SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Bernd Kowalski
Federal Office for Information Security
FIDO, Strong Authentication
and eID in Germany
Agenda
 Government Objectives in Strong ID & Authentication
 Why did BSI join the FIDO alliance?
 What is the market perspective?
 Derived Identity / Authenticity approach
2Bernd Kowalski
Government Objectives in Strong ID & Authentication
About us: Federal Office for Information Security
 BSI: Bundesamt für Sicherheit in der Informationstechnik
 Germany's national IT Security Agency
 Founded in 1991
 Staff: ~ 662 employees
 Annual Budget: 89 millions Euro
3Bernd Kowalski
Government Objectives in Strong ID & Authentication
BSI Mission
 Analysis and evaluation of IT security risks,
Information and awareness-building
 Technical standards, Test and Certification Services for the security of
IT components and systems
 Security solutions for government networks
and applications
 Support government regulations for
adopting adequate security standards
 International cooperation:
SOGIS-MRA / Common Criteria, ICAO,
ITU-T, CEN/CENELEC, ETSI, ISO,
NFC-Forum, IETF, Global Plattform, ...
4Bernd Kowalski
 Smart Grid, Smart Metering (KRITIS)
 Smart Home, Smart Services
 Industry 4.0 / Remote Maintenance
 eMobility / car2car / car2x
 eHealth / eGovernment
 Cloud Computing
 ePassport and national IDs
 Online Banking, ePayment
Need for Secure ID & Trust Services
Government Objectives in Strong ID & Authentication
Digital Transformation in All Regulatory Sectors
5Bernd Kowalski
Government Objectives in Strong ID & Authentication
General Requirements on Strong ID & Authentication
 Replacement of passwords by 2FA / MFA
(i.e. ownership + knowledge / ownership + inherence)
 Support of certified secure elements and hardware token
 Independancy of trust services and online services
 Open technical standards permitting multifunctional usage
 Security vs. Usability & Convenience
 some Use Cases require a High level of Security
 in other Use Cases Usability is the key factor
 Appropriate Migration of (Hardware) Token
(i.e. replacement / renewal / revocation) must satisfy user convenience
6Bernd Kowalski
Why did BSI join the FIDO Alliance?
FIDO provides
 potential usage of strong ID & authentication for all webbrowsers and online
services
 simple integration and fast market penetration
 standardized authentication procedure independent of the application
 standardized user interface
 independency of Trust Services & personal IDs from business models of
market leaders
 usage of mobile plattforms
 synergy with NFC / ISO 14443
 usage of national IDs
7Bernd Kowalski
1. Creating and Managing of
a Customer Account
+
2. Creating and secure
storage of a derived identity
+
3. Contactless purchasing
and paying of a ticket by
using a derived identity
+
+
4. Contactless ticketing by
using a smartphone
Secure and safe identification Comfortable use
Strong ID for Public Transport
What is the market perspective?
German National Project “NFC-Initiative”
8Bernd Kowalski
 The NFC initiative is ...
 a joint activity of the BMI, BMWi and the BMVI in the context of the “Digital Agenda”
 with the participation of German industry, represented by the following companies:
 supported by the Federal Office for Information Security in Germany.
 Challenges for the NFC initiative:
 Harmonization of standardization in various committees focusing on NFC Forum
 Target: Functionality is important, therefore interoperability before strict conformity
