Merging Security and Convenience with Seos® Credential Technology

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

RFID / ID Security: Card Identity Solutions
Social Mobility Technologies for Smart Campuses PACWest Presentation 16 th May 2012.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
Director of Product Line Management HID Proprietary & Confidential
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Aloaha protects Mobile M2M Communication with secureSIM.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
L a r y s s a J a c k i e &. Founded in 2003, DocuSign is committed to transforming the way people like you work, live and connect by providing the freedom.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
·
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Smart Media Innovations & HID Corporation MOBILE SECURITY.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
The information contained in this document represents the current view of Microsoft Corp on the issues discussed as of the date of publication. Because.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Converging Technologies in the ID Industry The World goes ID Technologies in both the physical and logical/network access control areas converge SmartCard.
MiiSky Your personal Vault. About miisky Miisky is an Open Software Enabler, which aims at communication, independent of the hardware and the operating.
Today, we’ll discuss Mifare and iCLASS Technologies… Are you ready ?
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
EMV.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Samsung Pay RAO Lu KONG Shuyi
TECHNOLOGY FOR FINANCIAL INCLUSION
Near Field Communication (NFC)
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
TV Broadcasting What to look for Architecture TV Broadcasting Solution
AGENDA Introduction Kind of information smart card contain
Blue Access Technologies
Technical Report PKI for
Implications of Digital Technology for Business and Customers
ActivID Tap Authentication HID Global
Authentication.
Radius, LDAP, Radius used in Authenticating Users
HID Mobile Access Bringing the Magic Back to PACS Brian Bloomingdale
MiiSky Your personal Vault.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Chapter 4 E-commerce Security and Payment.
Secure Element API An introduction.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
VERSATILE NETWORK ATTACHED DOOR ACCESS CONTROL SYSTEMS
Solutions overview 2018.
OCR GCSE ICT Data capture methods.
Let’s talk RFID Technologies
Enhancing Web Application Security with Secure Hardware Tokens
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Report PKI for
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Introduction to Axeze.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Privacy for Public Transportation
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
2N Access Unit 2.0 Multi-technology access control readers.
Cloud Computing LegalRun Solutions Why It’s Right for You!
Payment Innovations PAYMENT INNOVATIONS DIGITAL PAYMENT SOLUTIONS.
Presentation transcript:

Merging Security and Convenience with Seos® Credential Technology Brian Bloomingdale, Northeast RSM-PACS, HID Global

Brian Bloomingdale Introduction & Welcome HID Global Northeast RSM bbloomingdale@hidglobal.com 315-391-6689

Agenda - Todays Keys - Tomorrow’s Keys - Overview of Card Technologies (Evolution) - Why SEOS ? - How to Upgrade: Process and Best Practices - Q&A

Keys Today Each use case is a discrete ecosystem of readers/locks/ applications and access keys. Key formats have been specific to the individual ecosystems. RFID cards Metal Keys Passwords Visual Documents

Infrastructure for Tomorrow’s Keys Keys will no longer be bespoke pieces of hardware, such as brass keys or dedicated plastic cards. Instead there will be digital keys that can reside on a variety of smart devices – mobile phones, micro- processor cards, wearables. Microprocessor cards Smartphones Wearables Biometrics

Digitally Signed: E5L9KFD An Overview of Card Technologies 101111011001001101001 47 93 AF 1B ED 7D Card Format: 101111011001001101001010 + Unique Device ID: 356465 Digitally Signed: E5L9KFD And is then ENCRYPTED 101111011001001101001 47 93 AF 1B ED 7D 101111011001001101001 Magstripe Contact technology that stores the unencrypted credential within a magnetic stripe on the outside of the card. Prox Early contactless technology that stores the unencrypted credential inside the card. iCLASS® Genuine HID® contactless technology that stores the credential(s) inside the card behind a layer of encryption. iCLASS SE® Genuine HID® contactless technology that stores the credential(s), in an encrypted format called a Secure Identity Object ® (SIO®), inside the card behind a layer of stronger encryption.. Powered by Seos® Genuine HID® contactless technology that manages the storage and retrieval of credential(s) , including SIO’s, inside any smart device by leveraging encryption and communication standards for the highest level of trust, security and privacy. iCLASS: Overarching brand name for Genuine HID contactless smartcard readers and credentials. Secure Identity Object (SIO): Data model used on some credentials that adds a digital signature and encryption to validate authenticity and protect against cloning and forgery. Secure Identity Object Enabled (SE): Identifies a device or system of devices capable of storing, interpreting and/or encoding the SIO data model. iCLASS SE: Overarching brand name for contactless smartcard readers, credentials and encoders that use the SIO data model for stronger authentication. Seos: A small software application (or “applet”) designed to store and retrieve credentials in a secure, trusted, and private manner.

Seos Credential Technology More choice Seos is a breakthrough credential technology that powers secure identity solutions. Seos gives the freedom to use your device of choice for secure access to more applications with the confidence that identities are secure and privacy-protected. More applications More confidence

: Enabling your Freedom Hardware independent, allowing identification from smart cards, smartphones, tablets, wearables and beyond More choice

: Enabling your Freedom Not tied to a specific communication standard, enabling use of ISO14443 RFID communication, NFC, Bluetooth and more More choice

: Enabling your Freedom Can be loaded to a wide variety of smart devices, including both the popular iOS and Android operating systems More choice

: Enabling your Freedom Can be read by HID Global’s readers as well as a growing number of devices from other manufacturers More choice

: Enabling your Freedom Designed both for standard and Mobile Access Built-in One Time Password feature for secure data access in cloud Hundreds of solutions through HID Global partners for extended applications More applications

: Enabling your Freedom For your security with best-in-class security and privacy Based on proven, standard cryptography Evolving to meet end-user needs today…and for years to come More confidence

1 2 3 How to Upgrade Establish a Standard Upgrade Readers Three Steps to Upgrade 1 Experience tells us that, in the vast majority of cases, it is best practice to establish a standard of a multi-technology credential to accelerate transition. However, there are occasions where single technology cards are beneficial to reduce cost. Establish a Standard 2 Upgrade Readers 3 Replace Credentials

How to Upgrade Option #1 HF LF HF LF  HF LF HF LF HF LF HF LF

How to Upgrade Option #2 HF LF HF LF  HF LF HF LF HF LF HF LF

How to Upgrade Upgrade best practices Site survey and complete inventory of existing technologies as a first step Continue to support as few of the legacy technologies as possible Choose new solutions capable of mobile access Start small – execute successfully at one site, then repeat For rebadging projects, consider buying pre-personalized credentials

How to Upgrade Upgrade caution areas Don’t procrastinate: Set target dates for completion Consider and manage performance expectations Implications of multi-tech readers and multi-tech credentials Beware metalized environments Pre-educate users to changes in card read performance and mobile performance