SlideShare une entreprise Scribd logo
1  sur  56
Télécharger pour lire hors ligne
All Rights Reserved | FIDO Alliance | Copyright 20171
THE FUTURE OF
AUTHENTICATION FOR THE
INTERNET OF THINGS
FIDO ALLIANCE WEBINAR
MARCH 28, 2017
All Rights Reserved | FIDO Alliance | Copyright 20172
INTRODUCTION TO
THE FIDO ALLIANCE
ANDREW SHIKIAR
SENIOR DIRECTOR OF MARKETING
MARCH 28, 2017
All Rights Reserved | FIDO Alliance | Copyright 20173
THE FACTS ON FIDO
The FIDO Alliance is an open,
global industry association of
250+ organizations with a
focused mission:
300+
FIDO Certified solutions
3 BILLION+
Available to protect
user accounts worldwide
Today, its members provide
the world’s largest ecosystem
for standards-based,
interoperable authentication
AUTHENTICATION
STANDARDS
based on public key cryptography
to solve the password problem
All Rights Reserved | FIDO Alliance | Copyright 20174
DRIVEN BY 250 MEMBERS
Board of Directors comprised of leading global brands and technology providers
+ SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS
All Rights Reserved | FIDO Alliance | Copyright 20175
WHY FIDO?
The World Has a
Password Problem
Security
Usability
63% of data breaches in 2015
involved weak, default, or
stolen passwords
-Verizon 2016 Data Breach Report
For users, they’re clumsy,
hard to remember and
they need to be changed
all the time
65% Increase in phishing
attacks over the number of
attacks recorded in 20152
-Anti-Phishing Working Group
There were 1093 data
breaches in 2016, a 40%
increase from 2015
- Identity Theft Resource Center, 2016
SECURITY
USABILITY
Poor Easy
WeakStrong
PASSWORDS
All Rights Reserved | FIDO Alliance | Copyright 20176
WHY FIDO?
OTPs improve security but
aren’t easy enough to use -
and are still phishable
SMS RELIABILITY
TOKEN NECKLACE USER CONFUSION
STILL PHISHABLE
SECURITY
USABILITY
Poor Easy
WeakStrong
OTPs
SecurityUsability
THE WORLD HAS A “SHARED SECRETS” PROBLEM
All Rights Reserved | FIDO Alliance | Copyright 20177
WE NEED A
NEW MODEL
All Rights Reserved | FIDO Alliance | Copyright 20178
All Rights Reserved | FIDO Alliance | Copyright 20179
HOW ARE WE DOING IT?
ECOSYSTEM
STANDARDS
DEPLOYMENTS
USER EXPERIENCE
All Rights Reserved | FIDO Alliance | Copyright 201710
HOW OLD AUTHENTICATION WORKS
ONLINE CONNECTION
The user authenticates themselves online by
presenting a human-readable “shared secret”
All Rights Reserved | FIDO Alliance | Copyright 201711
HOW FIDO AUTHENTICATION WORKS
LOCAL CONNECTION
ONLINE CONNECTION
The device
authenticates the
user online using
public key
cryptography
The user
authenticates
“locally” to
their device
(by various means)
All Rights Reserved | FIDO Alliance | Copyright 201712
SIMPLER
AUTHENTICATION
Reduces reliance on
complex passwords
Single gesture
to log on
Same authentication
on multiple devices
Works with commonly
used devices
Fast and convenient
All Rights Reserved | FIDO Alliance | Copyright 201713
STRONGER
AUTHENTICATION
Based on public
key cryptography
No server-side
shared secrets
Keys stay
on device
No 3rd party in
the protocol
Biometrics, if used,
never leave device
No link-ability between
services or accounts
USABILITY
SECURITY
Poor Easy
WeakStrong
All Rights Reserved | FIDO Alliance | Copyright 201714
FIDO — A NEW PARADIGM:
=authentication
STRONGER
& SIMPLER
All Rights Reserved | FIDO Alliance | Copyright 201715
FIDO-ENABLED APPS + SERVICES
3 BILLION
AVAILABLE TO PROTECT
ACCOUNTS WORLDWIDE
All Rights Reserved | FIDO Alliance | Copyright 201716
BUT WAIT…
