SlideShare une entreprise Scribd logo
1  sur  58
Implications for Policy and Government Applications
Webinar – May 4, 2016
All Rights Reserved. FIDO Alliance. Copyright 2016.
A NEW MODEL FOR ONLINE
AUTHENTICATION
Our Speakers
Jeremy Grant Brett McDowell Paul Grassi
Chertoff Group FIDO Alliance NIST
Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 2
Authentication is Important to Government
1. Protects access to government assets
2. Enables more high-value citizen-facing services
3. Empowers private sector to provide a wider range of high
value services to consumers
4. Secures assets in regulated industries
5. Promotes good security practices in the private sector
Governments seek identity solutions that can deliver not just
improved Security – but also Privacy, Interoperability, and
better Customer Experiences
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO Delivers on Key Policy Priorities
Security
• Authentication using strong
asymmetric Public Key
cryptography
• Superior to old “shared
secrets” model – there is
nothing to steal
• Biometrics as second factor
Privacy
• Privacy architected in up
front; supports EU Privacy
Principles, other national
privacy initiatives
• No linkability or tracking
• Biometric data never leaves
device
• Consumer control and
consent
Interoperability
• Open standards: FIDO 2.0
specs are in W3C
standardization process
• FIDO compliance/
conformance testing to
ensure interoperability of
“FIDO certified” products
Usability
• Designed with the user
experience (UX) first – with
a goal of making
authentication as easy as
possible.
• Security built to support the
user’s needs, not the other
way around
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO Impact on Policy
FIDO specifications offer governments newer, better options for
strong authentication – but governments may need to update
some policies to support the ways in which FIDO is different.
As technology evolves, policy needs to evolve with it.
All Rights Reserved. FIDO Alliance. Copyright 2016.
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO ALLIANCE: AN OVERVIEW
Brett McDowell
6
The world has a PASSWORD PROBLEM
5Confidential
781 data breaches in 2015
Data Breaches…
170 million records in 2015 (up 50%)
$3.8 million cost/breach (up 23% f/2013)
ONE-TIME PASSCODES
Improve security but aren’t easy enough to use
Still
Phishable
User
Confusion
Token
Necklace
SMS
Reliability
6Confidential
WE NEED A
NEW MODEL
WE CALL OUR
NEW MODEL
Fast IDentity Online
online authentication using
public key cryptography
THE OLD
PARADIGM
USABILITYSECURITY
THE FIDO
PARADIGM
Poor Easy
WeakStrong USABILITY
SECURITY
HOW OLD AUTHN WORKS
ONLINE
The user authenticates
themselves online by presenting a
human-readable “shared secret”
HOW FIDO AUTHN WORKS
AUTHENTICATOR
LOCAL ONLINE
The user authenticates
“locally” to their device
(by various means)
The device authenticates
the user online using
public key cryptography
FIDO Registration
Invitation Sent New Keys Created
Pubic Key Registered
With Online Server
User is in a Session
Or
New Account Flow
1 2 3
4
Registration Complete
User Approval
Login Complete
FIDO Authentication
FIDO Challenge Key Selected & Signs
Signed Response verified using
Public Key Cryptography
User needs to login or
authorize a transaction
1 2 3
4
User Approval
OPEN STANDARDS R.O.I.
FIDO-ENABLE ONCE
GAIN EVERY DEVICE YOU TRUST
NO MORE ONE-OFF INTEGRATIONS
USABILITY, SECURITY, R.O.I.
and
PRIVACY
Better security for online services
Reduced cost for the enterprise
Simpler and safer for consumers
FIDO Alliance Mission
Develop
Specifications
Operate
Adoption Programs
Pursue Formal
Standardization
1 2 3
FIDO DEVELOPMENT TIMELINE
FIDO 1.0
FINALFirst
DeploymentsSpecification
Review Draft
FIDO Ready
Program
Alliance
Announced
FEB
2013
6 Members
DEC
2013
FEB
2014
FEB-OCT
2014
DEC 9
2014
MAY
2015
TODAY
>250
Members
Market
Adoption
JUNE
2015
Certification
Program
New U2F
Transports
Board Members
23
Sponsor Members
Associate Members
Government & Research
“The fact that FIDO has now welcomed government
participation is a logical and exciting step toward
further advancement of the Identity Ecosystem;
we look forward to continued progress.”
-- Mike Garcia, NSTIC NPO
26
2640Confidential
Liaison Program
Our mission is highly
complementary to
many other
associations around
the world. We
welcome the
opportunity to
collaborate with this
growing list of
industry partner
organizations.
27
27
“PayPal and Samsung Enable Consumer
Payments with Fingerprint
Authentication on New Samsung
Galaxy S5”
Feb 24, 2014
“Secure Consumer Payments Enabled for
Alipay Customers with Easy-to-Use
Fingerprint Sensors on Recently-Launched
Samsung Galaxy S5”
September 17, 2014
“Google Launches Security Key,
World’s First Deployment of Fast
Identity Online Universal Second
Factor (FIDO U2F) Authentication”
October 21, 2014
2014 FIDO ADOPTION
“Microsoft Announces FIDO
Support Coming to Windows 10”
Feb 23, 2015
“Qualcomm launches
Snapdragon fingerprint
scanning technology”
March 2, 2015
“Google for Work announced
Enterprise admin support for
FIDO® U2F ‘Security Key’”
April 21, 2015
“Largest mobile network in
Japan becomes first wireless
carrier to enhance customer
experience with natural,
simple and strong ways to
authenticate to DOCOMO’s
services using FIDO
standards.”
May 26, 2015
2015 FIDO ADOPTION
“Today, we’re adding Universal 2nd Factor (U2F) security
keys as an additional method for two-step verification,
giving you stronger authentication protection.”
August 12, 2015
“[T]he technology
supporting fingerprint
sign-in was built
according to FIDO
(Fast IDentity Online)
standards.”
September 15, 2015
“GitHub says it
will now handle
what is called
the FIDO
Universal 2nd
Factor, or U2F,
specification.”
October 1, 2015
“NTT DOCOMO is now
offering FIDO-enabled
biometric authentication for
customers using Apple iOS
devices”
Mar 7, 2016
2016 FIDO ADOPTION
