SlideShare une entreprise Scribd logo
1  sur  54
Télécharger pour lire hors ligne
EXPERIENCE SIMPLER, STRONGER AUTHENTICATION
1
Data Breaches
are out of control
2
783 data breaches
IN 2014...
>1 billion
records stolen since 2012
3
$3.5 million
average cost per breach
We have a PASSWORD PROBLEM
4
Re-used Phished Keylogged
TOO MANY TO REMEMBER,
DIFFICULT TO TYPE,
AND TOO VULNERABLE
5
Adding more authentication
has largely been rejected by users
6
ONE-TIME PASSCODES
Improve security but
aren’t easy enough
Still
Phishable
Poor User
Experience
Token
Necklace
SMS
Reliability
7
THE OLD
PARADIGM
8
USABILITYSECURITY
PasswordsOTP
2FA
PINs
WE NEED A
NEW MODEL
Fast IDentity Online9
THE FIDO
PARADIGM
10
Poor Good
WeakStrong
USABILITY
SECURITY
Passwords
™
PINs
OTP
2FA
HOW DOES FIDO WORK?
USER VERIFICATION FIDO AUTHENTICATION
AUTHENTICATOR
11
Fido Registration
2
Registration Begins
1
12
User Approval
3
New Key Created
4
Key Registered using
Public Key
Cryptography
Fido Login
2
Login
1
13
Login Challenge
3
Key Selected
4
Login Response using
Public Key
Cryptography
User Approval
Login Complete
online authentication using
public key cryptography
14
Passwordless Experience (FIDO UAF Standards)
Second Factor Experience (FIDO U2F Standards)
Transaction Detail User Authentication Done
1 2 3
Success
$10,000
Transfer Now
Login & Password
1
Insert dongle
Press Button
2
Done
3
Success
15
2014 Deployments
16
 PayPal continues FIDO enablement in
improved mobile wallet app.
 Google has FIDO in Chrome and
2-Step Verification.
 Samsung adds FIDO enabled Touch
authentication to Galaxy® S6
FIDO UNIVERSAL 2ND FACTOR
AUTHENTICATOR
Is a user
present?
Same
authenticator
as registered
before?
USER VERIFICATION FIDO AUTHENTICATION
17
18
Step 1
U2F AUTHENTICATION DEMO EXAMPLE
19
Step 2
U2F AUTHENTICATION DEMO EXAMPLE
20
Step 3
U2F AUTHENTICATION DEMO EXAMPLE
21
Step 4
U2F AUTHENTICATION DEMO EXAMPLE
+Bob
AUTHENTICATOR
USER VERIFICATION FIDO AUTHENTICATION
FIDO UNIVERSAL
AUTHENTICATION FRAMEWORK UAF
22
Same User
as enrolled
before?
Same
Authenticator
as registered
before?
UAF AUTHENTICATION
DEMO EXAMPLE
23
STEP 1
24
UAF AUTHENTICATION
DEMO EXAMPLE
STEP 2
25
UAF AUTHENTICATION
DEMO EXAMPLE
STEP 3
26
UAF AUTHENTICATION
DEMO EXAMPLE
STEP 4
USABILITY, SECURITY
and
PRIVACY
27
28
No 3rd Party in the Protocol
No Secrets on the Server side
Biometric data (if used) never leaves device
No link-ability between Services or Accounts
Better Security for online services
Reduced cost for the enterprise
Simple & Safe for consumers
29
The FIDO Alliance is an open
association of more than 180
diverse member organizations
30
31
Physical-to-digital identity
User Management
Authentication
Federation
Single
Sign-On
Passwords Risk-BasedStrong
MODERN
AUTHENTICATION
10
Board Members
32
 Online Services
 Chip Providers
 Device Providers
 Biometrics Vendors
 Enterprise Servers
 Platform Providers
FIDO TIMELINE
FIDO 1.0 FINAL
Specification
First UAF & U2F
Deployments
Specification
Review DraftFIDO Ready
Program
Alliance
Announced
FEB
2013
(6 Members)
DEC
2013
(59 Members)
FEB
2014
(84 Members)
FEB-OCT
2014
(129 Members)
DEC 9
2014
