Presentation is loading. Please wait.

Presentation is loading. Please wait.

Not Built On Sand. IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 

Similar presentations


Presentation on theme: "Not Built On Sand. IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 "— Presentation transcript:

1 Not Built On Sand

2 IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980  2013) HDD $/MB /12k NV RAM $/MB /1.3m Ubiquity: More than 7bn mobile connected devices by end of 2013 Networked: (2013) 34% of all people ww have internet access Relevance: (2012) $1 trillion eCommerce Social media: (2013) >10% of all people ww active Authentication hasn‘t

3 Passwords Don’t Work 1.Most people use words from a small set of simple passwords 2.People reuse passwords 3.Passwords are hard to use 4.Passwords get phished 5.Websites don’t protect passwords properly

4 There are alternatives…

5 Implementation is the challenge Each new authentication solution requires: New Software New Hardware New Infrastructure Consumer education We’re building ‘Silos’ of authentication

6 FIDO Goals Support for a broad range of authentication methods, leverage existing hardware capabilities. Support for a broad range of assurance levels, let relying party know the authentication method. Built-in privacy.

7 How does FIDO work? FIDO SERVER FIDO Authenticators Authenticator

8 FIDO Functionality Discover supported authenticators on the client Register authenticators to a relying party Authenticate (a session) Transaction confirmation

9 Registration Overview FIDO AUTHENTICATOR FIDO SERVER FIDO CLIENT Send Registration Request: -Policy -Random Challenge Start registration Authenticate user Generate key pair Sign attestation object: Public key AAID Random Challenge Name of relying party Signed by attestation key Verify signature Check AAID against policy Store public key AAID = Authenticator Attestation ID, i.e. model ID

10 Authentication Overview FIDO AUTHENTICATOR FIDO SERVER FIDO CLIENT Send Authentication Request: -Policy -Random Challenge Start authentication Authenticate user Sign authentication object: Random Challenge Name of relying party Signed by authentication key for this relying party Verify signature check AAID against policy

11 FIDO Building Blocks FIDO USER DEVICE FIDO CLIENT RELYING PARTY FIDO SERVER FIDO Repository FIDO AUTHENTICATOR WEB Application BROWSER / APP Cryptographic authentication key reference DB Authenticator attestation trust store Attestation key Authentication keys Update OSTP TLS Server Key

12 FIDO and IAM Physical-to-digital identity User Management Authentication Federation Single Sign-On Passwords Risk-Based Strong Modern Authentication

13 IMPLICIT AUTHENTICATION EXPLICIT AUTHENTICATION

14 FIDO and Federation FIDO PASSWORDS SSO/FEDERATION First MileSecond Mile SAML OpenI D

15 FIDO and Federation FIDO USER DEVICE FIDO CLIENT IdP FIDO SERVER FIDO AUTHENTICATOR FEDERATION SERVER BROWSER / APP OSTP Service Provider Federation Id DB Knows details about the Authentication strength (based on attestation) Knows details about the Identity verification strength.

16 Thank You

17 FIDO Alliance Members Board of Directors CrucialTec Google Nok Nok Labs PayPal Lenovo NXP Semiconductor Validity Sensors Yubico BlackBerry Sponsor Members Entersekt EyeLock FingerPrint Cards Infineon Ping Identity SecureKey WWTT Associate Members AktivSoft Agnitio AllWeb Technologies Authentify Certus Check2Protect Cloud Security Corp Crocus Technology Diamond Fortress Discretix Insyndia ItsMe! Security PassBan SurePassID Toopher Founding members underlined

18 The Authenticator Concept FIDO Authenticator User Authentication / Presence Secure Display Attestation Key Authentication Key(s) User Injected at manufacturing, doesn’t change Generated at runtime (on Registration)

19 Regarding AAIDs FIDO Authenticator Using HW based crypto Pure SW based implementation Based on FP Sensor X Based on Face Recognition alg. Y AAID 1 AAID 2

20 Registration Overview (2) Physical Identity Virtual Identity FIDO AUTHENTICATOR FIDO SERVER WEB Application { userid=1234, known since 03/05/04, payment history=xx, … { userid=1234, pubkey=0x43246, AAID=x +pubkey=0xfa4731, AAID=y } Registration AAID y key for foo.com: 0xfa4731 Relying Party foo.com Link new Authenticator to existing userid “Know Your Customer” rules Legacy Authentication


Download ppt "Not Built On Sand. IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 "

Similar presentations


Ads by Google