“FIDO Universal 2nd Factor (U2F) authentication is now
being used to allow all UK citizens to easily and securely
access GOV.UK Verify digital public services.
Mar 23, 2016
“BC Card provides Token
and FIDO services to
strengthen security and
safety of Samsung Pay”
March 1, 2016
“KEB Hana’s new solution
is notably FIDO Certified.”
February 3, 2016
Deployments are enabled by over 150
FIDO® Certified products
available today
 Available to anyone
 Ensures interoperability
 Promotes the FIDO
ecosystem
Steps to certification:
1. Conformance Self-Validation
2. Interoperability Testing
3. Certification Request
4. Trademark License (optional)
fidoalliance.org/certification
33
Leading OEMs Shipping FIDO Certified Devices
Tab S, Tab S2S5, Mini Note 4, 5Alpha Note Edge S6/S7, S6/S7 Edge
Sharp Aquos Zeta Sony Experia Z5 Fujitsu Arrows
(Iris Biometrics)
Samsung
LG V10 & G5 Huawei Mate 8
iPhone 5s iPhone 6, 6+
iPad Air 2, Mini 3
iPhone 6s, 6s+
iPad Mini 4 iPad Pro
FIDO Applications Now Run on iOS 9
Supported iOS Fingerprint Devices
JOIN THE
FIDO ECOSYSTEM
JOIN THE
FIDO ALLIANCE
FIDO IN GOVERNMENT SERVICES:
A NIST PERSPECTIVE
Paul Grassi
Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 38
FIDO and Digital Government Services
All Rights Reserved. FIDO Alliance. Copyright 2016.
–Dr. Andy Ozment
“…encryption would not have helped…”
All Rights Reserved. FIDO Alliance. Copyright 2016.
Privacy Enhancing & Voluntary
Secure & Resilient
Interoperable
Cost-Effective & Easy to Use
All Rights Reserved. FIDO Alliance. Copyright 2016.
USG Use Cases
?M-05-24
All Rights Reserved. FIDO Alliance. Copyright 2016.
All Rights Reserved. FIDO Alliance. Copyright 2016.
Identity Proofing
Credential
Attributes
All Rights Reserved. FIDO Alliance. Copyright 2016.
strength of authentication
All Rights Reserved. FIDO Alliance. Copyright 2016.
Update on the Update
All Rights Reserved. FIDO Alliance. Copyright 2016.
PERSPECTIVES ON FIDO IN GLOBAL
POLICY
Jeremy Grant
Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 47
FIDO Engagement on Policy Issues
• FIDO Launched the Public Policy and Privacy Working Group
(P3WG) in 2014
• Mission:
• Focus on “Privacy by Design” approach to FIDO specifications,
providing privacy expertise and guidance
• Monitor global privacy and public policy issues that impact
authentication, engaging in education efforts where appropriate
• Co-Chairs: Hannes Tschofenig (ARM) and Stephan Somogyi
(Google)
All Rights Reserved. FIDO Alliance. Copyright 2016.
Why Policy Matters
• Governments around the world are focusing on identity and
authentication requirements, both for their own systems, as well as
systems in industries that they regulate
• Drivers for these enhanced requirements include both the increased
number of attacks tied to passwords in public and private sector, as well
as the need for more secure consumer/citizen-facing digital services
• As governments engage here, support for new approaches like FIDO is not
a given:
• Most governments are not aware of FIDO, or if they are, do not properly understand
it
• Natural gap between technology innovation and understanding of that innovation by
policymakers and regulators
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO Engagement on Policy Issues
2016 Activities
• FIDO Privacy White Paper – January 2016
• Response to the European Banking Authority (EBA)
Discussion Paper on Future Draft Technical Standards on
Strong Customer Authentication and Secure
Communication Under the Revised Payment Services
Directive (PSD2) – February 2016
• Response to NIST RFI on updates to NIST “Framework for
Improving Critical Infrastructure Cybersecurity” – March
2016
• Active inventorying and monitoring of authentication-
related policies across the globe
All Rights Reserved. FIDO Alliance. Copyright 2016.
What Governments Should Know
1. Recognize that two-factor authentication no longer brings
higher burdens or costs.
All Rights Reserved. FIDO Alliance. Copyright 2016.
• While this statement was true of most “old” MFA
technology, FIDO specifically addresses these cost and
usability issues.
• FIDO enables simpler, stronger authentication
capabilities that governments, businesses and
consumers can easily adopt at scale.
What Governments Should Know
2. Recognize technology is now mature enough to enable two
secure, distinct authentication factors in a single device.
All Rights Reserved. FIDO Alliance. Copyright 2016.
• Recognized by the US government (NIST) in 2014…
• “OMB (White House) to update guidance on remote
electronic authentication” to remove requirements
that one factor be separate from the device
accessing the resource
• The evolution of mobile devices – in particular,
hardware architectures that offer highly robust and
isolated execution environments (such as TEE, SE
and TPM) – has allowed these devices to achieve
high-grade security without the need for a
physically distinct token
What Governments Should Know
3. As governments promote or require strong authentication,
make sure it is the “right” strong authentication.
The market is in the midst of a burst of innovation around authentication
technology – some solutions are better than others. Don’t push the
adoption of old authentication technology.
• Old authentication technologies impose significant costs and burdens on the user –
which decreases adoption
• Old authentication technologies have security (i.e., phishable) and privacy issues –
putting both users and online service providers at risk
All Rights Reserved. FIDO Alliance. Copyright 2016.
What Governments Should Know
4. FIDO is designed to enhance privacy
• Designed from the start to support the Privacy Principles of the European
Data Protection Directive and other government privacy initiatives
• No 3rd Party in the Protocol
• No Secrets on the Server Side
• Biometric Data (if used) Never Leaves Device
• No Linkability Between Services
• No Linkability Between Accounts