(152 Members)
33
FIDO implementations and deployments
34
FIDO in 2015
35
A range of
FIDO PRODUCTS
is now available
36
Implementing 1.0 Specifications
(this is only a subset of active implementations)
Online Services
Chip Providers
Device Providers
Biometrics Technology Providers
Enterprise Servers
Open Source
Mobile Apps/Clients
WWW Browsers
FIDO in Windows 10
37
 Windows used by
1.5 billion users
 Windows 10 in 190
countries by Q3
 Free upgrade for
consumer
FIDO in Snapdragon
38
 Market leader to
ship FIDO client
 85+ OEMs as of Q4
 >1 billion Android
devices shipped
 Innovative sensor
FIDO in Healthcare
39
 First healthcare
deployment
 Physician access
to health records
 up to 50 million
Healthcare users
FIDO in Enterprise
40
 Google for Work announced Enterprise
admin support for FIDO® U2F “Security
Key” – April 21
 Google for Work is used by over 5
million businesses worldwide
 “The Security Keys are a great step
forward, as they are very practical and
more secure.” – Woolsworth IT
FIDO & Government
41
2013 Data Breach Investigations Report (conducted
by Verizon in concert with the U.S. Department of
Homeland Security) noted that 76% of 2012 network
intrusions exploited weak or stolen credentials.
-- NIST Roadmap for Improving Critical Infrastructure Cybersecurity,12-
Feb-2014
 Governments
worldwide are
looking at FIDO
 FIDO featured at
White House Summit
 New collaboration
framework…
Infineon
NSP
NNL
New Government
Membership Class
 Reflecting an increased
focus on Government
collaboration worldwide
 Details are now published in
the new FIDO Alliance
Membership Agreement
42
JOIN THE
FIDO ALLIANCE
43
Mobile Connect & FIDO
About the GSMA
The GSMA represents the interests of
mobile operators worldwide
Spanning more than 220 countries, the
GSMA unites nearly 800 of the world’s
mobile operators, as well as more than
230 companies in the broader mobile
ecosystem
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
Mobile Connect: a convenient and secure alternative to
passwords that also Protects consumers privacy
• Easy to use as it uses the mobile phone for
authentication (i.e. no passwords)
• Anonymous but secure log-in (no passwords to
steal, improved user experience, reduce friction)
• Adds trust into digital transactions (e.g. by
confirming location, user identity, usage)
• Protects privacy (operator confirm credentials,
user gives consent for sharing)
• Reduce SP fraud through assurance that there
is as real person behind the account
• Simple and cost effective for MNOs to deploy,
leveraging existing operator assets
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
Something I
Know
Something I
Have
Something I Have
+
Something I
Know
Something I Have
+
Something I Am
Or
Mobile Connect and FIDO both seek to replace passwords
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
 Both FIDO and Mobile Connect are addressing the same problem: easier, safer
online authentication
 Both FIDO and Mobile Connect leverage the mobile phone to achieve this
 Whilst Mobile Connect uses existing MNO services for authentication (SMS, USSD,
SIM Toolkit)
