Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO



Similar documents
The Leading Provider of Identity Solutions and Services in the U.S.

The Convergence of IT Security and Physical Access Control

PRIME IDENTITY MANAGEMENT CORE

The Convergence of IT Security and Physical Access Control

IDaaS: Managed Credentials for Local & State Emergency Responders

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Executive Summary P 1. ActivIdentity

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Provide access control with innovative solutions from IBM.

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Smart Cards and Biometrics in Physical Access Control Systems

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Glossary of Key Terms

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Introduction to SAML

P2000 SECURITY management SYSTEM. More control means more freedom

How much do you pay for your PKI solution?

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

The Costs of Managed PKI:

Information Technology Policy

IMAGEWARE SYSTEMS INCORPORATED (Exact name of registrant as specified in its charter)

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Two-Factor Authentication

Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

Bridging the Great Divide. The Convergence of Physical and Logical Security

Advanced Authentication

WHITE PAPER Usher Mobile Identity Platform

Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014

Integrated Identity Management Whitepaper

Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU

Identity: The Key to the Future of Healthcare

Optical Memory Cards in Federal Government

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Two-Factor Authentication

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

ESA EO Identify Management

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

An Operational Architecture for Federated Identity Management

THE LEADING EDGE OF BORDER SECURITY

VASCO: Compliant Digital Identity Protection for Healthcare

Integration of Access Security with Cloud- Based Credentialing Services

Department of Homeland Security

Strengthen security with intelligent identity and access management

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Service Whitepaper

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Unifying framework for Identity management

PCI Data Security Standard

Identity, Credential, and Access Management. Open Solutions for Open Government

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Identity & Privacy Protection

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

Functional Specification Document

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Web Applications Access Control Single Sign On

Biometrics and Cyber Security

CSR Breach Reporting Service Frequently Asked Questions

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

DEPARTMENTAL REGULATION

Protect Identities for people, workstations, mobiles, networks

Top 5 Reasons to Choose User-Friendly Strong Authentication

Canadian Access Federation: Trust Assertion Document (TAD)

Android pay. Frequently asked questions

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice.

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

Technical Proposition. Security

How can Identity and Access Management help me to improve compliance and drive business performance?

GMS GRAPHICAL MANAGEMENT SYSTEM

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

NACCU Migrating to Contactless:

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Cybersecurity and Secure Authentication with SAP Single Sign-On

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Biometrics in Identity as a Service

API Management: Powered by SOA Software Dedicated Cloud

Chapter 1: Introduction

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Big Data, Big Risk, Big Rewards. Hussein Syed

Transcription:

Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO

Agenda I. Identity Management vs. Biometrics II. Identity Frameworks III. Program/System Integration IV. Role of Government 2

Situation Analysis Biometrics: Where are we? Clear value proposition Mandates Myriad of Federal & International programs on horizon Viable cost effective technologies Standards developing rapidly But biometrics promise is not yet fulfilled Risks ahead in large scale implementations! Most critical time in history of Industry! Industry continues to lack a track record Mission Mandate Money 3

Technology vs. Process So far: Biometrics Industry (not SIs or IT companies) has shouldered the burden of promoting adoption: Disproportionate focus on technology issues A change in focus & attitude is needed Today s challenges: Not technology Process & system integration Lowering deployment risk Role of biometrics at this point? 4

The Role of Biometrics Biometrics are critical for identity & security programs But must keep in mind Biometrics: Are merely enabling technologies Subservient to overall system requirements NOT a security panacea Appropriate role: enabling technologies that impose significant constraints on overall system design Looking at security from biometric end is tantamount to the tail wagging the dog. 5

Biometrics Constraints? Still imperfect technologies Unfamiliar to end users Workflow changes Unproven scalability Data security issues Integration challenges Complex architecture Remote distributed systems Impact both client & server sides Raise legal & social issues (e.g. privacy) Biometric complexity creates new opportunities for System Integrators & Component Providers 6

From Technology to Managing Identity Abstracting to a more fundamental level: Human Identity Managing Identity Myriad of issues & questions beyond FAR & FRR Identity Capture Uniqueness Universality Interoperability Secure Storage Secure Communication Scalability Flexibility Business & Work Flow Interface Privacy Assurance User Acceptance Overall TCO Distributed Deployment System Integrity Performance Advocacy 7

What is Needed? A framework for Identity Management where: Above issues can be addressed Best practices established Higher level standards developed So what is an Identity Framework? A New Framework for Identity Is Needed 8

Traditional Approach to Identity System 1 System 2 System 3 Adding Biometrics Traditional Stovepipe Model " Collection of independent, stand-alone systems " Seldom integrate wt one another " Significant redundancies " Many loop holes " Higher total cost of ownership Biometrics System 1 System 2 Biometrics System 3 Biometrics 9

Employing Identity Framework System 1 System 2 System 3 Identity Framework Biometrics Shared identity-related application services wt well defined API Ties different components to create holistic systems Same Identity data served across different security applications Continuity of Identity Universal Authentication 10

Identity Framework: Connectivity Authentication Factors Other Identity Systems, Legacy Data Algorithm (e.g. AFIS, Credit Data) Identity Framework Web LAN SSO Door Applications Open to different factors, & applications Evolution not revolution Integrates wt Smart cards, passwords, tokens, etc Open standards for system interfaces Web-based based components ID Data 11

Building an Identity Framework Breaking down systems (enterprise, civil ID, user authentication) into stereotyped Identity Processes Encapsulations of identity technology into higher level modules that can be addressed by application level system calls Repeatable protocols common to most Identity systems Actually subsystems (or even programs) Core Identity Processes? 12