All Rights Reserved | FIDO Alliance | Copyright 201717
THE WORLD HAS AN IOT SECURITY PROBLEM
All Rights Reserved | FIDO Alliance | Copyright 201719
WE NEED A NEW
AUTHENTICATION MODEL FOR
CONNECTED USERS & DEVICES
All Rights Reserved | FIDO Alliance | Copyright 201720
THANK YOU
ANDREW SHIKIAR
SR. DIRECTOR OF MARKETING
ANDREW@FIDOALLIANCE.ORG
All Rights Reserved | FIDO Alliance | Copyright 2017
THE FUTURE OF AUTHENTICATION
FOR THE INTERNET OF THINGS
ROLF LINDEMANN, NOK NOK LABS
Thanks to this
app you can
maneuver the
new Forpel
using your
smartphone!
Too bad it’s
not my car.
What‘s the challenge
All Rights Reserved | FIDO Alliance | Copyright 2017
Source: HP Enterprise IoT Home Security Systems
22
Context
Secure firmware
protects one
“healthy” part
from infected
parts
Strong
authentication
makes sure only
legitimate
entities get
access
Need strong
fundament, e.g.
a CPU supporting
ARM TrustZone,
Intel SGX, etc.
Focus of
today‘s
presentation
All Rights Reserved | FIDO Alliance | Copyright 201723
Scope
Cloud
Services
All Rights Reserved | FIDO Alliance | Copyright 201724
Addressed by FIDO & W3C
Web Authentication, not the
core focus of this talk
Scope
Cloud
Services
“Primary interaction” devices,
i.e. devices
a) which we typically have in our
possession and
b) that have a user interface
Devices that are not primary
interaction devices, e.g. smart
light bulbs, WIFI routers, smart
fridges, smart thermostats,
connected cars, smart door
locks, …
Devices that are not primary
interaction devices, e.g. smart
light bulbs, WIFI routers, smart
fridges, smart thermostats,
connected cars, smart door
locks, …
All Rights Reserved | FIDO Alliance | Copyright 201725
Primary Interaction Devices
• Primary interaction device have the capability to verify
the user through their user interface.
• They can connect to another device or to a cloud service
• They can implement a FIDO Authenticator allowing the
user to strongly and conveniently authenticate to devices
or cloud services. Trust Execution Environments and/or
Secure Elements add security.
All Rights Reserved | FIDO Alliance | Copyright 201726
Scope
Focus of this talk
User to standalone devices
All Rights Reserved | FIDO Alliance | Copyright 201727
Scope
Cloud
Services
User to cloud-connected devices
Focus of this talk
All Rights Reserved | FIDO Alliance | Copyright 201728
Scope
Cloud
Services
Device-to-Device
Authentication
All Rights Reserved | FIDO Alliance | Copyright 2017
Device-to-Cloud
Authentication
29
IoT
Device
IoT
Device
Background
Perimeter
Internet
Infected Device
Attacks
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
IoT
Device
All Rights Reserved | FIDO Alliance | Copyright 201730
Background
All Rights Reserved | FIDO Alliance | Copyright 201731
Attack Scenarios
IoT Device IoT Device
1. Exploit firmware vulnerabilities
2. Enter at the front-door: Impersonate user
Need Strong Authentication
to protect against such
attacks. Our focus.
Legitimate
authentication
TrustZone for ARMv8-M
provides protection layers
that help keeping attacks
local to one software
module (“enclave”).
 Not in focus of this talk
All Rights Reserved | FIDO Alliance | Copyright 201732
User to Device Authentication
All Rights Reserved | FIDO Alliance | Copyright 201733
User to Device interaction
Device
Without
keyboard
and display
?
All Rights Reserved | FIDO Alliance | Copyright 201734
User to Device interaction
IoT Device
Without
keyboard
and display
User needs some
computing device with
user input interface and
display
1
Security: Device could be infected, so
