Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton



Similar documents
Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

Multi-Factor Authentication Core User Policy and Procedures

ADDING STRONGER AUTHENTICATION for VPN Access Control

Improving Online Security with Strong, Personalized User Authentication

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Entrust IdentityGuard

Multi-Factor Authentication Job Aide

Ultra-strong authentication to protect network access and assets

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

STRONGER AUTHENTICATION for CA SiteMinder

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Proven. Trusted.

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

WHITE PAPER Usher Mobile Identity Platform

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Enhancing Web Application Security

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Security Upgrade FAQs

Defender Token Deployment System Quick Start Guide

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Authentication Levels. White Paper April 23, 2014

Using RD Gateway with Azure Multifactor Authentication

Adding Stronger Authentication to your Portal and Cloud Apps

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

RSA SecurID Two-factor Authentication

Cloud-Based Identity Services

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

NC CJIN Governing Board. 13 October, George A. White

Multi-Factor Authentication of Online Transactions

These Frequently Asked Questions include information about both the Remote Identity Proofing (RIDP) and

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Guide to Evaluating Multi-Factor Authentication Solutions

Ultra-strong authentication to protect network access and assets

Application Installation/Setup

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Ultra-strong authentication to protect network access and assets

Employee Active Directory Self-Service Quick Setup Guide

Voice Authentication On-Demand: Your Voice as Your Key

Role of Multi-biometrics in Usable Multi- Factor Authentication

API-Security Gateway Dirk Krafzig

How To Manage A Plethora Of Identities In A Cloud System (Saas)

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Enhanced Security for Online Banking

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

One-Time Password Contingency Access Process

Biometrics in Identity as a Service

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Beyond passwords: Protect the mobile enterprise with smarter security solutions

How To Print From Ait Mobile Printing Service On Iphone Or Android (For Android) Or Ipad (For Mac) From Ai Or Ipod (For Ipad) From Your Computer Or Ipads Or Ipa (For A

3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Multi-Factor Authentication (MFA)

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

Proposed Service. Name of Proposed Service: Technical description of Proposed Service: Registry-Registrar Two-Factor Authentication Service

2 factor + 2. Authentication. way

Initial DUO 2 Factor Setup, Install, Login and Verification

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

Samsung SDS. Fast IDentity Online

STX Beacon User Guide. Credit Card Processing Mobile Devices Mac & Windows OS

Agenda. The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

SECTION 1: FIND OUT THE IP ADDRESS OF DVR To find out the IP of DVR for your DVR do the following:

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Glossary of Key Terms

TrustedX: eidas Platform

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

Apache Milagro (incubating) An Introduction ApacheCon North America

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Mobile and Text Customer Experience Online Banking Training Guide. i 2015 ChoiceOne Bank

How To Comply With Ffiec

Security Upgrade FAQs

Understanding the Role of Smart Cards for Strong Authentication in Network Systems. Bryan Ichikawa Deloitte Advisory

Country Club Bank- Intro to Mobile Banking- Android & iphone Apps

Usable Multi-Factor Authentication and Risk- Based Authorization

Citizens 1 st National Bank Mobile Banking FAQ

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Transcription:

Trust Elevation Using Risk-Based Multifactor Authentication Cathy Tilton 1

Caveat Intent is to present an approach for risk-based multifactor authentication and how it might be used in a trustelevation environment To this end, I will be using Daon s IdentityX product as an example only to demonstrate these ideas. 2

Agenda The technology The methods Use cases Example 3

Identity is A unique risk-based, multi-factor authentication capability that leverages latest generation smart phones (e.g., iphone, Blackberry, Android), smart tablets (e.g., iphone/playbook) and traditional mobile devices Identity technology combines multiple authentication techniques for greatest identity confidence: Device (What you have) PKI Certificate (What you have) PIN/PW (What you know) OOB OTP (What you have) (other as devices enabled) Face (Who you are) Voice (Who you are) Palm (Who you are) GPS (Where you are - context) Placing multiple levels of identity assurance in the hands of consumers Designed to run both as an in-app framework and out-ofband authentication product 4

Multifactor fusion for greatest identity accuracy/fidelity GPS PIN/Passphrase Face Palm Voice 5

How is risk aware identity assurance achieved? 6

Identity Architecture Relying Party Secure Storage IdentityX Service Provider Gateway (IXSPG) IdentityX SMS Broker (IXSB) SMS Provider IdentityX Administration Gateway (IXAG) IdentityX SRP IdentityX Configuration Manager (IXCM) Web Portal IdentityX Device Gateway (IXDG) IdentityX Key Manager (IXKM) iphone Component Device Framework Android Component Device Framework Blackberry Component Device Framework Symbian Component Device Framework Windows Component Device Framework 7