 Field implementation as a "proof-of-concept" for technical specifications and acceptance of public transport
companies and their customers
comfortable and safe ticketing for the citizens!comfortable and safe ticketing for the citizens!
What is the market perspective?
German National Project “NFC-Initiative”
Project Partners
9Bernd Kowalski
Standardized eGov Account Service
 eGov-Services can be offered nationwide
 interoperable Service Accounts can
be used in different eGov domains
Some German federal states already offer one
Service Account to multiple municipalities
 Impact:
More municipalities are able to offer eGov-services
 Current situation: Prototypical development of interoperable Service Accounts
in Bavaria and North Rhine-Westphalia
What is the market perspective?
Citizen Service Accounts
11Bernd Kowalski
De-Mail – The secure and reliable German eDelivery solution
E-Mai
l
 Future usage of FIDO Token as 2nd factor for a high level authentication at
De-Mail, depending on achievable security level (according to eIDAS)
What is the market perspective?
De-Mail
User logs in
via FIDO Token
12Bernd Kowalski
eIDAS-VO:
 Notification of member states identification systems
 FIDO does authentication not identification,
but: authentication is important part of identification systems
→ FIDO could be part of an identification system according to eIDAS
 Identification systems rated by "Level of Assurance"
→ mapping to FIDO security levels?
Trust-Services:
 Introduction of server signatures
 FIDO as possible signature activation
What is the market perspective?
eIDAS-VO
13Bernd Kowalski
Reasons for the revision of EU Directive 2007/64/EG:
 Sufficient standardization and interoperability of various payment services for card
payments and e- and mPayments is not given.
The central point of the PSD II from the perspective of information security:
 "Strong Customer Authentication" for retrieving account information and performing
transactions is required.
 Strong customer authentication is defined as a procedure based on the use of two or
more of the following elements
Chance for information security:
 Designing a secure, privacy-friendly and applicable authentication solution by the
European Central Bank, the European Banking Authority and the SecurePay forum is still
pending.
 Refinement of the security requirements can still be affected!
What is the market perspective?
Payment Service Directive II (PSD II)
Ownership Knowledge Inherence
14Bernd Kowalski
Authentication Systems
Authentication Devices
Yubikey VDV core appMobile
Connect
Secure
Elements
Primary Identity
Technologies for Derived Identities
1. Transfer
Datagroups
Authentic DataAuthentic Data Identifier
(secret)
Identifier
(secret)
+
2. Register
Authentication Device (build secret)
= Derived Identity
Derived Identity / Authenticity approach
15Bernd Kowalski
 Growing risks through misuse of conventional IDs (passwords)
 Digital society requires strong IDs with Secure Elements and
2-Factor Authentication
 Regulatory Framework required for sufficient Technical ID-Standards in
critical areas
 European Market has a sufficient size to set appropriate technical
standards
 PSD2 is an opportunity for the acceptance of FIDO in Europe
 FIDO should support:
 NFC/ISO 14443 interoperabilty activities in the NFC-Forum
 usage of FIDO in regulatory projects
 adoption of certified embedded or external SE
Summary
16Bernd Kowalski
Contact
Federal Office
for Information Security (BSI)
Bernd Kowalski
Godesberger Allee 185-189
53175 Bonn
Germany
Bernd.Kowalski@bsi.bund.de
www.bsi.bund.de
www.bsi-fuer-buerger.de