users don’t want to reveal bearer
tokens (like passwords, etc.) to it
2
The Device only “sees” some other
Device – no user.
How can the Device know whether
there is a user and whether the
other device is trusted?
Convenience: Devices want to support
arbitrary user verification methods,
e.g. PINs, Fingerprint, Face, … - with
limited computing power
All Rights Reserved | FIDO Alliance | Copyright 201735
… did we see that before?
Device
TLS / DTLS or
other secure channel
All Rights Reserved | FIDO Alliance | Copyright 2017
See https://fidoalliance.org/events/fido-alliance-seminar-hongkong/
36
User to Device Authentication
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one app
Public key
IoT Device
All Rights Reserved | FIDO Alliance | Copyright 201737
FirstAuthenticator Registration (Example)
IoT Device
Device in
factory default
settings state
1
2
Press
“register
button”
3
Start registration
process (for first
authenticator)
All Rights Reserved | FIDO Alliance | Copyright 201738
Standalone Devices
Cloud
Services
Smart Light
Bulbs
WIFI Router
…
All Rights Reserved | FIDO Alliance | Copyright 2017
User to standalone devices
39
Devices with Cloud Dependency
Cloud
Services
User to cloud-connected devices
Rental Cars
Door locks
…
Parcel Lockers
Thermostats
Cloud Dependency: We want the cloud
service being able to grant access to
the device to a specific user
But: Do not rely on stable internet
connection at time of access
All Rights Reserved | FIDO Alliance | Copyright 201740
How does it work with central authorization infrastructure?
FIDO Stack
Mobile
App
SDK
1. Traditional FIDO Registration (one-time)
Cloud Service
Device
0. (OOB) Inject trust
anchor
2. Traditional FIDO Authentication
3. Signed JWT w/PoP (FIDO Uauth) Public Key
(see RFC7800)
All Rights Reserved | FIDO Alliance | Copyright 201741
How does it work with central authorization infrastructure?
FIDO Stack
Mobile
App
SDK
1. Traditional FIDO Registration (one-time)
Cloud Service
Device
0. (OOB) Inject trust
anchor
2. Traditional FIDO Authentication
3. Signed JWT w/PoP (FIDO Uauth) Public Key
(see RFC7800)
All Rights Reserved | FIDO Alliance | Copyright 2017
JOSE Payload:
JWS signature, computed by Cloud Service
{“kid”:“1e8gfc4”,“alg”:“ES256”}
JOSE Header:
{
"iss": "https://server.example.com",
"aud": "https://client.example.org",
"exp": 1361398824,
"cnf":{
"jwk":{
"kty": "EC",
"use": "sig",
"crv": "P-256",
"x": "18wHLeIgW9wVN6VD1Txgpqy2LszYkMf6J8njVAibvhM",
"y": "-V4dS4UaLMgP_4fY4j8ir7cl1TXlFdAgcx55o7TkcSA"
}
}
}
42
How does it work with central authorization infrastructure?
FIDO Stack
Mobile
App
SDK
1. Traditional FIDO Registration (one-time)
Cloud Service
Device
0. (OOB) Inject trust
anchor
2. Traditional FIDO Authentication
3. Signed JWT w/PoP (FIDO Uauth) Public Key
(see RFC7800)
4. FIDO Authentication to device
with signed JWT w/ PoP (FIDO)
Public Key as additional data
All Rights Reserved | FIDO Alliance | Copyright 201743
Gallagher Unlocks the Internet of Things with Nok Nok
44
Source: Philafrenzy, Wikipedia45
Source: Klaus Mueller, wikipedia46
Device to Device & Device to Cloud
Authentication
All Rights Reserved | FIDO Alliance | Copyright 201747
Scope
Device to device
authentication
All Rights Reserved | FIDO Alliance | Copyright 2017
User to device authentication
48
User to Device Authentication
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one RP
Public key
IoT Device
How an Authenticator verifies
the user and whether it
verifies the user depends on