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO and User Privacy - US
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO Privacy Principle IDESG Privacy requirements
Require explicit, Informed consent for
any operation using personal data
PRIVACY-6. USAGE NOTICE
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-9. USER NOTICE OF CHANGES
PRIVACY-10. USER OPTION TO DECLINE
PRIVACY-11. OPTIONAL INFORMATION
Provide clear context to the user for any
FIDO operations
PRIVACY-6. USAGE NOTICE
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-9. USER NOTICE OF CHANGES
PRIVACY-10. USER OPTION TO DECLINE
PRIVACY-11. OPTIONAL INFORMATION
Limit collection of personal data to FIDO-
related purposes
PRIVACY-1. DATA MINIMIZATION
PRIVACY-2. PURPOSE LIMITATION
PRIVACY-3. ATTRIBUTE MINIMIZATION
PRIVACY-5. DATA AGGREGATION RISK
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-12. ANONYMITY
PRIVACY-13. CONTROLS PROPORTIONATE
TO RISK
Use personal data only for FIDO
operations
PRIVACY-1. DATA MINIMIZATION
PRIVACY-2. PURPOSE LIMITATION
PRIVACY-5. DATA AGGREGATION RISK
PRIVACY-8. THIRD PARTY LIMITATIONS
FIDO Privacy Principle IDESG Privacy requirements
Prevent identification of a user outside of
FIDO operations
PRIVACY-1. DATA MINIMIZATION
PRIVACY-2. PURPOSE LIMITATION
PRIVACY-3. ATTRIBUTE MINIMIZATION
PRIVACY-5. DATA AGGREGATION RISK
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-12. ANONYMITY
Biometric data must never leave the
user’s personal computing environment
PRIVACY-1. DATA MINIMIZATION
PRIVACY-2. PURPOSE LIMITATION
PRIVACY-3. ATTRIBUTE MINIMIZATION
PRIVACY-4. CREDENTIAL LIMITATION
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-15 ATTRIBUTE SEGREGATION
Protect FIDO-related data from
unauthorized access or disclosure
Covered by IDESG Security Requirements
PRIVACY-14. DATA RETENTION
Allow users to easily view and manage
their FIDO Authenticators
PRIVACY-7. USER DATA CONTROL
PRIVACY-8. THIRD PARTY LIMITATIONS
PRIVACY-14. DATA RETENTION
FIDO Privacy Principles mapped to Identity Ecosystem Steering Group (IDESG) Requirements
FIDO and User Privacy - EU
All Rights Reserved. FIDO Alliance. Copyright 2016.
EU Privacy Principle FIDO Implementation of EU Privacy Principle
Personal data must be processed
fairly and lawfully
For a User to access a Relying Party’s services through FIDO Authentication, the User must first agree to register with that Relying Party. When the User wishes to access the online service, they must execute
the User Verification step, e.g. touching a sensor, entering a passcode, or providing their fingerprint, in order to execute the cryptographic computation. This ensures that malware installed on the User’s
device is unable to autonomously perform FIDO operations.
Personal data can only be processed
for one or more specified lawful
purpose(s)
The Personal Data required to access an online service, such as a fingerprint, can only be accessed by the FIDO Authenticator which is part of the User’s device. The FIDO Authenticator can only access such
data when it is required to perform an Authentication. The FIDO protocol requires a minimum amount of data stored by the Relying Party, for which the user is required to provide consent.
Personal data must be adequate,
relevant, and not excessive in relation
to the purposes for which it is being
used
The data needed to perform an Authentication is collected by the Relying Party when the User registers with it. This data is:
 A public key: This allows the Relying Party to verify that the FIDO Authenticator being used is the one previously registered by the User.
 Authenticator Attestation ID (AAID): This is a reference that allows the Relying Party to look-up the characteristics of the used FIDO Authenticator.
 Key Handle: An identifier created by a FIDO Authenticator, potentially containing an encrypted private key, to refer to a specific key maintained the FIDO Authenticator.
Personal data must be accurate and
up to date
The data used for FIDO Authentication, such as the registered public key, must be accurate since cryptographic verification fails otherwise.
If the data becomes corrupted for any reason, the User needs to re-register with the Relying Party. Re-registration changes the registered public key.
Personal data must not be kept for
longer than necessary to fulfil the
purposes for which it was collected
The User may de-register from a Relying Party at any time. Once de-registration has taken place the Public key held by the Relying Party is of no further use.
Personal data must be kept secure Allowing users to authenticate using FIDO Authentication provides a greater level of security around accessing personal data than passwords alone.
Data required for local User Verification is stored locally on the FIDO Authenticator. FIDO-related data stored at the Relying Party is not confidential by itself. The FIDO Authenticator is required to protect
data required for User Verification and FIDO-related data, such as cryptographic keys, against unauthorized access by third parties.
Personal data must be processed in
accordance with rights of data
subjects
Personal data used to authenticate a User can only be accessed by that User when the User wishes to be authenticated.
Personal data cannot be transferred
outside a given geographical area,
such as the EEA, without specific
circumstances being in place.
Personal data held in a FIDO Authenticator will be protected by the same mechanisms irrespective of the device’s location and the device can only leave the EEA if the owner wishes it to do so.
The FIDO Server used by the Relying Party does not contain personal data.
Better security for online services
Reduced cost for the enterprise
Simpler and safer for consumers
All Rights Reserved. FIDO Alliance. Copyright 2016.
THANK YOU
Connect with Us:
@FIDOAlliance
linkedin.com/company/the-fido-alliance
slideshare.net/FIDOAlliance
All Rights Reserved. FIDO Alliance. Copyright 2016.