Authentication Policies RP Transaction ID Abc1 Xyz2... Mapped to Policy Selections Method: PIN, Duress PIN Face, Face Liveness Voice, Voice Liveness Palm Context: Location limits Time limits Number of retry attempts... 8

Simple flow RP Application Authentication Server Request Authentication Authentication Results Authentication Challenge(s) Request Transaction Authentication Response 9

Assurance Levels Request Authentication Authentication Results Alternatives: Request specific set of methods or request based on an assurance level (assumes equivalence established) Report results as pass/fail or assurance level achieved Allow users choice as to preferences, additional methods/levels of assurance beyond minimum When trust is elevated, require only delta to current level or full set of challenges for new level 10

Bridging the gap between Security and Convenience Trust, Security, Customer Service Goal 11

Why include biometrics? Biometrics is the most preferred additional form of authentication for US online banking users 12

Use Case Financial Transactions User logs into the bank website using simple username/password. User initiates low value transaction and is challenged to authenticate on their mobile device. Proof of possession (cert based mutual authentication and user action to approve) is sufficient for this risk level. Subsequently, the user chooses to perform a higher value or more fraud-prone transaction. They are then asked to again authenticate using their mobile device; however, this time in addition to the cert check, they are asked to enter a PIN and speak a passphrase, after which they are provided a one-time password which they enter on their screen. 13

Use Case Leveraging Geopositon Authentication policy which is location sensitive Financial transaction: funds transfer Authentication request if in US, use policy A (methods a + b) if outside US, use policy B (a + b + c) Example a = PIN b = face c = OOB OTP [Note cert check done on every transaction] Dynamic policy (level/method used) for a given transaction could use various criteria (e.g., TOD, threat level) and is selected by the RP. 14

Use Case User Choice For each transaction type, the bank has set a minimum set of authentication methods Users desiring additional protection are given the ability to add methods Example Transfer of $5000 Default setting: Cert + PIN + OOB OTP User adds: voice 15

Transaction Steps 16

Initiate Transaction 17

Authentication Instruction 18

Select App App is pre-loaded as part of phone registration process Or can be downloaded directly from app store App may be standalone (as shown) or integrated into a service provider s app 19

Select Transaction Transactions may be generated from multiple service providers and multiple transactions can be queued for approval. Familiar Service provider icons can be used to help to differentiate transactions. Additional transaction information such as transaction type, transaction value, transaction items or title helps the user easily identify acceptable and nonfraudulent transactions. 20

Make Decision Transactions in the system require a user action in order to be completed. On a per transaction basis, the user has the option to approve, decline, or mark a transaction as fraud. 21

Authentication Option A - PIN A number of actions can be set by the service provider and/or the consumer including face, voice, palm, PIN etc. IdentityX supports a wide variety of verification methods. Verification methods are matched to transaction risk as defined by the business rules of the Service Provider. Some transactions may require the use of a PIN. 22

Authentication Option B - Face Facial verification provides an additional method of verification appropriate for certain transactions. The user simply takes a picture of their face which is matched against a reference image. Facial Liveness detection ensures the user is present and not an imposter (e.g., taking a photo of a photo). 23

Authentication Option C - Palm Palm verification provides an additional method of verification appropriate for certain transactions. The user simply takes a picture of their palm which is matched against a reference image. Palm is a very innovative (unique) authentication solution that is extremely convenient for users and highly resistant to fraud. 24

Authentication Option D - Voice Depending on risk level defined by Service Provider, user may be asked to speak a phrase to conduct voice verification. As with other types of verification, the user s unique voice can be matched to a previously captured reference sample. Voice liveness detection can be implemented to eliminate playback attacks (e.g., playing a pre-recorded voice sample). 25

Verification More than one verification method may be used. Once all methods have been submitted, they are evaluated and fused using proven mathematical algorithms. The Service Provider defines the transaction risk which maps to a minimum assurance score to accept the transaction. If the transaction is accepted, the Service Provider may utilize a One Time Password, show a virtual card, or simply complete the transaction and move the user to the next step in their digital interaction. 26

Completion 27

More Information Catherine J. Tilton, CBP VP, Standards & Technology, Daon 11955 Freedom Drive, Suite 16000 Reston, VA 20190 703-984-4080 cathy.tilton@daon.com 28