the Authenticator model and is
represented in the Metadata
Statement.
All Rights Reserved | FIDO Alliance | Copyright 201749
Device to Device Authentication
Authenticator FIDO Authentication
Challenge
(Signed) Response
Public key
IoT Device
There are “Silent”
Authenticators, never requiring
any user interaction.
… and such Authenticator
might be embedded in a
device
All Rights Reserved | FIDO Alliance | Copyright 201750
Device to Cloud Authentication
Authenticator FIDO Authentication
Challenge
(Signed) Response
Public key
It makes no difference to the
IoT device nor to the FIDO
Authenticator whether it
authenticates to another
device or to a cloud service
Cloud Service
All Rights Reserved | FIDO Alliance | Copyright 201751
Device to Cloud Authentication
Authenticator FIDO Authentication
Challenge
(Signed) Response
Public key
It makes no difference to the
IoT device nor to the FIDO
Authenticator whether it
authenticates to another
device or to a cloud service
Cloud Service
… and the Authenticator can
be embedded in smart
fridges, smart thermostats
and other IoT devices.
All Rights Reserved | FIDO Alliance | Copyright 201752
Conclusion
1. Authentication is the first experience of users with services and several
device types.
2. Authentication needs to be convenient for the user and strong enough
for the purpose.
3. We can do better than passwords + OTP. Look at the FIDO specifications
for strong & convenient authentication, see www.fidoalliance.org.
4. FIDO supports “silent” Authenticators. These Authenticators can be
implemented in IoT devices.
5. FIDO authentication responses can be verified in small devices, allowing
FIDO authentication to those IoT device.
6. FIDO can be combined with PoP Keys (RFC7800) in order to support
authentication to “cloud connected” IoT devices
All Rights Reserved | FIDO Alliance | Copyright 201753
FIDO Authenticator Concept
FIDO Authenticator
User
Verification /
Presence
Attestation Key
Authentication Key(s)
Injected at
manufacturing,
doesn’t change
Generated at
runtime (on
Registration)
Optional
Components
Transaction
Confirmation
Display
All Rights Reserved | FIDO Alliance | Copyright 201754
SilentAuthenticators
1. Definition, see FIDO Glossary
2. User Verification Method, see FIDO Registry
3. Metadata Statement, see FIDO Metadata Statements
All Rights Reserved | FIDO Alliance | Copyright 201755
Relying Party
(example.com)
accountInfo, challenge, [cOpts]
rpId, ai, hash(clientData), cryptoP, [exts]
verify user
generate:
key kpub
key kpriv
credential c
c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts],
signature(tbs)
c,kpub,clientData,ac,tbs, s
store:
key kpub
c
s
PlatformAuthenticator
select Authenticator according to cOpts;
determine rpId, get tlsData;
clientData := {challenge, origin, rpId, hAlg, tlsData}
cOpts: crypto params, credential black list,
extensions
cdh
FIDO Registration
ai
tbs
ac: attestation certificate chain
All Rights Reserved | FIDO Alliance | Copyright 201756
Authenticator Platform Relying Party
rpId, [c,] hash(clientData)
select Authenticator according to policy;
check rpId, get tlsData (i.e. channel id, etc.);
lookup key handle h;
clientData := {challenge, rpId, tlsData}
clientData,cntr,[exts],signature(cdh,cntr,exts)
clientData, cntr, exts, s
lookup kpub
from DB
check:
exts +
signature
using
key kpub
s
cdh
challenge, [aOpts]
FIDOAuthentication
verify user
find
key kpriv
cntr++;
process exts
All Rights Reserved | FIDO Alliance | Copyright 2017
All Rights Reserved | FIDO Alliance | Copyright 201757