Contenu connexe

Tendances

Google Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableFIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)FIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership FIDO Alliance
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusFIDO Alliance
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO Alliance
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in EducationFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected WorldFIDO Alliance
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationFIDO Alliance
 

Tendances (20)

Google Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming Unphishable
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government Requirements
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 

En vedette

Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsJerod Brennen
 
Government Views on the Future of Authentication – Cabinet Office
Government Views on the Future of Authentication – Cabinet OfficeGovernment Views on the Future of Authentication – Cabinet Office
Government Views on the Future of Authentication – Cabinet OfficeFIDO Alliance
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
UAF Case Study by MedImpact
UAF Case Study by MedImpactUAF Case Study by MedImpact
UAF Case Study by MedImpactFIDO Alliance
 
How to reverse engineer Android applications—using a popular word game as an ...
How to reverse engineer Android applications—using a popular word game as an ...How to reverse engineer Android applications—using a popular word game as an ...
How to reverse engineer Android applications—using a popular word game as an ...Christoph Matthies
 
Learning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLearning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLandice Fu
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
Mission, Vision and Strategy in organisations
Mission, Vision and Strategy in organisationsMission, Vision and Strategy in organisations
Mission, Vision and Strategy in organisationsBart Van Loon
 

En vedette (8)

Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile Applications
 
Government Views on the Future of Authentication – Cabinet Office
Government Views on the Future of Authentication – Cabinet OfficeGovernment Views on the Future of Authentication – Cabinet Office
Government Views on the Future of Authentication – Cabinet Office
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
UAF Case Study by MedImpact
UAF Case Study by MedImpactUAF Case Study by MedImpact
UAF Case Study by MedImpact
 
How to reverse engineer Android applications—using a popular word game as an ...
How to reverse engineer Android applications—using a popular word game as an ...How to reverse engineer Android applications—using a popular word game as an ...
How to reverse engineer Android applications—using a popular word game as an ...
 