Core Identity Processes Enrollment Credentialing Data Capture (biometric, ID) ID Databases Badging, ID Cards, etc PKI Identification: Qualification Authentication/Access Background Checking Trusted Identity Physical Transacti onal Logical Intelligence Detection Data-Mining Engines Negative Databases Surveillance On Demand ID 13

1. Enrollment Critical in any Identity program Biometric & demographic data Costly if not done right Challenges: Typically distributed Population touch point: 1 st impression about biometrics Data Quality Data Integrity Privacy: centralized vs. distributed Open standards: " NIST images instead of proprietary templates Best practices? 14

2. Identification: Qualification Two Questions: Is Identity unique? Can it be granted privileged status? Requires 1-to-N N against registration database Matching against watchlists Applicant Accept Reject Channeling Agency Background Checking Interpol or FBI Databases 15

3. Intelligence Building & linking databases to uncover identities that could pose a threat Watchlists Terrorist Screening Center! 100,000 on watchlist already! TSA s no-fly list! US DOS TIPOFF! NCIC, etc Requires: Data-Sharing:! Federal, State & Local, International Data-Mining:! Multi-biometric technology platform Link analysis Standards:! Data formats & communication protocols or interfaces 16

4. Credentialing Credentials PKI Certificates Applications Photo Color Coding Badging Screened Applicant Magnetic Stripe and/or Barcode Data Paul Simmons Expires: December 2005 Security Markings Cardholder Data Name, exp date, signature, etc. Template(s) 17

Issues Medium: Template on Card (TOC), Match on Card (MOC) Partial Match on Card (PMOC) Pointer only on Card: (POOC) Contact vs. contactless Smart vs. optical card Programs: CAC, BMO, DMDC, DCIS, GSA 18

5. Authentication Authentication Date WAN Safety Deposit Boxes Role INTERNET Financial Content WIRELESS Rule Role Office Buildings Day Parking Lots LAN Authorization Time 19

6. Detection Real-time detection against watch-lists On demand screening:! Mobile Identification Check point surveillance! Travel document screening Local law enforcement today has the leading expertise in detection: Ontario, CA Minneapolis, MN Portland, OR 20

Identity Framework: Services Enrollment Tools Core Identity Technologies Authentication Tools Identification Engine Adapters Identity Policy Management & Enforcement Identity Storage Adapters Authentication Device Registry Identity Event Auditing 21

Building Holistic Systems Adopt an Identity Framework as foundation Choose best of breed identity technologies & processes Choose a system integrator to pull overall system together Advantages: More competitive solution Better solution: " Flexible, " Scalable, " Interoperable, " Interchangeable Incremental procurement Spiral development Leveraged investment Not locked into vendor proprietary offering 22

Alignment of Domain Expertise Ultimately identity modules could be elevated into identity programs ID Process specific domain expertise within industry & government Identity Services: alignment of identity processes with bureaus Examples: Enrollment & Qualifications (front end): BCIS. Qualification (back end): FBI Credentialing: DOS, GSA, BMO, DMDC Detection: DHS, Customs. The role of system integration: from integrating systems to integrating programs 23

Paradigm Shift: The Role of the SI Yesterday TOMORROW Technology Companies System requirements are becoming too complex: " Integratability with legacy & interoperability " Work flow considerations, E-Gov initiatives & Business Integration System Integrators with expertise in Business or Program Integration 24

The Opportunity for ID Management ID Systems Intelligence BORDER CONTROL VISAS PASSPORTS (1) US VISIT (2) Civil IDs DMVs AAMVA M1 Standard (0) Watchlists Criminal Databases Terrorist Databases Asylum Seekers Visa Fraud Applicants Custom Databases (5) Entry/Exit Systems Throughout the World Visas for non- VW nationals for Entry into US (4) Retaliation: Visas for US nationals visiting non VW countries (3) US DOS: Smart Passports (2) Visa Waiver (VW) Nations: Smart Passports (0) ICAO Standards 9303: Face 25

Think Global Remember: Identity management & Biometrics are about people USA Validates biometrics. Dominant market short term ROW Dominant market in long run FACT: 95% of Earth s population lives outside USA 26

What Industry Needs from Government Continued role in development & adoption of standards Validation and testing Tests like FRVT & NIST Building databases for testing (multi-modal data collection) May require changes in law Certification activities Continued R&D Biometric technologies are viable, but they are not yet mature Without NSA, DARPA, DOJ, NIST, etc the biometric industry today would be a decade or two behind Unwavering commitment to programs despite Election Year Politics Addressing Privacy concerns 27

Privacy Privacy Pendulum over last 2 years Post 9/11 80% of People Polled For Biometrics & ID Cards Majority of Privacy Issues with Patriot Act Wire Tapping, subpoenas, disclosure Biometrics Privacy Issues System / Policy Level! Who owns the data! Who has access to the data! How to ensure data is not misused Central Databases considered greatest threat to privacy 28

In Closing Have come a long way but more challenges are still ahead Process NOT technology Think identity not biometrics Embrace a framework for identity management as foundation in any large scale program Bite-size programs instead of mega-programs Interoperability among programs to build holistic systems Identity Management with biometrics will keep the industry and government busy for next decade! 29

Contact Information Joseph J. Atick President & CEO Identix, Inc. www.identix.com (952) 932 0888 Corporate Office (201) 332 9213 Research Center THANK YOU FOR YOUR ATTENTION Joseph.atick atick@identix.com 30