Contenu connexe

Tendances

Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An OverviewPat Patterson
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
 
Building Blocks for IoT
Building Blocks for IoTBuilding Blocks for IoT
Building Blocks for IoTBob Marcus
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
15CS81- IoT Module-2
15CS81- IoT Module-215CS81- IoT Module-2
15CS81- IoT Module-2Syed Mustafa
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 

Tendances (20)

Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An Overview
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in Healthcare
 
Building Blocks for IoT
Building Blocks for IoTBuilding Blocks for IoT
Building Blocks for IoT
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
15CS81- IoT Module-2
15CS81- IoT Module-215CS81- IoT Module-2
15CS81- IoT Module-2
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT security
IoT securityIoT security
IoT security
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 

En vedette

Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership FIDO Alliance
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Null mumbai-iot top 10
Null mumbai-iot top 10Null mumbai-iot top 10
Null mumbai-iot top 10Nitesh Malviya
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingContent Marketing Institute
 
Creating a World without Passwords -- A FIDO UAF Case Study
Creating a World without Passwords -- A FIDO UAF Case StudyCreating a World without Passwords -- A FIDO UAF Case Study
Creating a World without Passwords -- A FIDO UAF Case StudyFIDO Alliance
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 
Io t lorawan geolocation trends lpwan - v1
Io t lorawan geolocation trends lpwan - v1Io t lorawan geolocation trends lpwan - v1
Io t lorawan geolocation trends lpwan - v1Thierry Lestable
 
The future of the IoT will be cognitive
The future of the IoT will be cognitiveThe future of the IoT will be cognitive
The future of the IoT will be cognitiveThorsten Schroeer
 

En vedette (20)

Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Null mumbai-iot top 10
Null mumbai-iot top 10Null mumbai-iot top 10
Null mumbai-iot top 10
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
Creating a World without Passwords -- A FIDO UAF Case Study
Creating a World without Passwords -- A FIDO UAF Case StudyCreating a World without Passwords -- A FIDO UAF Case Study
Creating a World without Passwords -- A FIDO UAF Case Study
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 
Io t lorawan geolocation trends lpwan - v1
Io t lorawan geolocation trends lpwan - v1Io t lorawan geolocation trends lpwan - v1
Io t lorawan geolocation trends lpwan - v1
 
The future of the IoT will be cognitive
The future of the IoT will be cognitiveThe future of the IoT will be cognitive
The future of the IoT will be cognitive
 

Similaire à The Future of Authentication for IoT

Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusFIDO Alliance
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Alliance
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationFIDO Alliance
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellFIDO Alliance
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationFIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationFIDO Alliance
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationFIDO Alliance
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowellFIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 

Similaire à The Future of Authentication for IoT (20)

Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 

Plus de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 

Plus de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

The Future of Authentication for IoT

  • 1. All Rights Reserved | FIDO Alliance | Copyright 20171 THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20172 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20173 THE FACTS ON FIDO The FIDO Alliance is an open, global industry association of 250+ organizations with a focused mission: 300+ FIDO Certified solutions 3 BILLION+ Available to protect user accounts worldwide Today, its members provide the world’s largest ecosystem for standards-based, interoperable authentication AUTHENTICATION STANDARDS based on public key cryptography to solve the password problem
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20174 DRIVEN BY 250 MEMBERS Board of Directors comprised of leading global brands and technology providers + SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS
  • 5. All Rights Reserved | FIDO Alliance | Copyright 20175 WHY FIDO? The World Has a Password Problem Security Usability 63% of data breaches in 2015 involved weak, default, or stolen passwords -Verizon 2016 Data Breach Report For users, they’re clumsy, hard to remember and they need to be changed all the time 65% Increase in phishing attacks over the number of attacks recorded in 20152 -Anti-Phishing Working Group There were 1093 data breaches in 2016, a 40% increase from 2015 - Identity Theft Resource Center, 2016 SECURITY USABILITY Poor Easy WeakStrong PASSWORDS
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20176 WHY FIDO? OTPs improve security but aren’t easy enough to use - and are still phishable SMS RELIABILITY TOKEN NECKLACE USER CONFUSION STILL PHISHABLE SECURITY USABILITY Poor Easy WeakStrong OTPs SecurityUsability
  • 7. THE WORLD HAS A “SHARED SECRETS” PROBLEM All Rights Reserved | FIDO Alliance | Copyright 20177
  • 8. WE NEED A NEW MODEL All Rights Reserved | FIDO Alliance | Copyright 20178
  • 9. All Rights Reserved | FIDO Alliance | Copyright 20179 HOW ARE WE DOING IT? ECOSYSTEM STANDARDS DEPLOYMENTS USER EXPERIENCE
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201710 HOW OLD AUTHENTICATION WORKS ONLINE CONNECTION The user authenticates themselves online by presenting a human-readable “shared secret”
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201711 HOW FIDO AUTHENTICATION WORKS LOCAL CONNECTION ONLINE CONNECTION The device authenticates the user online using public key cryptography The user authenticates “locally” to their device (by various means)
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201712 SIMPLER AUTHENTICATION Reduces reliance on complex passwords Single gesture to log on Same authentication on multiple devices Works with commonly used devices Fast and convenient
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201713 STRONGER AUTHENTICATION Based on public key cryptography No server-side shared secrets Keys stay on device No 3rd party in the protocol Biometrics, if used, never leave device No link-ability between services or accounts
  • 14. USABILITY SECURITY Poor Easy WeakStrong All Rights Reserved | FIDO Alliance | Copyright 201714 FIDO — A NEW PARADIGM: =authentication STRONGER & SIMPLER
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201715 FIDO-ENABLED APPS + SERVICES 3 BILLION AVAILABLE TO PROTECT ACCOUNTS WORLDWIDE
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201716 BUT WAIT…
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201717 THE WORLD HAS AN IOT SECURITY PROBLEM
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201719 WE NEED A NEW AUTHENTICATION MODEL FOR CONNECTED USERS & DEVICES
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201720 THANK YOU ANDREW SHIKIAR SR. DIRECTOR OF MARKETING ANDREW@FIDOALLIANCE.ORG
  • 20. All Rights Reserved | FIDO Alliance | Copyright 2017 THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS ROLF LINDEMANN, NOK NOK LABS Thanks to this app you can maneuver the new Forpel using your smartphone! Too bad it’s not my car.
  • 21. What‘s the challenge All Rights Reserved | FIDO Alliance | Copyright 2017 Source: HP Enterprise IoT Home Security Systems 22
  • 22. Context Secure firmware protects one “healthy” part from infected parts Strong authentication makes sure only legitimate entities get access Need strong fundament, e.g. a CPU supporting ARM TrustZone, Intel SGX, etc. Focus of today‘s presentation All Rights Reserved | FIDO Alliance | Copyright 201723
  • 23. Scope Cloud Services All Rights Reserved | FIDO Alliance | Copyright 201724