Learning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorialLearning by hacking - android application hacking tutorial
Learning by hacking - android application hacking tutorial
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Mission, Vision and Strategy in organisations
Mission, Vision and Strategy in organisationsMission, Vision and Strategy in organisations
Mission, Vision and Strategy in organisations
 

Similaire à FIDO Webinar – A New Model for Online Authentication: Implications for Policy and Government Applications

FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationFIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellFIDO Alliance
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationFIDO Alliance
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationFIDO Alliance
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Alliance
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoTFIDO Alliance
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond PasswordsFIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressFIDO Alliance
 
IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast BriefingSomo
 

Similaire à FIDO Webinar – A New Model for Online Authentication: Implications for Policy and Government Applications (20)

FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA Presentation
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile Network
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast Briefing
 

Plus de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 

Plus de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

FIDO Webinar – A New Model for Online Authentication: Implications for Policy and Government Applications

  • 1. Implications for Policy and Government Applications Webinar – May 4, 2016 All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR ONLINE AUTHENTICATION
  • 2. Our Speakers Jeremy Grant Brett McDowell Paul Grassi Chertoff Group FIDO Alliance NIST Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 2
  • 3. Authentication is Important to Government 1. Protects access to government assets 2. Enables more high-value citizen-facing services 3. Empowers private sector to provide a wider range of high value services to consumers 4. Secures assets in regulated industries 5. Promotes good security practices in the private sector Governments seek identity solutions that can deliver not just improved Security – but also Privacy, Interoperability, and better Customer Experiences All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 4. FIDO Delivers on Key Policy Priorities Security • Authentication using strong asymmetric Public Key cryptography • Superior to old “shared secrets” model – there is nothing to steal • Biometrics as second factor Privacy • Privacy architected in up front; supports EU Privacy Principles, other national privacy initiatives • No linkability or tracking • Biometric data never leaves device • Consumer control and consent Interoperability • Open standards: FIDO 2.0 specs are in W3C standardization process • FIDO compliance/ conformance testing to ensure interoperability of “FIDO certified” products Usability • Designed with the user experience (UX) first – with a goal of making authentication as easy as possible. • Security built to support the user’s needs, not the other way around All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 5. FIDO Impact on Policy FIDO specifications offer governments newer, better options for strong authentication – but governments may need to update some policies to support the ways in which FIDO is different. As technology evolves, policy needs to evolve with it. All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 6. All Rights Reserved. FIDO Alliance. Copyright 2016. FIDO ALLIANCE: AN OVERVIEW Brett McDowell 6
  • 7. The world has a PASSWORD PROBLEM 5Confidential
  • 8. 781 data breaches in 2015 Data Breaches… 170 million records in 2015 (up 50%) $3.8 million cost/breach (up 23% f/2013)
  • 9. ONE-TIME PASSCODES Improve security but aren’t easy enough to use Still Phishable User Confusion Token Necklace SMS Reliability 6Confidential
  • 10. WE NEED A NEW MODEL
  • 11. WE CALL OUR NEW MODEL Fast IDentity Online online authentication using public key cryptography
  • 14. HOW OLD AUTHN WORKS ONLINE The user authenticates themselves online by presenting a human-readable “shared secret”
  • 15. HOW FIDO AUTHN WORKS AUTHENTICATOR LOCAL ONLINE The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography
  • 16. FIDO Registration Invitation Sent New Keys Created Pubic Key Registered With Online Server User is in a Session Or New Account Flow 1 2 3 4 Registration Complete User Approval
  • 17. Login Complete FIDO Authentication FIDO Challenge Key Selected & Signs Signed Response verified using Public Key Cryptography User needs to login or authorize a transaction 1 2 3 4 User Approval
  • 18. OPEN STANDARDS R.O.I. FIDO-ENABLE ONCE GAIN EVERY DEVICE YOU TRUST NO MORE ONE-OFF INTEGRATIONS
  • 20. Better security for online services Reduced cost for the enterprise Simpler and safer for consumers
  • 21. FIDO Alliance Mission Develop Specifications Operate Adoption Programs Pursue Formal Standardization 1 2 3
  • 22. FIDO DEVELOPMENT TIMELINE FIDO 1.0 FINALFirst DeploymentsSpecification Review Draft FIDO Ready Program Alliance Announced FEB 2013 6 Members DEC 2013 FEB 2014 FEB-OCT 2014 DEC 9 2014 MAY 2015 TODAY >250 Members Market Adoption JUNE 2015 Certification Program New U2F Transports
  • 26. Government & Research “The fact that FIDO has now welcomed government participation is a logical and exciting step toward further advancement of the Identity Ecosystem; we look forward to continued progress.” -- Mike Garcia, NSTIC NPO 26 2640Confidential
  • 27. Liaison Program Our mission is highly complementary to many other associations around the world. We welcome the opportunity to collaborate with this growing list of industry partner organizations. 27 27
  • 28. “PayPal and Samsung Enable Consumer Payments with Fingerprint Authentication on New Samsung Galaxy S5” Feb 24, 2014 “Secure Consumer Payments Enabled for Alipay Customers with Easy-to-Use Fingerprint Sensors on Recently-Launched Samsung Galaxy S5” September 17, 2014 “Google Launches Security Key, World’s First Deployment of Fast Identity Online Universal Second Factor (FIDO U2F) Authentication” October 21, 2014 2014 FIDO ADOPTION