 … FIDO leverages the local device authentication on the phone itself
 In doing so, both provide easy, secure two-factor authentication
 Both also provide a pluggable framework that can support a variety of security
levels as well as supporting new authentication methods as they arise
FIDO objectives align well with those of Mobile Connect
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
Synergistic fit using FIDO for the first mile of Mobile Connect
FIDO UAF protocol
Mobile phone
with FIDO client AuthN server
MNO
Tablet/desktop
Service access request
Service Provider
Authentication
request
Identity GW
First mile
Second mileSIM applet protocol (CPAS8)
AuthN
server
SIM
applet
A key difference between FIDO and
Mobile Connect is that FIDO purposefully
focuses solely on the first mile –
authentication itself – whilst Mobile
Connect also provides a federation layer
via OpenID Connect
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
MNO
 Leveraging FIDO enables users to authenticate using existing
authentication mechanisms on their mobile phone
 …including biometrics – the user
becomes the credential (Something I am)
FIDO can be integrated into Mobile Connect to extend the range of
authenticators
Authentication
Mobile phone
with FIDO client MFAS Identity GW
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
Mobile Connect and FIDO UAF integration: White Paper
 Main objective:
– Overview of FIDO Architecture and use cases
– Integration of FIDO UAF authenticators into Mobile Connect arch
 Status:
– Co-developed between GSMA, MNOs and FIDO members
– First draft finished and out for review within FIDO Alliance and GSMA; targeting
publication by end June
 Left for a second phase:
– UICC based FIDO authenticator
– Use of UICC to enhance FIDO implementation security
– FIDO U2F integration
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
 Service Providers need to be able to both specify and receive feedback on the type of
authenticator used
 Mobile Connect
– uses Level of Assurance (LoA) values (ISO 29115) in the OIDC request acr_values
params, so the SP can indicate the authenticator class that should be used
 FIDO
– uses the FIDO Policy to describe the required authenticator characteristics for
accepted authenticators
 Options:
– Expand the list of acr_values to accommodate additional LoA/policies
– Capture SP requirements at registration to the Mobile Connect service and
propagate via the Mobile Connect federation
Matching of FIDO policies to OpenID Connect ‘acr_values’
© GSMA 2014
All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
 GSMA White paper
– Continue Working on open issues related to the integration of
the FIDO authentication framework with Mobile Connect
– Improve the document with feedback from the PoC
 FIDO/GSMA/MNO PoC (June/July)
– Prototype of FIDO integration into an end-end Mobile Connect
implementation: Telefonica + Nok Nok Labs
– Targeted for Mobile World Congress Shanghai
 MNO/SP beta trial (post MWCS)
– Live implementation and trial of FIDO authenticators within a
Mobile Connect service provided to an SP
Next steps
EXPERIENCE SIMPLER, STRONGER AUTHENTICATION
54