  • 24. Addressed by FIDO & W3C Web Authentication, not the core focus of this talk Scope Cloud Services “Primary interaction” devices, i.e. devices a) which we typically have in our possession and b) that have a user interface Devices that are not primary interaction devices, e.g. smart light bulbs, WIFI routers, smart fridges, smart thermostats, connected cars, smart door locks, … Devices that are not primary interaction devices, e.g. smart light bulbs, WIFI routers, smart fridges, smart thermostats, connected cars, smart door locks, … All Rights Reserved | FIDO Alliance | Copyright 201725
  • 25. Primary Interaction Devices • Primary interaction device have the capability to verify the user through their user interface. • They can connect to another device or to a cloud service • They can implement a FIDO Authenticator allowing the user to strongly and conveniently authenticate to devices or cloud services. Trust Execution Environments and/or Secure Elements add security. All Rights Reserved | FIDO Alliance | Copyright 201726
  • 26. Scope Focus of this talk User to standalone devices All Rights Reserved | FIDO Alliance | Copyright 201727
  • 27. Scope Cloud Services User to cloud-connected devices Focus of this talk All Rights Reserved | FIDO Alliance | Copyright 201728
  • 28. Scope Cloud Services Device-to-Device Authentication All Rights Reserved | FIDO Alliance | Copyright 2017 Device-to-Cloud Authentication 29
  • 30. Background All Rights Reserved | FIDO Alliance | Copyright 201731
  • 31. Attack Scenarios IoT Device IoT Device 1. Exploit firmware vulnerabilities 2. Enter at the front-door: Impersonate user Need Strong Authentication to protect against such attacks. Our focus. Legitimate authentication TrustZone for ARMv8-M provides protection layers that help keeping attacks local to one software module (“enclave”).  Not in focus of this talk All Rights Reserved | FIDO Alliance | Copyright 201732
  • 32. User to Device Authentication All Rights Reserved | FIDO Alliance | Copyright 201733
  • 33. User to Device interaction Device Without keyboard and display ? All Rights Reserved | FIDO Alliance | Copyright 201734
  • 34. User to Device interaction IoT Device Without keyboard and display User needs some computing device with user input interface and display 1 Security: Device could be infected, so users don’t want to reveal bearer tokens (like passwords, etc.) to it 2 The Device only “sees” some other Device – no user. How can the Device know whether there is a user and whether the other device is trusted? Convenience: Devices want to support arbitrary user verification methods, e.g. PINs, Fingerprint, Face, … - with limited computing power All Rights Reserved | FIDO Alliance | Copyright 201735
  • 35. … did we see that before? Device TLS / DTLS or other secure channel All Rights Reserved | FIDO Alliance | Copyright 2017 See https://fidoalliance.org/events/fido-alliance-seminar-hongkong/ 36
  • 36. User to Device Authentication AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one app Public key IoT Device All Rights Reserved | FIDO Alliance | Copyright 201737
  • 37. FirstAuthenticator Registration (Example) IoT Device Device in factory default settings state 1 2 Press “register button” 3 Start registration process (for first authenticator) All Rights Reserved | FIDO Alliance | Copyright 201738
  • 38. Standalone Devices Cloud Services Smart Light Bulbs WIFI Router … All Rights Reserved | FIDO Alliance | Copyright 2017 User to standalone devices 39
  • 39. Devices with Cloud Dependency Cloud Services User to cloud-connected devices Rental Cars Door locks … Parcel Lockers Thermostats Cloud Dependency: We want the cloud service being able to grant access to the device to a specific user But: Do not rely on stable internet connection at time of access All Rights Reserved | FIDO Alliance | Copyright 201740
  • 40. How does it work with central authorization infrastructure? FIDO Stack Mobile App SDK 1. Traditional FIDO Registration (one-time) Cloud Service Device 0. (OOB) Inject trust anchor 2. Traditional FIDO Authentication 3. Signed JWT w/PoP (FIDO Uauth) Public Key (see RFC7800) All Rights Reserved | FIDO Alliance | Copyright 201741
  • 41. How does it work with central authorization infrastructure? FIDO Stack Mobile App SDK 1. Traditional FIDO Registration (one-time) Cloud Service Device 0. (OOB) Inject trust anchor 2. Traditional FIDO Authentication 3. Signed JWT w/PoP (FIDO Uauth) Public Key (see RFC7800) All Rights Reserved | FIDO Alliance | Copyright 2017 JOSE Payload: JWS signature, computed by Cloud Service {“kid”:“1e8gfc4”,“alg”:“ES256”} JOSE Header: { "iss": "https://server.example.com", "aud": "https://client.example.org", "exp": 1361398824, "cnf":{ "jwk":{ "kty": "EC", "use": "sig", "crv": "P-256", "x": "18wHLeIgW9wVN6VD1Txgpqy2LszYkMf6J8njVAibvhM", "y": "-V4dS4UaLMgP_4fY4j8ir7cl1TXlFdAgcx55o7TkcSA" } } } 42
