True Identity solution

Similar documents
SENSE Security overview 2014

Advanced Authentication

Research Article. Research of network payment system based on multi-factor authentication

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

A brief on Two-Factor Authentication

Secure Data Exchange Solution

ADVANCE AUTHENTICATION TECHNIQUES

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Internet Banking Two-Factor Authentication using Smartphones

Authentication Tokens

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

CRYPTOGRAPHY AS A SERVICE

Digital identity: Toward more convenient, more secure online authentication

White Paper. The risks of authenticating with digital certificates exposed

Secure Web Access Solution

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Where every interaction matters.

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

White Paper: Multi-Factor Authentication Platform

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

How To Choose An Electronic Signature

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007

Two-factor Authentication

A Security Survey of Strong Authentication Technologies

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

Securing Virtual Desktop Infrastructures with Strong Authentication

USB Portable Storage Device: Security Problem Definition Summary

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

Multi-Factor Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

SSL A discussion of the Secure Socket Layer

An Innovative Two Factor Authentication Method: The QRLogin System

Secure USB Flash Drive. Biometric & Professional Drives

RSA SecurID Software Token 1.0 for Android Administrator s Guide

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

The Top Web Application Attacks: Are you vulnerable?

WHITE PAPER Usher Mobile Identity Platform

How Secure is Authentication?

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Opinion and recommendations on challenges raised by biometric developments

ARCHIVED PUBLICATION

Multi-factor authentication

EBA STRONG AUTHENTICATION REQUIREMENTS

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

An Introduction to Cryptography and Digital Signatures

The Security Behind Sticky Password

USB Portable Storage Device: Security Problem Definition Summary

PrivateServer HSM Integration with Microsoft IIS

Internet threats: steps to security for your small business

IoT Security Platform

Entrust IdentityGuard

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

How To Secure An Rsa Authentication Agent

Improving Online Security with Strong, Personalized User Authentication

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

A Feasible and Cost Effective Two-Factor Authentication for Online Transactions

Criteria for web application security check. Version

PrivyLink Cryptographic Key Server *

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Rational AppScan & Ounce Products

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Guidance on Multi-factor Authentication

Applying Cryptography as a Service to Mobile Applications

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Chapter 1: Introduction

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

PCI Security Standards Council

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Security Levels for Web Authentication using Mobile Phones

DIGIPASS as a Service. Google Apps Integration

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Guide to Evaluating Multi-Factor Authentication Solutions

M-Pass: Web Authentication Protocol Resistant to Malware and Phishing

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Transcription:

Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright 2013

A major crisis exists with the current state of cybersecurity technology. Even the largest institutions cannot be protected from cyberattacks. http://www.foxbusiness.com/industries/2012/10/05/version-bank-cyber-attack-tools-found-in-saudi-arabia/ The authorization of an action by users is not securely bound to the identity of an individual. A digital identity (e.g., SSN or cryptography key) is a virtual identity; it is not a true identity of a living person. 2

Weaknesses of security systems offered by security providers Untrusted Browser attacks. Transaction authorization can be circumvented after strong authentication. http://www.technologyreview.com/computing/23488/?a=f. No solution exists. Financial transactions can t be adequately protected. Centralization. Seeds, which are used to create each one-time passcode, are generated and centrally stored. Digital Identity. A digital identity can be reproduced, transferred, or stolen. 3

Weaknesses of security systems offered by security providers II Shared secret. The backend and device use a shared secret. A backend break-in compromises the shared secret on the token devices. Determinism. Seeds and one-time passcodes are created by deterministic algorithms, calculated from a secret seed, serial number unique to that token device and the time of day. Reverse engineered algorithms, secret seed, serial number and phished PIN breaches the system. 4

Only Biogy technology offers a solution that overcomes inherent limitations of current security technology. True Identity is the answer to next generation computer and network security. 5

True Identity Use Case Biometric True Identity sends an unpredictable malware resistant Transaction Passcode Multi-platform Secure Module in Fingerprint Token Mobile Phone or Transaction Passcode & Encrypted Transaction xxxx xxxx xxxx xxxx Insecure Internet E-commerce, Banks, Medical services and Government services Backend Bank Server PC Transaction Completed Biometrics and personal identification information exist only in secure module. Personal data and biometrics are never transmitted over insecure lines. 6

True Identity Use Case Steps Step 1. User presses appropriate finger on sensor of Biogy token. Step 2. A valid fingerprint match generates a one-time transaction passcode. Step 3. Transaction passcode and encrypted transaction information is transmitted to bank backend server via mobile phone, PC or other. Step 4. Backend bank server verifies transaction passcode and transaction information. If valid, do step 5a. If invalid, do step 5b. Step 5a. Transaction is executed. Confirmation notification. Step 5b. Transaction is aborted. 7

Groundbreaking Security Solution Asymmetry. Backend breaches don t compromise the devices. Decentralization. Passcode generators are created on the token device. The system can only be hacked one hardware device at a time. Seeds cannot be stolen from the network because they do not exist on the network. Dynamic. Unlike seeds, passcode generators change over time. Stops untrusted browser attacks. Malware can t steal what it can t understand. NMP malware resistant technology is integrated with the Biogy fingerprint-protected token. 8

Groundbreaking Security Solution II True Identity. A valid, local, biometric authentication is securely linked to cryptographic operations. All confidentiality, integrity and authentication and transaction operations are executed in a secure embedded environment. True Identity cannot be stolen. Non-Determinism. The solution does not require pseudorandom number algorithms to create unpredictability. Reverse engineering of algorithms does not reveal any critical information. Over 100,000 bits of true entropy are created during enrollment. 9