  • 29. “Microsoft Announces FIDO Support Coming to Windows 10” Feb 23, 2015 “Qualcomm launches Snapdragon fingerprint scanning technology” March 2, 2015 “Google for Work announced Enterprise admin support for FIDO® U2F ‘Security Key’” April 21, 2015 “Largest mobile network in Japan becomes first wireless carrier to enhance customer experience with natural, simple and strong ways to authenticate to DOCOMO’s services using FIDO standards.” May 26, 2015 2015 FIDO ADOPTION “Today, we’re adding Universal 2nd Factor (U2F) security keys as an additional method for two-step verification, giving you stronger authentication protection.” August 12, 2015 “[T]he technology supporting fingerprint sign-in was built according to FIDO (Fast IDentity Online) standards.” September 15, 2015 “GitHub says it will now handle what is called the FIDO Universal 2nd Factor, or U2F, specification.” October 1, 2015
  • 30. “NTT DOCOMO is now offering FIDO-enabled biometric authentication for customers using Apple iOS devices” Mar 7, 2016 2016 FIDO ADOPTION “FIDO Universal 2nd Factor (U2F) authentication is now being used to allow all UK citizens to easily and securely access GOV.UK Verify digital public services. Mar 23, 2016 “BC Card provides Token and FIDO services to strengthen security and safety of Samsung Pay” March 1, 2016 “KEB Hana’s new solution is notably FIDO Certified.” February 3, 2016
  • 31. Deployments are enabled by over 150 FIDO® Certified products available today
  • 32.  Available to anyone  Ensures interoperability  Promotes the FIDO ecosystem Steps to certification: 1. Conformance Self-Validation 2. Interoperability Testing 3. Certification Request 4. Trademark License (optional) fidoalliance.org/certification
  • 33. 33
  • 34. Leading OEMs Shipping FIDO Certified Devices Tab S, Tab S2S5, Mini Note 4, 5Alpha Note Edge S6/S7, S6/S7 Edge Sharp Aquos Zeta Sony Experia Z5 Fujitsu Arrows (Iris Biometrics) Samsung LG V10 & G5 Huawei Mate 8
  • 35. iPhone 5s iPhone 6, 6+ iPad Air 2, Mini 3 iPhone 6s, 6s+ iPad Mini 4 iPad Pro FIDO Applications Now Run on iOS 9 Supported iOS Fingerprint Devices
  • 38. FIDO IN GOVERNMENT SERVICES: A NIST PERSPECTIVE Paul Grassi Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 38
  • 39. FIDO and Digital Government Services All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 40. –Dr. Andy Ozment “…encryption would not have helped…” All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 41. Privacy Enhancing & Voluntary Secure & Resilient Interoperable Cost-Effective & Easy to Use All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 42. USG Use Cases ?M-05-24 All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 43. All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 44. Identity Proofing Credential Attributes All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 45. strength of authentication All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 46. Update on the Update All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 47. PERSPECTIVES ON FIDO IN GLOBAL POLICY Jeremy Grant Confidential. All Rights Reserved. FIDO Alliance. Copyright 2016. 47
  • 48. FIDO Engagement on Policy Issues • FIDO Launched the Public Policy and Privacy Working Group (P3WG) in 2014 • Mission: • Focus on “Privacy by Design” approach to FIDO specifications, providing privacy expertise and guidance • Monitor global privacy and public policy issues that impact authentication, engaging in education efforts where appropriate • Co-Chairs: Hannes Tschofenig (ARM) and Stephan Somogyi (Google) All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 49. Why Policy Matters • Governments around the world are focusing on identity and authentication requirements, both for their own systems, as well as systems in industries that they regulate • Drivers for these enhanced requirements include both the increased number of attacks tied to passwords in public and private sector, as well as the need for more secure consumer/citizen-facing digital services • As governments engage here, support for new approaches like FIDO is not a given: • Most governments are not aware of FIDO, or if they are, do not properly understand it • Natural gap between technology innovation and understanding of that innovation by policymakers and regulators All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 50. FIDO Engagement on Policy Issues 2016 Activities • FIDO Privacy White Paper – January 2016 • Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PSD2) – February 2016 • Response to NIST RFI on updates to NIST “Framework for Improving Critical Infrastructure Cybersecurity” – March 2016 • Active inventorying and monitoring of authentication- related policies across the globe All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 51. What Governments Should Know 1. Recognize that two-factor authentication no longer brings higher burdens or costs. All Rights Reserved. FIDO Alliance. Copyright 2016. • While this statement was true of most “old” MFA technology, FIDO specifically addresses these cost and usability issues. • FIDO enables simpler, stronger authentication capabilities that governments, businesses and consumers can easily adopt at scale.
  • 52. What Governments Should Know 2. Recognize technology is now mature enough to enable two secure, distinct authentication factors in a single device. All Rights Reserved. FIDO Alliance. Copyright 2016. • Recognized by the US government (NIST) in 2014… • “OMB (White House) to update guidance on remote electronic authentication” to remove requirements that one factor be separate from the device accessing the resource • The evolution of mobile devices – in particular, hardware architectures that offer highly robust and isolated execution environments (such as TEE, SE and TPM) – has allowed these devices to achieve high-grade security without the need for a physically distinct token