Contenu connexe

Tendances

Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong AuthenticationFIDO Alliance
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectKeet Sugathadasa
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationFIDO Alliance
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsFIDO Alliance
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In GovernmentFIDO Alliance
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in KoreaFIDO Alliance
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile ConnectFIDO Alliance
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications OverviewFIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of ThingsFIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellFIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsFIDO Alliance
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsFIDO Alliance
 

Tendances (20)

Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer Authentication
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In Government
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets Identification
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in Korea
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More Simple
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standards
 

En vedette

FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
OAuth and REST web services
OAuth and REST web servicesOAuth and REST web services
OAuth and REST web servicessullis
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationLeonard Moustacchis
 
Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012Nov Matake
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22Nov Matake
 
TTA’s approach to promoting FIDO standards in Korea
  TTA’s approach to promoting FIDO standards in Korea	  TTA’s approach to promoting FIDO standards in Korea
TTA’s approach to promoting FIDO standards in Korea FIDO Alliance
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)FIDO Alliance
 
Introduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and StatusIntroduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and StatusFIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithW3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithFIDO Alliance
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinFIDO Alliance
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect Nat Sakimura
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance
 
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교Lee Ji Eun
 

En vedette (16)

FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
OAuth and REST web services
OAuth and REST web servicesOAuth and REST web services
OAuth and REST web services
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 
Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22
 
TTA’s approach to promoting FIDO standards in Korea
  TTA’s approach to promoting FIDO standards in Korea	  TTA’s approach to promoting FIDO standards in Korea
TTA’s approach to promoting FIDO standards in Korea
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Introduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and StatusIntroduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and Status
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithW3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan
 
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
 

Similaire à FIDO, Strong Authentication and elD in Germany

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital idCapgemini
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio
 
2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf0xctrlalt
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionVKVirata1
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Smartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceSmartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceFilipe Mello
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Alliance
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 

Similaire à FIDO, Strong Authentication and elD in Germany (20)

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital id
 
Workshop eID
Workshop eIDWorkshop eID
Workshop eID
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
 
M&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisitionM&A doc strategies of Avaloq acquisition
M&A doc strategies of Avaloq acquisition
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Smartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conferenceSmartcard Helsinki Public ID conference
Smartcard Helsinki Public ID conference
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Konduko institutional
Konduko institutionalKonduko institutional
Konduko institutional
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 

