SlideShare une entreprise Scribd logo
1  sur  25
Innovative Security Solutions KOBIL  - the technology   company KOBIL  Systems GmbH  •   Marketing Department,  19. Mai 2011
Potential of  Online B anking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Customer Concerns on e-Banking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Daily Frauds on  e- B anking „ Thieves Hack French Presidents Bank Account“ „ 400 Million Credit Card  Numbers Hacked“ „ Investigators Replicate Nokia 1100 Online Banking Hack“ „ Cyber crime attacks increase as malware trends plateaued in the last 12 month“ „ 300+ Bank homepages hacked and redirected!“
Hacking Techniques are Advancing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Today’s  e-Banking Digital IDs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Positioning Our Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],Maximum  Security Maximum  Convenience Challenge  Response One Time Password OTP Certificate Technology Static   Password SMS OTP KOBIL  Innovations
Secure  o nline banking    anywhere and anytime
KOBIL m ID entity technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Application Areas
Key facts Hardened  web b rowser No  c hance for phishing Remote & secure updates Smart  S ecurtiy  M anagement S mart  c ard  & certificate Login and/or  transaction signing
The most secure browser URL protection T wo factor  authentication Anti hacking  mechanism s Trusted  SSL  certificates More than 5 years of research & development   More than 1   million online users
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Smart Security Management
[object Object],Low TCO & High ROI Time Technology IT infrastructure KOBIL m ID entity
KOBIL SecOPTIC Technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key facts Verification and management Smart  S ecurtiy  M anagement Removable battery Long life and  environment protection Optical sensors  Easy data transfer for true transaction signing
More Key Facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Smart Security Management
KOBIL Optical Reader Technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key facts Removable battery Long life and  environment protection Credit  or debit c ard International  s tandards and online shopping Easy data transfer for true transaction signing Optical sensors
More Key Facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Millions of users
any question … ? Oemer Izci Marketing Manager E-Mail: marketing@kobil.com Phone: +49 6241 3004-0

Contenu connexe

Tendances

Sedicii Introduction
Sedicii   IntroductionSedicii   Introduction
Sedicii IntroductionRob Leslie
 
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxMeetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxDigipolis Antwerpen
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart CityPriyanka Aash
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Priyanka Aash
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
R2SQ Inc iDeck Presentation
R2SQ Inc iDeck PresentationR2SQ Inc iDeck Presentation
R2SQ Inc iDeck Presentationumitdsami
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketAlexander WEIR
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & BrandingNiels Mulder
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
Next Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureNext Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureCardtek
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT TrackNFC Forum
 
How Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionHow Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionBelatrix Software
 
MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015Philipp Lam
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover SolutionsNoah Dillard
 

Tendances (20)

Sedicii Introduction
Sedicii   IntroductionSedicii   Introduction
Sedicii Introduction
 
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxMeetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
 
Gemalto NFC
Gemalto NFCGemalto NFC
Gemalto NFC
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart City
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
R2SQ Inc iDeck Presentation
R2SQ Inc iDeck PresentationR2SQ Inc iDeck Presentation
R2SQ Inc iDeck Presentation
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution Market
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & Branding
 
SS Digilock Nov15
SS Digilock Nov15SS Digilock Nov15
SS Digilock Nov15
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Tolga Yurteri, NKBM
Tolga Yurteri, NKBMTolga Yurteri, NKBM
Tolga Yurteri, NKBM
 
Next Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureNext Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless Infrastructure
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT Track
 
How Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionHow Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT Revolution
 
MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover Solutions
 

Similaire à Secure E-Banking with KOBIL technologies

Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - PhonecardGuy Romanus
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.pptGoDown3
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).pptSujalraj13
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 

Similaire à Secure E-Banking with KOBIL technologies (20)

Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
E banking security
E banking securityE banking security
E banking security
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
Computer's project
Computer's projectComputer's project
Computer's project
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Commerce 0.ppt
E-Commerce 0.pptE-Commerce 0.ppt
E-Commerce 0.ppt
 
eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.ppt
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).ppt
 