  • 53. What Governments Should Know 3. As governments promote or require strong authentication, make sure it is the “right” strong authentication. The market is in the midst of a burst of innovation around authentication technology – some solutions are better than others. Don’t push the adoption of old authentication technology. • Old authentication technologies impose significant costs and burdens on the user – which decreases adoption • Old authentication technologies have security (i.e., phishable) and privacy issues – putting both users and online service providers at risk All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 54. What Governments Should Know 4. FIDO is designed to enhance privacy • Designed from the start to support the Privacy Principles of the European Data Protection Directive and other government privacy initiatives • No 3rd Party in the Protocol • No Secrets on the Server Side • Biometric Data (if used) Never Leaves Device • No Linkability Between Services • No Linkability Between Accounts All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 55. FIDO and User Privacy - US All Rights Reserved. FIDO Alliance. Copyright 2016. FIDO Privacy Principle IDESG Privacy requirements Require explicit, Informed consent for any operation using personal data PRIVACY-6. USAGE NOTICE PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-9. USER NOTICE OF CHANGES PRIVACY-10. USER OPTION TO DECLINE PRIVACY-11. OPTIONAL INFORMATION Provide clear context to the user for any FIDO operations PRIVACY-6. USAGE NOTICE PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-9. USER NOTICE OF CHANGES PRIVACY-10. USER OPTION TO DECLINE PRIVACY-11. OPTIONAL INFORMATION Limit collection of personal data to FIDO- related purposes PRIVACY-1. DATA MINIMIZATION PRIVACY-2. PURPOSE LIMITATION PRIVACY-3. ATTRIBUTE MINIMIZATION PRIVACY-5. DATA AGGREGATION RISK PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-12. ANONYMITY PRIVACY-13. CONTROLS PROPORTIONATE TO RISK Use personal data only for FIDO operations PRIVACY-1. DATA MINIMIZATION PRIVACY-2. PURPOSE LIMITATION PRIVACY-5. DATA AGGREGATION RISK PRIVACY-8. THIRD PARTY LIMITATIONS FIDO Privacy Principle IDESG Privacy requirements Prevent identification of a user outside of FIDO operations PRIVACY-1. DATA MINIMIZATION PRIVACY-2. PURPOSE LIMITATION PRIVACY-3. ATTRIBUTE MINIMIZATION PRIVACY-5. DATA AGGREGATION RISK PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-12. ANONYMITY Biometric data must never leave the user’s personal computing environment PRIVACY-1. DATA MINIMIZATION PRIVACY-2. PURPOSE LIMITATION PRIVACY-3. ATTRIBUTE MINIMIZATION PRIVACY-4. CREDENTIAL LIMITATION PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-15 ATTRIBUTE SEGREGATION Protect FIDO-related data from unauthorized access or disclosure Covered by IDESG Security Requirements PRIVACY-14. DATA RETENTION Allow users to easily view and manage their FIDO Authenticators PRIVACY-7. USER DATA CONTROL PRIVACY-8. THIRD PARTY LIMITATIONS PRIVACY-14. DATA RETENTION FIDO Privacy Principles mapped to Identity Ecosystem Steering Group (IDESG) Requirements
  • 56. FIDO and User Privacy - EU All Rights Reserved. FIDO Alliance. Copyright 2016. EU Privacy Principle FIDO Implementation of EU Privacy Principle Personal data must be processed fairly and lawfully For a User to access a Relying Party’s services through FIDO Authentication, the User must first agree to register with that Relying Party. When the User wishes to access the online service, they must execute the User Verification step, e.g. touching a sensor, entering a passcode, or providing their fingerprint, in order to execute the cryptographic computation. This ensures that malware installed on the User’s device is unable to autonomously perform FIDO operations. Personal data can only be processed for one or more specified lawful purpose(s) The Personal Data required to access an online service, such as a fingerprint, can only be accessed by the FIDO Authenticator which is part of the User’s device. The FIDO Authenticator can only access such data when it is required to perform an Authentication. The FIDO protocol requires a minimum amount of data stored by the Relying Party, for which the user is required to provide consent. Personal data must be adequate, relevant, and not excessive in relation to the purposes for which it is being used The data needed to perform an Authentication is collected by the Relying Party when the User registers with it. This data is:  A public key: This allows the Relying Party to verify that the FIDO Authenticator being used is the one previously registered by the User.  Authenticator Attestation ID (AAID): This is a reference that allows the Relying Party to look-up the characteristics of the used FIDO Authenticator.  Key Handle: An identifier created by a FIDO Authenticator, potentially containing an encrypted private key, to refer to a specific key maintained the FIDO Authenticator. Personal data must be accurate and up to date The data used for FIDO Authentication, such as the registered public key, must be accurate since cryptographic verification fails otherwise. If the data becomes corrupted for any reason, the User needs to re-register with the Relying Party. Re-registration changes the registered public key. Personal data must not be kept for longer than necessary to fulfil the purposes for which it was collected The User may de-register from a Relying Party at any time. Once de-registration has taken place the Public key held by the Relying Party is of no further use. Personal data must be kept secure Allowing users to authenticate using FIDO Authentication provides a greater level of security around accessing personal data than passwords alone. Data required for local User Verification is stored locally on the FIDO Authenticator. FIDO-related data stored at the Relying Party is not confidential by itself. The FIDO Authenticator is required to protect data required for User Verification and FIDO-related data, such as cryptographic keys, against unauthorized access by third parties. Personal data must be processed in accordance with rights of data subjects Personal data used to authenticate a User can only be accessed by that User when the User wishes to be authenticated. Personal data cannot be transferred outside a given geographical area, such as the EEA, without specific circumstances being in place. Personal data held in a FIDO Authenticator will be protected by the same mechanisms irrespective of the device’s location and the device can only leave the EEA if the owner wishes it to do so. The FIDO Server used by the Relying Party does not contain personal data.
  • 57. Better security for online services Reduced cost for the enterprise Simpler and safer for consumers All Rights Reserved. FIDO Alliance. Copyright 2016.
  • 58. THANK YOU Connect with Us: @FIDOAlliance linkedin.com/company/the-fido-alliance slideshare.net/FIDOAlliance All Rights Reserved. FIDO Alliance. Copyright 2016.