Contenu connexe

Tendances

FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of ThingsFIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.FIDO Alliance
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In GovernmentFIDO Alliance
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Alliance
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO Alliance
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in KoreaFIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleFIDO Alliance
 

Tendances (20)

FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In Government
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in Korea
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More Simple
 

Similaire à Mobile Connections – FIDO Alliance and GSMA Presentation

FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO Alliance
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsFIDO Alliance
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Alliance
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationFIDO Alliance
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
 
Fido Overview: Status and Future
Fido Overview: Status and FutureFido Overview: Status and Future
Fido Overview: Status and FutureFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar FIDO Alliance
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...IdentityNorthEvents
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionFIDO Alliance
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 

Similaire à Mobile Connections – FIDO Alliance and GSMA Presentation (20)

FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
 
FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
Fido Overview: Status and Future
Fido Overview: Status and FutureFido Overview: Status and Future
Fido Overview: Status and Future
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile Network
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 

Plus de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 

Plus de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Dernier

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Mobile Connections – FIDO Alliance and GSMA Presentation

  • 1. EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1
  • 2. Data Breaches are out of control 2
  • 3. 783 data breaches IN 2014... >1 billion records stolen since 2012 3 $3.5 million average cost per breach
  • 4. We have a PASSWORD PROBLEM 4
  • 5. Re-used Phished Keylogged TOO MANY TO REMEMBER, DIFFICULT TO TYPE, AND TOO VULNERABLE 5
  • 6. Adding more authentication has largely been rejected by users 6
  • 7. ONE-TIME PASSCODES Improve security but aren’t easy enough Still Phishable Poor User Experience Token Necklace SMS Reliability 7
  • 9. WE NEED A NEW MODEL Fast IDentity Online9
  • 11. HOW DOES FIDO WORK? USER VERIFICATION FIDO AUTHENTICATION AUTHENTICATOR 11
  • 12. Fido Registration 2 Registration Begins 1 12 User Approval 3 New Key Created 4 Key Registered using Public Key Cryptography
  • 13. Fido Login 2 Login 1 13 Login Challenge 3 Key Selected 4 Login Response using Public Key Cryptography User Approval Login Complete
  • 14. online authentication using public key cryptography 14
  • 15. Passwordless Experience (FIDO UAF Standards) Second Factor Experience (FIDO U2F Standards) Transaction Detail User Authentication Done 1 2 3 Success $10,000 Transfer Now Login & Password 1 Insert dongle Press Button 2 Done 3 Success 15
  • 16. 2014 Deployments 16  PayPal continues FIDO enablement in improved mobile wallet app.  Google has FIDO in Chrome and 2-Step Verification.  Samsung adds FIDO enabled Touch authentication to Galaxy® S6
  • 17. FIDO UNIVERSAL 2ND FACTOR AUTHENTICATOR Is a user present? Same authenticator as registered before? USER VERIFICATION FIDO AUTHENTICATION 17
  • 21. 21 Step 4 U2F AUTHENTICATION DEMO EXAMPLE +Bob
  • 22. AUTHENTICATOR USER VERIFICATION FIDO AUTHENTICATION FIDO UNIVERSAL AUTHENTICATION FRAMEWORK UAF 22 Same User as enrolled before? Same Authenticator as registered before?
  • 28. 28 No 3rd Party in the Protocol No Secrets on the Server side Biometric data (if used) never leaves device No link-ability between Services or Accounts
  • 29. Better Security for online services Reduced cost for the enterprise Simple & Safe for consumers 29
  • 30. The FIDO Alliance is an open association of more than 180 diverse member organizations 30
  • 32. Board Members 32  Online Services  Chip Providers  Device Providers  Biometrics Vendors  Enterprise Servers  Platform Providers
  • 33. FIDO TIMELINE FIDO 1.0 FINAL Specification First UAF & U2F Deployments Specification Review DraftFIDO Ready Program Alliance Announced FEB 2013 (6 Members) DEC 2013 (59 Members) FEB 2014 (84 Members) FEB-OCT 2014 (129 Members) DEC 9 2014 (152 Members) 33
  • 34. FIDO implementations and deployments 34 FIDO in 2015
  • 35. 35 A range of FIDO PRODUCTS is now available
  • 36. 36 Implementing 1.0 Specifications (this is only a subset of active implementations) Online Services Chip Providers Device Providers Biometrics Technology Providers Enterprise Servers Open Source Mobile Apps/Clients WWW Browsers
  • 37. FIDO in Windows 10 37  Windows used by 1.5 billion users  Windows 10 in 190 countries by Q3  Free upgrade for consumer
  • 38. FIDO in Snapdragon 38  Market leader to ship FIDO client  85+ OEMs as of Q4  >1 billion Android devices shipped  Innovative sensor
  • 39. FIDO in Healthcare 39  First healthcare deployment  Physician access to health records  up to 50 million Healthcare users