Building E-Commerce.ppt
Building E-Commerce.pptBuilding E-Commerce.ppt
Building E-Commerce.ppt
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
LTTC Presentation April 2014
LTTC Presentation April 2014LTTC Presentation April 2014
LTTC Presentation April 2014
 
02 lttc
02 lttc02 lttc
02 lttc
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Secure E-Banking with KOBIL technologies

  • 1. Innovative Security Solutions KOBIL - the technology company KOBIL Systems GmbH • Marketing Department, 19. Mai 2011
  • 2.
  • 3.
  • 4. Daily Frauds on e- B anking „ Thieves Hack French Presidents Bank Account“ „ 400 Million Credit Card Numbers Hacked“ „ Investigators Replicate Nokia 1100 Online Banking Hack“ „ Cyber crime attacks increase as malware trends plateaued in the last 12 month“ „ 300+ Bank homepages hacked and redirected!“
  • 5.
  • 6.
  • 7.
  • 8. Secure o nline banking anywhere and anytime
  • 9. KOBIL m ID entity technology
  • 10.
  • 11.
  • 12. Key facts Hardened web b rowser No c hance for phishing Remote & secure updates Smart S ecurtiy M anagement S mart c ard & certificate Login and/or transaction signing
  • 13. The most secure browser URL protection T wo factor authentication Anti hacking mechanism s Trusted SSL certificates More than 5 years of research & development More than 1 million online users
  • 14.
  • 15.
  • 17.
  • 18. Key facts Verification and management Smart S ecurtiy M anagement Removable battery Long life and environment protection Optical sensors Easy data transfer for true transaction signing
  • 19.
  • 20.
  • 21. KOBIL Optical Reader Technology
  • 22.
  • 23. Key facts Removable battery Long life and environment protection Credit or debit c ard International s tandards and online shopping Easy data transfer for true transaction signing Optical sensors
  • 24.
  • 25. any question … ? Oemer Izci Marketing Manager E-Mail: marketing@kobil.com Phone: +49 6241 3004-0

