNMENT CONFIRMED MULTI- MODAL BIOMETRIC IDENTITY MANAGEMENT AS THE ONLY WAY TO MOVE FORWARD. FBI, Dept. of Defense, Law Enforcement, International Civil Aviation Organization, Homeland Security Presidential Directives 5 & 12

Multi-Modal Biometrics Will Become as Ubiquitous as Smartphones Mobile devices are the perfect biometric capture device. We have them with us. They give us access to services and data anywhere anytime.

Issues to Mobile Biometric Adoption Match-on-Device vs. Match-in-Cloud Scalability Reliability Security Modality Selection Maximizing Identity Verification Services Ease of Use

Match-on-Device Susceptible to: Theft of biometric enrollment Replacement of biometric enrollment Reverse engineering of biometric template ( hill-climbing attack ) Does not support: Enroll once, use on many applications and devices Duplicity check for enrollment verification Transfer of biometrics to new devices and/or applications Does not scale and is not trusted!

Match-in-Cloud Single, secure biometric enrollments for each modality Single, trusted source for biometric identity verification Device independent enroll once, use on any device Service and application independent Use the right biometric for the situation and environment Use multiple biometrics for high-confidence required transactions and to prevent spoofing

What s Needed to Make it Work? A real-time, high performance, highly scalable, multi-modal, biometric database Must support today s technology as well as tomorrow s Must scale to support large populations Must support anonymous verification

GoCloudID The Scalable, Cloud-based, Biometric, Identity Management Platform Reliably manages access to biometric enrollment & verification Can be used as an end-to-end or modular solution Offers full and anonymous identity management Conveniently enables applications on all mobile devices Deployment is rapidly integrated, flexible & scalable Operates as a multi-tenant system Web portal is customer/partner provisioning No start-up costs Pay-as-you-go and scale-as-you-need The Only Multi-Modal CloudID SaaS/PaaS License and/or Subscription Service Today

IWS s Patented Biometric Engine 2.0, the backend database of GoCloudID, delivers revolutionary capabilities Enrollment, identity & verification management of unlimited population sizes Hardware & algorithm independent processing Compatibility with all biometric products Future-proof, plug-n-play flexibility Full and anonymous biometric identity verification Software development kits License and/or subscription service offering as part of GoCloudID

IWS s Patented GoMobile Interactive The Cloud-Based, Interactive, Push Messaging Server for Mobile Pushes interactive messages to mobile devices Customized message workflows and integrated biometric identity authentication Software development kits for rapid integration Server Mobile applications Enables in and out-of-band identity authentication License and/or subscription service offering as part of GoCloudID

Making it Work in the Real World / Example - Out-of-Band Authentication Out-of-Band Authentication uses a mobile device to verify the identity of someone who is attempting to access data or services Biometrically enables: Website logins HTML5 mobile applications Mobile wallet and credit card transactions Loan applications Anytime you need to verify an identity

Steps to Biometric Verification Using a Mobile Device using Out-of-Band Three factors: What you have What you know Who you are Steps to out-of-band identity verification: Invoke the device (push message) Capture credential(s) and/or biometric(s) Verify the identity in the cloud and notify the service

IWS s GoVerifyID Mobile Application Turn-key, Out-Of-Band Authentication Using a Mobile Device Mobile application for ios and Android devices Receives authentication push messages from GoMobile Interactive Collects requested biometric(s) and securely sends them to the cloud for identity authentication (GoCloudID) No mobile application coding required License and/or subscription service offering as part of GoCloudID

How it Works 2. Authenticate 6. Identity verified 7. Transaction approved! 3. Push the message request to authenticate the identity 1. Online or offline purchase 4. Capture biometric(s) for authentication in the cloud 5. Biometric(s) are submitted for authentication in the cloud

Example 2: pillphone transforms medication compliance with mobile technologies & patient engagement patient caregiver pillphone is an Enterprise level FDA cleared mobile communication platform that: Connects patient with healthcare providers Promotes interactive communication Ensures medical compliance with personalized reminders Integrates with medical supply chains Empowers disease management and wellness education It s secured with multi-modal biometric enabled identity management and interactive push messaging to ensure patient verification. provider pharmacy Cleared

THE TREND IS IN MOTION. The future of identity authentication is multi-modal biometrics. Using Cloud and SaaS, adding scalable, biometric identity management and out-of-band authentication to mobile applications has never been easier or more cost effective.

SECURING YOUR FUTURE