  • 40. FIDO in Enterprise 40  Google for Work announced Enterprise admin support for FIDO® U2F “Security Key” – April 21  Google for Work is used by over 5 million businesses worldwide  “The Security Keys are a great step forward, as they are very practical and more secure.” – Woolsworth IT
  • 41. FIDO & Government 41 2013 Data Breach Investigations Report (conducted by Verizon in concert with the U.S. Department of Homeland Security) noted that 76% of 2012 network intrusions exploited weak or stolen credentials. -- NIST Roadmap for Improving Critical Infrastructure Cybersecurity,12- Feb-2014  Governments worldwide are looking at FIDO  FIDO featured at White House Summit  New collaboration framework…
  • 42. Infineon NSP NNL New Government Membership Class  Reflecting an increased focus on Government collaboration worldwide  Details are now published in the new FIDO Alliance Membership Agreement 42
  • 45. About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world’s mobile operators, as well as more than 230 companies in the broader mobile ecosystem
  • 46. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy Mobile Connect: a convenient and secure alternative to passwords that also Protects consumers privacy • Easy to use as it uses the mobile phone for authentication (i.e. no passwords) • Anonymous but secure log-in (no passwords to steal, improved user experience, reduce friction) • Adds trust into digital transactions (e.g. by confirming location, user identity, usage) • Protects privacy (operator confirm credentials, user gives consent for sharing) • Reduce SP fraud through assurance that there is as real person behind the account • Simple and cost effective for MNOs to deploy, leveraging existing operator assets
  • 47. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy Something I Know Something I Have Something I Have + Something I Know Something I Have + Something I Am Or Mobile Connect and FIDO both seek to replace passwords
  • 48. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy  Both FIDO and Mobile Connect are addressing the same problem: easier, safer online authentication  Both FIDO and Mobile Connect leverage the mobile phone to achieve this  Whilst Mobile Connect uses existing MNO services for authentication (SMS, USSD, SIM Toolkit)  … FIDO leverages the local device authentication on the phone itself  In doing so, both provide easy, secure two-factor authentication  Both also provide a pluggable framework that can support a variety of security levels as well as supporting new authentication methods as they arise FIDO objectives align well with those of Mobile Connect
  • 49. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy Synergistic fit using FIDO for the first mile of Mobile Connect FIDO UAF protocol Mobile phone with FIDO client AuthN server MNO Tablet/desktop Service access request Service Provider Authentication request Identity GW First mile Second mileSIM applet protocol (CPAS8) AuthN server SIM applet A key difference between FIDO and Mobile Connect is that FIDO purposefully focuses solely on the first mile – authentication itself – whilst Mobile Connect also provides a federation layer via OpenID Connect
  • 50. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy MNO  Leveraging FIDO enables users to authenticate using existing authentication mechanisms on their mobile phone  …including biometrics – the user becomes the credential (Something I am) FIDO can be integrated into Mobile Connect to extend the range of authenticators Authentication Mobile phone with FIDO client MFAS Identity GW
  • 51. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy Mobile Connect and FIDO UAF integration: White Paper  Main objective: – Overview of FIDO Architecture and use cases – Integration of FIDO UAF authenticators into Mobile Connect arch  Status: – Co-developed between GSMA, MNOs and FIDO members – First draft finished and out for review within FIDO Alliance and GSMA; targeting publication by end June  Left for a second phase: – UICC based FIDO authenticator – Use of UICC to enhance FIDO implementation security – FIDO U2F integration
  • 52. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy  Service Providers need to be able to both specify and receive feedback on the type of authenticator used  Mobile Connect – uses Level of Assurance (LoA) values (ISO 29115) in the OIDC request acr_values params, so the SP can indicate the authenticator class that should be used  FIDO – uses the FIDO Policy to describe the required authenticator characteristics for accepted authenticators  Options: – Expand the list of acr_values to accommodate additional LoA/policies – Capture SP requirements at registration to the Mobile Connect service and propagate via the Mobile Connect federation Matching of FIDO policies to OpenID Connect ‘acr_values’
  • 53. © GSMA 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy  GSMA White paper – Continue Working on open issues related to the integration of the FIDO authentication framework with Mobile Connect – Improve the document with feedback from the PoC  FIDO/GSMA/MNO PoC (June/July) – Prototype of FIDO integration into an end-end Mobile Connect implementation: Telefonica + Nok Nok Labs – Targeted for Mobile World Congress Shanghai  MNO/SP beta trial (post MWCS) – Live implementation and trial of FIDO authenticators within a Mobile Connect service provided to an SP Next steps
  • 54. EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 54