SlideShare a Scribd company logo
1 of 5
Mobile Device and Attribute
Validation (MDAV)
 R&D Topic Area
 Access control at the
point of need
PI: Steve Wilson
Lockstep Technologies, Sydney, Australia
swilson@lockstep.com.au
+61 414 488851
http://lockstep.com.au/technologies
1
MDAV: Customer Need
Field
Manager
First
Responder I’m here to help!
Great!
But what are you?
 First responders working across jurisdictions need to convince field
personnel of their credentials.
 “Provenance” is critical. How was the credential issued? How has it been
conveyed?
E.g. Concealed firearms permit, hazmat ticket, security clearance etc.
2
MDAV: Approach
Anon/pseudonymous certificates holding authoritative attributes
convey provenance of issuer and of the device used to present it.
Individual
3
Concealed Carry XYZ
Credentialing Agency
Smart phone Model M
1. Smart device controlled
by Individual
2. An authority issues an
attribute and seals it in
a digital certificate.
3. Cert bound to
device via key pair
Device
with private key store
Certificate
MOBILE DEVICE AND
ATTRIBUTE VALIDATION
 Strong proof of credentials with no need for
extraneous personal details; privacy enhancing
 Provenance: Certificates convey the (1) authority that
issued the credential, and (2) what device carried it
 Credentials are verifiable in offline and occasionally-
connected environments
 Strong audit trails
 Fast, de-centralized, light-weight processing
 Standards-based; leverages native cryptography in
smart phones, smartcards, future IoT devices
 Will value-add ID smart cards and phone apps; invert
the traditional privacy concerns with chips.
MDAV: Benefits
4
MDAV: Potential Transition Activities
First Responder Field Manager
Digital wallet of attributes
on capable device
Relying Party App.
1. Do you have a permit?
Concealed Carry XYZ
Credentialing Agency
Smart phone Model M
2. Yes:
 Prototype in M2M manual access control); transition to mobile-to
system or card-to-system with PACs/LACs partners.
 Productize credential certificate mgt with commercial PKI CSPs.
 Standard crypto APIs, so solution can diffuse into many form
factors and enterprise systems, eg smart license initiatives and
IoT. 5

More Related Content

Viewers also liked

Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовРИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовТарасов Константин
 
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...Тарасов Константин
 
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramРИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramТарасов Константин
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήριαKostas Tampakis
 
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALPRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALNSTDA THAILAND
 
πλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσπλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσKostas Tampakis
 
Trademarks and-brands-seminar
Trademarks and-brands-seminarTrademarks and-brands-seminar
Trademarks and-brands-seminarNSTDA THAILAND
 

Viewers also liked (20)

Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Fish Report
Fish ReportFish Report
Fish Report
 
Mountaingoat
MountaingoatMountaingoat
Mountaingoat
 
Folksonomy
FolksonomyFolksonomy
Folksonomy
 
Jessica cox greek
Jessica cox greekJessica cox greek
Jessica cox greek
 
Pig Banner
Pig BannerPig Banner
Pig Banner
 
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовРИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
 
Animal Sentience Worksheets 2
Animal Sentience Worksheets 2Animal Sentience Worksheets 2
Animal Sentience Worksheets 2
 
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
 
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramРИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
 
Amazingphotosofpeople
AmazingphotosofpeopleAmazingphotosofpeople
Amazingphotosofpeople
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήρια
 
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALPRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
 
Food & Social Justice
Food & Social JusticeFood & Social Justice
Food & Social Justice
 
Vegan Catering For All
Vegan Catering For AllVegan Catering For All
Vegan Catering For All
 
Aqua
AquaAqua
Aqua
 
πλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσπλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσ
 
15112010 fireworks
15112010 fireworks15112010 fireworks
15112010 fireworks
 
Fantastic Sailing
Fantastic SailingFantastic Sailing
Fantastic Sailing
 
Trademarks and-brands-seminar
Trademarks and-brands-seminarTrademarks and-brands-seminar
Trademarks and-brands-seminar
 

Similar to Mobile Device and Attribute Validation (MDAV)

The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0Adam Lewis
 
iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks thesecureid
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2Warren Sanders
 
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffapi-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffDucAnhLe56
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsEvernym
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune Systemcentralohioissa
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
WISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureWISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureEileen Weinberg
 
Security human
Security humanSecurity human
Security humanJisc
 

Similar to Mobile Device and Attribute Validation (MDAV) (20)

The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 
Security
SecuritySecurity
Security
 
iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2
 
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffapi-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Biometrics
BiometricsBiometrics
Biometrics
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
WISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureWISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview Brochure
 
Security human
Security humanSecurity human
Security human
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTkantarainitiative
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
The state of uma 2014 11-03
The state of uma 2014 11-03The state of uma 2014 11-03
The state of uma 2014 11-03
 
Laws of relationships v7
Laws of relationships v7Laws of relationships v7
Laws of relationships v7
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoT
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Mobile Device and Attribute Validation (MDAV)

  • 1. Mobile Device and Attribute Validation (MDAV)  R&D Topic Area  Access control at the point of need PI: Steve Wilson Lockstep Technologies, Sydney, Australia swilson@lockstep.com.au +61 414 488851 http://lockstep.com.au/technologies 1
  • 2. MDAV: Customer Need Field Manager First Responder I’m here to help! Great! But what are you?  First responders working across jurisdictions need to convince field personnel of their credentials.  “Provenance” is critical. How was the credential issued? How has it been conveyed? E.g. Concealed firearms permit, hazmat ticket, security clearance etc. 2
  • 3. MDAV: Approach Anon/pseudonymous certificates holding authoritative attributes convey provenance of issuer and of the device used to present it. Individual 3 Concealed Carry XYZ Credentialing Agency Smart phone Model M 1. Smart device controlled by Individual 2. An authority issues an attribute and seals it in a digital certificate. 3. Cert bound to device via key pair Device with private key store Certificate MOBILE DEVICE AND ATTRIBUTE VALIDATION
  • 4.  Strong proof of credentials with no need for extraneous personal details; privacy enhancing  Provenance: Certificates convey the (1) authority that issued the credential, and (2) what device carried it  Credentials are verifiable in offline and occasionally- connected environments  Strong audit trails  Fast, de-centralized, light-weight processing  Standards-based; leverages native cryptography in smart phones, smartcards, future IoT devices  Will value-add ID smart cards and phone apps; invert the traditional privacy concerns with chips. MDAV: Benefits 4
  • 5. MDAV: Potential Transition Activities First Responder Field Manager Digital wallet of attributes on capable device Relying Party App. 1. Do you have a permit? Concealed Carry XYZ Credentialing Agency Smart phone Model M 2. Yes:  Prototype in M2M manual access control); transition to mobile-to system or card-to-system with PACs/LACs partners.  Productize credential certificate mgt with commercial PKI CSPs.  Standard crypto APIs, so solution can diffuse into many form factors and enterprise systems, eg smart license initiatives and IoT. 5

Editor's Notes

  1. Descriptive text for picture: An iterative algorithm for finding a good classifier. Noise is added at each step in order to ensure privacy protection, while maintaining classifier accuracy.