  • 42. How does it work with central authorization infrastructure? FIDO Stack Mobile App SDK 1. Traditional FIDO Registration (one-time) Cloud Service Device 0. (OOB) Inject trust anchor 2. Traditional FIDO Authentication 3. Signed JWT w/PoP (FIDO Uauth) Public Key (see RFC7800) 4. FIDO Authentication to device with signed JWT w/ PoP (FIDO) Public Key as additional data All Rights Reserved | FIDO Alliance | Copyright 201743
  • 43. Gallagher Unlocks the Internet of Things with Nok Nok 44
  • 45. Source: Klaus Mueller, wikipedia46
  • 46. Device to Device & Device to Cloud Authentication All Rights Reserved | FIDO Alliance | Copyright 201747
  • 47. Scope Device to device authentication All Rights Reserved | FIDO Alliance | Copyright 2017 User to device authentication 48
  • 48. User to Device Authentication AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one RP Public key IoT Device How an Authenticator verifies the user and whether it verifies the user depends on the Authenticator model and is represented in the Metadata Statement. All Rights Reserved | FIDO Alliance | Copyright 201749
  • 49. Device to Device Authentication Authenticator FIDO Authentication Challenge (Signed) Response Public key IoT Device There are “Silent” Authenticators, never requiring any user interaction. … and such Authenticator might be embedded in a device All Rights Reserved | FIDO Alliance | Copyright 201750
  • 50. Device to Cloud Authentication Authenticator FIDO Authentication Challenge (Signed) Response Public key It makes no difference to the IoT device nor to the FIDO Authenticator whether it authenticates to another device or to a cloud service Cloud Service All Rights Reserved | FIDO Alliance | Copyright 201751
  • 51. Device to Cloud Authentication Authenticator FIDO Authentication Challenge (Signed) Response Public key It makes no difference to the IoT device nor to the FIDO Authenticator whether it authenticates to another device or to a cloud service Cloud Service … and the Authenticator can be embedded in smart fridges, smart thermostats and other IoT devices. All Rights Reserved | FIDO Alliance | Copyright 201752
  • 52. Conclusion 1. Authentication is the first experience of users with services and several device types. 2. Authentication needs to be convenient for the user and strong enough for the purpose. 3. We can do better than passwords + OTP. Look at the FIDO specifications for strong & convenient authentication, see www.fidoalliance.org. 4. FIDO supports “silent” Authenticators. These Authenticators can be implemented in IoT devices. 5. FIDO authentication responses can be verified in small devices, allowing FIDO authentication to those IoT device. 6. FIDO can be combined with PoP Keys (RFC7800) in order to support authentication to “cloud connected” IoT devices All Rights Reserved | FIDO Alliance | Copyright 201753
  • 53. FIDO Authenticator Concept FIDO Authenticator User Verification / Presence Attestation Key Authentication Key(s) Injected at manufacturing, doesn’t change Generated at runtime (on Registration) Optional Components Transaction Confirmation Display All Rights Reserved | FIDO Alliance | Copyright 201754
  • 54. SilentAuthenticators 1. Definition, see FIDO Glossary 2. User Verification Method, see FIDO Registry 3. Metadata Statement, see FIDO Metadata Statements All Rights Reserved | FIDO Alliance | Copyright 201755
  • 55. Relying Party (example.com) accountInfo, challenge, [cOpts] rpId, ai, hash(clientData), cryptoP, [exts] verify user generate: key kpub key kpriv credential c c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts], signature(tbs) c,kpub,clientData,ac,tbs, s store: key kpub c s PlatformAuthenticator select Authenticator according to cOpts; determine rpId, get tlsData; clientData := {challenge, origin, rpId, hAlg, tlsData} cOpts: crypto params, credential black list, extensions cdh FIDO Registration ai tbs ac: attestation certificate chain All Rights Reserved | FIDO Alliance | Copyright 201756
  • 56. Authenticator Platform Relying Party rpId, [c,] hash(clientData) select Authenticator according to policy; check rpId, get tlsData (i.e. channel id, etc.); lookup key handle h; clientData := {challenge, rpId, tlsData} clientData,cntr,[exts],signature(cdh,cntr,exts) clientData, cntr, exts, s lookup kpub from DB check: exts + signature using key kpub s cdh challenge, [aOpts] FIDOAuthentication verify user find key kpriv cntr++; process exts All Rights Reserved | FIDO Alliance | Copyright 2017 All Rights Reserved | FIDO Alliance | Copyright 201757