Plus de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 

Plus de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

FIDO, Strong Authentication and elD in Germany

  • 1. Bernd Kowalski Federal Office for Information Security FIDO, Strong Authentication and eID in Germany Agenda  Government Objectives in Strong ID & Authentication  Why did BSI join the FIDO alliance?  What is the market perspective?  Derived Identity / Authenticity approach
  • 2. 2Bernd Kowalski Government Objectives in Strong ID & Authentication About us: Federal Office for Information Security  BSI: Bundesamt für Sicherheit in der Informationstechnik  Germany's national IT Security Agency  Founded in 1991  Staff: ~ 662 employees  Annual Budget: 89 millions Euro
  • 3. 3Bernd Kowalski Government Objectives in Strong ID & Authentication BSI Mission  Analysis and evaluation of IT security risks, Information and awareness-building  Technical standards, Test and Certification Services for the security of IT components and systems  Security solutions for government networks and applications  Support government regulations for adopting adequate security standards  International cooperation: SOGIS-MRA / Common Criteria, ICAO, ITU-T, CEN/CENELEC, ETSI, ISO, NFC-Forum, IETF, Global Plattform, ...
  • 4. 4Bernd Kowalski  Smart Grid, Smart Metering (KRITIS)  Smart Home, Smart Services  Industry 4.0 / Remote Maintenance  eMobility / car2car / car2x  eHealth / eGovernment  Cloud Computing  ePassport and national IDs  Online Banking, ePayment Need for Secure ID & Trust Services Government Objectives in Strong ID & Authentication Digital Transformation in All Regulatory Sectors
  • 5. 5Bernd Kowalski Government Objectives in Strong ID & Authentication General Requirements on Strong ID & Authentication  Replacement of passwords by 2FA / MFA (i.e. ownership + knowledge / ownership + inherence)  Support of certified secure elements and hardware token  Independancy of trust services and online services  Open technical standards permitting multifunctional usage  Security vs. Usability & Convenience  some Use Cases require a High level of Security  in other Use Cases Usability is the key factor  Appropriate Migration of (Hardware) Token (i.e. replacement / renewal / revocation) must satisfy user convenience
  • 6. 6Bernd Kowalski Why did BSI join the FIDO Alliance? FIDO provides  potential usage of strong ID & authentication for all webbrowsers and online services  simple integration and fast market penetration  standardized authentication procedure independent of the application  standardized user interface  independency of Trust Services & personal IDs from business models of market leaders  usage of mobile plattforms  synergy with NFC / ISO 14443  usage of national IDs
  • 7. 7Bernd Kowalski 1. Creating and Managing of a Customer Account + 2. Creating and secure storage of a derived identity + 3. Contactless purchasing and paying of a ticket by using a derived identity + + 4. Contactless ticketing by using a smartphone Secure and safe identification Comfortable use Strong ID for Public Transport What is the market perspective? German National Project “NFC-Initiative”
  • 8. 8Bernd Kowalski  The NFC initiative is ...  a joint activity of the BMI, BMWi and the BMVI in the context of the “Digital Agenda”  with the participation of German industry, represented by the following companies:  supported by the Federal Office for Information Security in Germany.  Challenges for the NFC initiative:  Harmonization of standardization in various committees focusing on NFC Forum  Target: Functionality is important, therefore interoperability before strict conformity  Field implementation as a "proof-of-concept" for technical specifications and acceptance of public transport companies and their customers comfortable and safe ticketing for the citizens!comfortable and safe ticketing for the citizens! What is the market perspective? German National Project “NFC-Initiative” Project Partners
  • 9. 9Bernd Kowalski Standardized eGov Account Service  eGov-Services can be offered nationwide  interoperable Service Accounts can be used in different eGov domains Some German federal states already offer one Service Account to multiple municipalities  Impact: More municipalities are able to offer eGov-services  Current situation: Prototypical development of interoperable Service Accounts in Bavaria and North Rhine-Westphalia What is the market perspective? Citizen Service Accounts
  • 10.
  • 11. 11Bernd Kowalski De-Mail – The secure and reliable German eDelivery solution E-Mai l  Future usage of FIDO Token as 2nd factor for a high level authentication at De-Mail, depending on achievable security level (according to eIDAS) What is the market perspective? De-Mail User logs in via FIDO Token
  • 12. 12Bernd Kowalski eIDAS-VO:  Notification of member states identification systems  FIDO does authentication not identification, but: authentication is important part of identification systems → FIDO could be part of an identification system according to eIDAS  Identification systems rated by "Level of Assurance" → mapping to FIDO security levels? Trust-Services:  Introduction of server signatures  FIDO as possible signature activation What is the market perspective? eIDAS-VO
  • 13. 13Bernd Kowalski Reasons for the revision of EU Directive 2007/64/EG:  Sufficient standardization and interoperability of various payment services for card payments and e- and mPayments is not given. The central point of the PSD II from the perspective of information security:  "Strong Customer Authentication" for retrieving account information and performing transactions is required.  Strong customer authentication is defined as a procedure based on the use of two or more of the following elements Chance for information security:  Designing a secure, privacy-friendly and applicable authentication solution by the European Central Bank, the European Banking Authority and the SecurePay forum is still pending.  Refinement of the security requirements can still be affected! What is the market perspective? Payment Service Directive II (PSD II) Ownership Knowledge Inherence
  • 14. 14Bernd Kowalski Authentication Systems Authentication Devices Yubikey VDV core appMobile Connect Secure Elements Primary Identity Technologies for Derived Identities 1. Transfer Datagroups Authentic DataAuthentic Data Identifier (secret) Identifier (secret) + 2. Register Authentication Device (build secret) = Derived Identity Derived Identity / Authenticity approach
  • 15. 15Bernd Kowalski  Growing risks through misuse of conventional IDs (passwords)  Digital society requires strong IDs with Secure Elements and 2-Factor Authentication  Regulatory Framework required for sufficient Technical ID-Standards in critical areas  European Market has a sufficient size to set appropriate technical standards  PSD2 is an opportunity for the acceptance of FIDO in Europe  FIDO should support:  NFC/ISO 14443 interoperabilty activities in the NFC-Forum  usage of FIDO in regulatory projects  adoption of certified embedded or external SE Summary
  • 16. 16Bernd Kowalski Contact Federal Office for Information Security (BSI) Bernd Kowalski Godesberger Allee 185-189 53175 Bonn Germany Bernd.Kowalski@bsi.bund.de www.bsi.bund.de www.bsi-fuer-buerger.de