Notes de l'éditeur

  1. Online banking is more than e-banking : - Customers require inovative services instead of standardized products and services - Increase sales efficiency - Increase competitiveness Meet customer requirements Banking is no more a local service, online banking makes it global
  2. - Latest statics shows the following result. - The arguments against online banking is listed from the most important
  3. - Online b anking is the worldwide target for numerous attacks N ew types of attacks emerges everyday Protection is a challange against o rganized cyber crime C onventional tools are not enough anymore
  4. Software solutions : Virtual smart cards Soft certificates Soft OTP generators (on PC or on mobile phones) Software-only hardening techniques Basic OTPs, C&R OTPs : Scratch list s Basic OTP tokens (single button, time-based, etc.) Grid cards SMS OTP : It can be bounded to transaction data on banks side, but bank can not be sure who prepared the received transaction data in the first place EMV-CAP : - Unconnected readers (without OPTIC sensors) PKI Solutions : Smart card readers USB tokens
  5. Zero foot print : No installation, no configuration, no admin rights is needed. No trace left on PC Enables (simplifies) digital signatures via PKI smart card for end users Seamless security : Hardening mechanisms running in the back stage Secure user transaction without user involvement Always up-to-date : Changes happen in standards, trends, security needs, advanced attack techniques, IT-infrastructure Changes can always be managed in the field 5-years functional waranty : Your investment is secure by flexible technology (replaceable smart card, remote update technology) Future proof
  6. Plug mIdentity into any PC : - any PC, your PC, foreign PC, public PC - no installation is needed - no configuration is needed - no admin right is needed - only requirement ; open USB port and Internet connectivity Check for latest updates : - Device connects to update server which typically hosted by the bank - Both firmware (hardware) & application (software) updates are possible Smart card is used for strong authentication : for only user login for only transaction signing or both Remove mIDentity : - Automatic disconnection process erases any traces on PC
  7. Corporate and SME c ustomer s : - O nline transactions - T rade finance (LC, Accreditives etc) - O nline credit approval and credit management O nline stock exchange Retail c ustomer s : - Convenience and high-end security Other s ervices for third parties : - Bank is a „trustworthy“ place where merchants can place special offers for the Bank‘s customers e.g. i nsurance Multi b ank s upport : Electronic Banking Internet Communication Standard ( EBICS ) is a transmission protocol for banking information for usage by banking clients. Single Euro Payments Area (SEPA) concentrates on standardisation of clearing protocols in the interbank networks. Secure communication : - Web a pplications - Strong user authentication - Transaction signing by s mart card Secure d ocument exchange : - Sign PDF documents by s mart card - Bank sends electronic documents - Customer sends signed orders/forms back 4-eye principle : - Multiple s ignatures are possible - Accountant creates transaction His /her manager approves it by his /her signature Top managers approves all by additional signature
  8. Smart card & certificate : A SIM-sized smart card is inserted in the device Smart card is PIN protected Digital certificates can be stored on smart card Smart card and certificate can be used for web login Smart card and certificate can be used to digitally sign user transactions Hardened web browser : Installed (default) web browser on PC is not used A protected & customized on board web browser is used for secure online banking Implemented security mechanisms stops phishing attacks Smart Security Management : All devices in the field can be updated remotely & securely Both firmware (hardware) and application (software) updates are possible
  9. URL protection : Whitelist of URL is used User can not surf or be directed in malicious web sites Web browser URL address bar can be disabled Trusted SSL certificates : Only preconfigured web certificates are trusted User can not import additional trusted certificates Two factor authentication : Smart card and PIN is used for login and/or transaction signing Additional mechanisms are implemented to secure smart card usage Anti hacking mechanisms : Many security mechansims are implemented against well known attack types All these mechanisms are implemented for the last 5 years and this is a continuous (never ending) research & development
  10. Easy infrastructure i ntegration and modular design for future needs : Integration of the solution into existing systems is easy Modular design allows you to start with simple functionality and then add more in the future without any fundamental changes in the infrastructure (start with login-only, then later add transaction signing or add OTP management– SecOPTIC – in the future) Central and anonymous smart card personalization and distiribution : KOBIL developed an anonymous card production system which is widely accepted by banks This solutions allows low cost card production and roll-out Easy a ctivation m ethods for end users : Random distribution of anonym devices and cards are possible With the first time usage, user can define smart card PIN and register his card and device remotely Central device and application management : Infrastructure allows full control of rolled-out devices in the field Remote & secure updates for firmware and applications : - No need to collect back devices for future needs
  11. - IT standards and technologies continuous ly change - m ID entity technolog y is always up-to-date for IT infrastructure change ( b ackend system) IT extension New requirements - No restrictions for security and usage Cost Introduction of new technologies have a linear cost development KOBIL m ID entity has constant costs – despite adaptable technology The longer KOBIL m ID entity technology is in usage the more it become cost-saving
