ECCA 2014 Conference Santander 26.05.2014



Similar documents
White Paper. The risks of authenticating with digital certificates exposed

API-Security Gateway Dirk Krafzig

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Moving to Multi-factor Authentication. Kevin Unthank

Public Key Applications & Usage A Brief Insight

NC CJIN Governing Board. 13 October, George A. White

Certification Practice Statement

How Secure are Contactless Payment Systems?

TELSTRA RSS CA Subscriber Agreement (SA)

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Smartcard & USB Authentication

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

What Are They, and What Are They Doing in My Browser?

Mobile Driver s License Solution

The Convergence of IT Security and Physical Access Control

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

Two Factor Authentication and PKI Token (for Windows)

Frans Bolk CEO UniQ-ID

Get Smart Card Ready. How to Recover Your Old (Expired) Certificates

Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

CSci 530 Midterm Exam. Fall 2012

Improving Online Security with Strong, Personalized User Authentication

Bring Your Own Device (BYOD) and Mobile Device Management.

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Entrust Managed Services PKI

PKI Smart Card Usage for Business-Partners Features and Requirements. Version 1.4 / August 2013

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

esign Online Digital Signature Service

Secure Data Exchange Solution

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Fraunhofer Corporate PKI. Certification Practice Statement

Frost & Sullivan. Publisher Sample

Understanding Digital Signature And Public Key Infrastructure

CERTIFICATES USER GUIDE

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Lecture VII : Public Key Infrastructure (PKI)

How To Understand And Understand The Security Of A Key Infrastructure

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

CryptoNET: Security Management Protocols

PrivateServer HSM Integration with Microsoft IIS

Hardware Security Modules for Protecting Embedded Systems

Digital Signature Certificate Online Enrollment Guide using etoken

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Public Key Infrastructure (PKI)

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Smart Givaudan. From BYOD experience to new mobile opportunities

Controller of Certification Authorities of Mauritius

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

An Introduction to Entrust PKI. Last updated: September 14, 2004

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

CS 356 Lecture 28 Internet Authentication. Spring 2013

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Hormuzd Khosravi, Principal Engineer, Intel Corporation

Understanding digital certificates

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

PKI NBP Certification Policy for ESCB Signature Certificates. OID: version 1.5

ISO Information Security Management Systems Professional

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Cybersecurity and Secure Authentication with SAP Single Sign-On

PopimsCard. Franck GUIGAN The magic card. February

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Chapter 23. Database Security. Security Issues. Database Security

Network Security Protocols

Strong Authentication for Future Web Applications

Certificate Policy for. SSL Client & S/MIME Certificates

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

The Convergence of IT Security and Physical Access Control

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Key & Data Storage on Mobile Devices

Grid Computing - X.509

Executive Summary P 1. ActivIdentity

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

The increasing popularity of mobile devices is rapidly changing how and where we

1. New Features and Enhancements in Service Release 9.31 Build 104

TABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ...

Qualified mobile electronic signatures: Possible, but worth a try?

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Transcription:

ECCA 2014 Conference Santander 26.05.2014

Introducing -Technology For Strong Authentication Section 3- IT-Systems, Softwareintegration Department 6 Information And Communication Services

Dezernat6 - Informations- und Kommunikationsdienste 3

History 1964 electromechanical 1974 optically readable (OCR-B) 1997 cards with cryptographic functionality 4

Card Issue For students: during matriculation For employees: on demand 5

6

Statistics As of November 2013-45.500 Cards Students 42.000 Cards in use Employees 3.500 7

Certificate Use Cases Certificates Authentication Signature (Encryption) 8

Are Smartcards still appropriate? Use cases Handling certificates is a complex matter. (issue, renewal, user acceptance, ) Electronic Signature is no success story (yet). Security Expenses 9

What do we really need? Mandatory Identity card with a photo for campus use and bonus programs Cryptographic identity card for digital services No dependency from any card issuer (bank, public transport, payment distributors, etc.) Optional Electronic signature / encryption Payment facilities Ticket for public transport system Goal: strong authentication 10

Trends Processes (totally digital integrated) Privacy & IT Security Mobility (BYOD, Smartphones, Tablets) 11

Near Field Communication Advantages of Lower expenses for cards No certificates Strong authentication 12

what s new? Standard Our Approach Backend ID:123345. X ID:123345. Backend Communication Card specific Keys 13

Strong Authentication CardID PIN Backend PIN 14

Comparison of Authentication Methods security level convenience mobility Smart Card (Certicates) Login / Passwort Card expenses infrastructure integration 15

Strong Authentication 16

Conclusions Strong Authentication Expenses Handling Mobility Electronic Signature Card Card Specific Keys (AES 128) Cost Saving Revocation List - Devices + Low Complex Client Not Available Smart Card Card Specific Keys (RSA 2048) PKI Certificate Renewal - Available 17

RUHR-UNIVERSITÄT BOCHUM Introducing -Technology For Strong Authentication http://rub.de/nfc haiko.teneues@uv.rub.de 18