Notes de l'éditeur

  1. But what specifically makes passwords such a problem? (lead into next slide)
  2. Source of 781 breaches in 2015 = Identity Theft Resource Center Breach Report Source of 170m records exposed in 2015 = Identity Theft Resource Center Breach Report (note >66% of these in healthcare) Source of $3.8m / breach in 2015 = Ponemon Institute Cost of Data Breach Study
  3. The only thing worse than a password is two passwords. SMS is not always available / dedicated hardware is often service-specific / it’s cumbersome process users generally don’t like / and it is still vulnerable to phishing (it is still a symmetric shared secret, just short-lived, but malware tools have adjusted to this)
  4. User convenience is so important that we put it in the very name of the technology itself - the “F” in FIDO stands for Fast. Historically, “Fast” has always meant “Weak” – but it’s important to understand that FIDO was designed from the ground up to provide privacy protections in addition to providing strong authentication. Fundamentally, the solution that we developed replaces passwords, which are over 50 years old, with modern public key cryptography.
  5. AMEX, VASCO and INFINEON announced today
  6. One more prominent EU government agency is about to be announced.
  7. One more prominent EU government agency is about to be announced.
  8. Microsoft: 1.5 billion users, 190 countries in Q3, free upgrade for consumers Qualcomm Snapdragon: drives >1 billion android devices, >85 OEM customers Google: Full lifecycle management for >5 million businesses who use “Google for Work”
  9. One more prominent EU government agency is about to be announced.
  10. We support a growing number of fingerprint enabled Android devices that have in-built UAF capabilities Most of the new Samsung high devices with FPSs support UAF Newer devices from Fujitsu, Sharp and Sony increasingly include UAF support out of the box Fujitsu Arrows NX supports UAF-enabled iris authentication. We will see other types of authenticators also appear in coming devices We support the Android M fingerprint API Apart from these devices with native FIDO UAF support, we also support virtually any non-FPS Android device running Kit Kat or newer using an embedded UAF PIN authenticator.
  11. We support all Touch ID enabled iOS devices These devices don’t have native FIDO UAF support We have built a UAF authenticator using the Touch ID API and the secure enclave We also support non-Touch ID devices(Eg iPhone 4s and 5) running iOS 8 or higher using device passcode (PIN) authenticator