  12. Zero adherence : Transaction data goes out of PC There is no dependency to used PC No PC resource is used for data protection No security concerns for PC, operating system, web browser Protection even against man-in-the-machine attacks Sign what you see : Transaction data is verified on secure offline device display If PC or OS or web browser is hacked and transaction data is modified by hackers, then user can detect the data manipulation on device display Multi-channel capability : - Besided Transaction Data Signing (TDS) OTP via flickering bar code, Basic OTP generator is included for telephone banking, ATM, e-banking login etc.
  13. Login into your web account : User can login into his bank account with only a user name and static password (classic method) or can use SecOPTIC device to generate a basic OTP (no transaction signing) to use at login time In the confirmation page, a flickering bar code will be shown : Flickering bar code is generated on bank web server based on user transaction data (send at step-2) Additionally a bank server challenge (which is valid for a certain time) can be included in flickering bar code Place the optical sensor on PC monitor : There are 5 optical sensors behind the device These sensors should look at the flickering bar code on PC monitor User transaction data will be transfered from PC monitor to SecOPTIC device Verify the transaction data on device display : Now user can see the transaction data on device display If transaction data (which is entered at step-2) is modified by hackers or if flickering code is modified, then user will see a different transaction data (recepient account no and/or amount) If transaction data is modified, then user can stop at this step and transaction is not completed Enter the generated signature code into confirmation page to complete the transaction : - User transaction is digitally signed by user private key in SecOPTIC device
  14. Optical sensors : There is no need to manually enter the transaction data into device User can see and sign the data on device Removable battery : User can change and keep using device for a long period Removal of battery before device disposal Smart Security Management : Device management, lock/unlock, resyncronization Transaction data signature verification
  15. Large d isplay and easy menu navigation : Ease of use for end users Cost effective alternative to smart card readers : A complete solution, no need for additional smart card Security for advanced attacks : Protection even against man-in-the-machine attacks Time limit for generated OTP : Typical time-based OTP devices has a clock inside and cause many syncronization problems SecOPTIC has no clock in hardware, but server can set a time limit for received user transaction data to be signed by device DSA t echnolog y : KOBIL developed advanced algorithm to improve optical reading capability of SecOPTIC Less error rate while reading transaction data from a PC monitor
  16. Easy infrastructure i ntegration and modular design for future needs : Integration of the solution into existing systems is easy Modular design allows you to start with simple functionality and then add more in the future without any fundamental changes in the infrastructure (start with login-only, then later add transaction signing or add digital certificate management– mIDentity – in the future) Already personalized for anonymous deployment : Devices are delivered to bank in bulk, all of them are personalized The bank loads device data into management system Devices can be distributed randomly to end users Easy a ctivation m ethods for end users : User can activate (assign) anonymous device to his/her account with the first time usage Central device management : - Devices can be locked, unlocked or removed from the system Remote and self service resyncronization : Users can start re-syncronization procedure by themselves Device shows the necessary data for re-syncronization
  17. Zero adherence : Transaction data goes out of PC There is no dependency to used PC No PC resource is used for data protection No security concerns for PC, operating system, web browser Protection even against man-in-the-machine attacks Sign what you see : Transaction data is verified on secure offline device display If PC or OS or web browser is hacked and transaction data is modified by hackers, then user can detect the data manipulation on device display Multi application : - Since a credit or debit card is used, the same technology can be used for different applications, like online shopping, 3D-secure applications, etc.
  18. Login into your web account : User can login into his bank account with only a user name and static password (classic method) or can use bank smart card and offline reader to generate a basic OTP (no transaction signing) to use at login time In the confirmation page, a flickering bar code will be shown : Flickering bar code is generated on bank web server based on user transaction data (send at step-2) Place the optical sensor on PC monitor : There are 5 optical sensors behind the reader These sensors should look at the flickering bar code on PC monitor User transaction data will be transfered from PC monitor to smart card reader Verify the transaction data on device display : Now user can see the transaction data on smart card reader display If transaction data (which is entered at step-2) is modified by hackers or if flickering code is modified, then user will see a different transaction data (recepient account no and/or amount) If transaction data is modified, then user can stop at this step and transaction is not completed Enter the generated signature code into confirmation page to complete the transaction : - User transaction is digitally signed by user private key in smart card (credit or debit)
  19. Optical sensors : There is no need to manually enter the transaction data into device User can see and sign the data on device Removable battery : User can change and keep using device for a long period Removal of battery before device disposal Credit or debit card : - Use of bank card allows secure payment for online shops
  20. Large d isplay , big keypad and easy menu navigation : Ease of use for end users Security for advanced attacks : Protection even against man-in-the-machine attacks LEGO Design : - Design based on market research on real customers. DSA t echnolog y : KOBIL developed advanced algorithm to improve optical reading capability of SecOPTIC Less error rate while reading transaction data from a PC monitor