S E P T E M B E R 2 0 1 4

Similar documents
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

In the pursuit of becoming smart

m Commerce Working Group

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

OMAP platform security features

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Software Token Security & Provisioning: Innovation Galore!

SHS Annual Information Security Training

Scalable Authentication

10 Quick Tips to Mobile Security

Credential Management for Cloud Computing

Longmai Mobile PKI Solution

Secure USB Flash Drive. Biometric & Professional Drives

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Digital identity: Toward more convenient, more secure online authentication

How Secure is Authentication?

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

Chris Boykin VP of Professional Services

Addressing NIST and DOD Requirements for Mobile Device Management

Intel vpro and Information Security. Itai Yarom Senior Technical Lead LAN Access Division Intel Israel

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Unit title: Cyber Security Fundamentals (SCQF level 4)

Bellevue University Cybersecurity Programs & Courses

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

USB Portable Storage Device: Security Problem Definition Summary

What is Really Needed to Secure the Internet of Things?

Samsung Mobile Security

IoT Security & Privacy

Credit Card Cyber Defense System!

Entrust IdentityGuard

Financial industry Solutions. Redefining Micro Location for the Financial industry in a Mobile World

NetIQ Advanced Authentication Framework

Software Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

True Identity solution

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

Mobile Security: Controlling Growing Threats with Mobile Device Management

2012 NCSA / Symantec. National Small Business Study

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Cisco Trust Anchor Technologies

Content Protection and Security Considerations for 5G KILROY HUGHES

Security Basics: A Whitepaper

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem. Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP

Hard vs. Soft Tokens Making the Right Choice for Security

Why you need. McAfee. Multi Acess PARTNER SERVICES

Powering Security and Easy Authentication in a Multi-Channel World

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Enhancing Web Application Security

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Secure Data Exchange Solution

Embedded Security for Modern Building Automation Systems

Device-based Secure Data Management Scheme in a Smart Home

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Remote Access Securing Your Employees Out of the Office

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

How to Secure Your Environment

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Research on Situation and Key Issues of Smart Mobile Terminal Security

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Hormuzd Khosravi, Principal Engineer, Intel Corporation

Moving to Multi-factor Authentication. Kevin Unthank

Malware & Botnets. Botnets

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Bring Your Own Device

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

NOK NOK LABS AUTHENTICATION & OTT SERVICES

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Firmware security features in HP Compaq business notebooks

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Opinion and recommendations on challenges raised by biometric developments

Chapter 15: Computer Security and Privacy

Need for a Secure Mobile Platform

WHITE PAPER Usher Mobile Identity Platform

The Privilege of Android Privacy. How PRIV Safeguards Your Data

DesignWare IP for IoT SoC Designs

Mobile Device Security Is there an app for that?

Parla, Secure Cloud

CEH Version8 Course Outline

How to Remotely Track Any Lost Smartphone, Tablet, or PC

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

Security in ST : From Company to Products

Guide to Evaluating Multi-Factor Authentication Solutions

Security Considerations for DirectAccess Deployments. Whitepaper

IoT IT Security and Secure Development Life Cycle

Transcription:

S E P T E M B E R 2 0 1 4 IRIS-ENABLED SMARTWATCH AND ITS APPLICATIONS

INTRODUCTION Iris Recognition Enabled Smartwatch Convergence of wearables and biometrics Will bring the widespread use of iris recognition technology Will become the key device for security in the Internet-of-Things Property of IriTech, Inc. - Confidential 2

PROBLEMS FIDELYS WILL SOLVE #1. No more passwords #2. Privacy Issues #3. Internet of Things Too many password breaches We are now required longer passwords for each website Encrypt sensitive information on devices Application launch control Security needs to be guaranteed for IoT to become wide spread Needs strong authentication Property of IriTech, Inc. - Confidential 3

APPLICATIONS Connection: Bluetooth / NFC / Wifi Application program 1 Device log-on Notebook Tablet PC Smartphone 2 SSO(Single Sign On) 3 Mobile payments / E-commerce 4 IoT Security Authentication Smart Car CarPlay / Android Car Access Control Tablet PC Smartphone Notebook PC Outdoor capture IriTech s technology enables iris recognition outdoors. The user experience of iris recognition has improved significantly! Access Control Cars Secure and convenient authentication Iris authentication session remains valid until the watch is taken off Enhanced privacy your iris data will never leave your watch

WHAT EXACTLY TO BE MODIFIED ONTO AN EXISTING SMARTWATCH? Property of IriTech, Inc. - Confidential 5

Camera Control MAJOR HW AND SW COMPONENTS IR LED Smartwatch s Processor Secure storage IR filter Data Automated Iris Image Acquisition & Image Quality Measurement Offline Gallery Mobile Device s Camera Qualified Iris Image Enrolled Iris Recognition Generator Protected Memory Security Matcher Enrolled Enrolled Gallery Encrypted Signed Data Matching Result Iris Biometric Applications Property of IriTech, Inc. - Confidential 6

SECURITY THREAT ANALYSIS Local threats (virus, malware, hardware analysis, etc.) Iris firmware should not be bypassed, tampered or reverse engineered Installed in secure storage prevent offline reverse engineering. Securely booted resist to tamper, cloning Run-time protection: Critical algorithms run in mask ROM/ OTP NVM hinder hardware analysis and software attacks. Others run in PEE prevent software attacks. Personal Data Threat Iris app services protect sensitive data in smart device and PC, sensitive application launch control and protect online account of online shopping, social networks, and even travel sites and communication from unauthorized accesses. Communication threats Well-concealed nature of iris make it much harder to be spoof than other authentication factor. Strong PKI security structure naturally defenses against Main-In-Middle (MiM). Combination of PKI and One-time-password (biometric-based, time-based, challenge-based, etc.) strengthens defenses against relay attacks and MiM. 7

TECHNICAL CONSIDERATIONS Outdoor capturing under direct sunlight The biggest impediment of iris recognition is now solved by IriTech New development does not require additional hardware so the cost increase will beminimal. The sunlight technology will bring iris smartwatch to widespread commercial use as the user experience has just increased significantly. Conventional iris camera New camera Property of IriTech, Inc. - Confidential 8

FIDO ALLIANCE AND ONLINE AUTHENTICATION STANDARD FIDO Board Members developed Biometric data will never leave the local auth device Property of IriTech, Inc. - Confidential 9

IRIS-ENABLED SMARTWATCH AS A FIDO U2F DEVICE Property of IriTech, Inc. - Confidential 10

Thank You 11