NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.

Slides:



Advertisements
Similar presentations
Readers DigiReader Series Digital Proximity Readers
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Director of Product Line Management HID Proprietary & Confidential
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Security Controls – What Works
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Proposal for an achievable, cost effective Security Concept for EOBRs C. Hardinge / A. Lindinger.
Geneva, Switzerland, 4 December 2014 Evolving Payments into The Digital World Richard Smith, Vice President, MasterCard Customer Fraud Management
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Cyber Crimes.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Access Control Vulnerability & Interoperability: Improving the Reader-to-Panel Connection Tony Diodato, CTO Cypress Integration Solutions Access Control.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
Chapter-7 Basic Wireless Concepts and Configuration.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Secure, verifiable online voting 29 th June 2016.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
Track School Bus About TrackSchoolBus.com is web version enterprise edition software which will be configured to meet the requirements of school transport.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
A catalyst for mobile contactless payments adoption?
2N® Access Unit.
Configuring and Troubleshooting Routing and Remote Access
2N® Access Unit Bluetooth
2N® Access Unit Touch Keypad
Security and Encryption
Chapter 8 Building the Transaction Database
HID Mobile Access Bringing the Magic Back to PACS Brian Bloomingdale
Module 8: Securing Network Traffic by Using IPSec and Certificates
Merging Security and Convenience with Seos® Credential Technology
Power BI Security Best Practices
Enterprise Launch Cloud Networking Connected Experience
Understanding Wi-Fi Direct in Windows 8
Guide to Access Control Systems
September 2016 EQUIPMENT FOR PROCESSING.
Cesar Lomeli.
2N® Access Unit Touch Keypad
“I don’t have to be careful, I’ve got a gun.”
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
2N® Access Unit RFID (125kHz or 13.56MHz).
Secrets Between Just You and Me
2N® Access Unit Bluetooth
Product Overview.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 2 OBJECTIVE 14: Compare various security mechanisms.
2N Access Unit 2.0 Multi-technology access control readers.
The Italian Academic Community’s Electronic Voting System
Building Security into Your System
Electronic Payment Security Technologies
Payment Innovations PAYMENT INNOVATIONS DIGITAL PAYMENT SOLUTIONS.
2N® Partner API Integrate 2N devices over the internet.
2N® Access Unit Bluetooth
Presentation transcript:

NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018

Conekt™? Conekt is Farpointe’s Mobile Smartphone Access Control Identification Solution Conekt consists of 3 elements: Smartphone wallet app Mobile credentials Mobile-ready contactless smartcard readers

Conekt is Simple Straightforward implementation And just 3 steps to gain access: Download Conekt wallet app from Apple App Store or Google Play Register the smartphone (requires only the device’s phone number) Then to add a mobile credential, enter a 16-digit registration key

Conekt Respects Personal Information Privacy maintained No requirement for end-users or project administrators to disclose sensitive information. With Conekt… No private information to disclose No intrusive on-boarding process No portal accounts 3

Conekt Supports the Channel Same ordering process as physical access credentials From Farpointe-to-OEM-to- Integrator-to-End User Instead of a box of cards, administrator receives an Order Summary and corresponding Registration Key Certificates Electronic or printed Administrator enters credential information in access control system from order summary Coding is identical to physical access credentials, i.e. format, facility code and ID. Then distributes Registration Key Certificates directly to individual users, just as they would traditional clamshell-style access cards Sample Order Summary Sample Registration Key Certificate 4

Conekt Leverages BLE Bluetooth Low Energy (BLE) BLE is a mainstream 2.4-GHz wireless technology standard BLE prevalent on all major smartphone brands BLE does not require pairing of devices Read range up to 15 feet (4.6 m) Read range is adjustable 5

Conekt is Secure Multi-Technology Reads mobile access credentials and contactless smartcards 2.4-GHz & 13.56-MHz Supports existing card user-base Supports users who don’t have smartphones Assists integrators and their customers with a seamless transition to a mobile solution Conekt™

Conekt is 2-Readers-in-1 Single reader mounts to both mullion and single-gang boxes Unique design is patent-pending. Provides flexible mounting options meeting the most common installation applications Metal mullion door frames North American single-gang wall switch boxes (metal or plastic) A flat surface

Conekt Offers Broad Support Interfaces Conekt readers wire just like a traditional proximity reader. Supports Wiegand The industry’s standard protocol Supports ABA Track II Magnetic stripe emulation, a venerable protocol Supports SIA’s OSDP Open Supervised Device Protocol Makes a growing list of security devices interoperable

Conekt Targets Security Common Criteria Certified EAL5+ Supports MIFARE® DESFire® EV1 and EV2, with advanced encryption

Conekt Provides End-to-End Security 2-factor-authentication during Registration Conekt Mobile App Mutual authentication. Session keys https with TLS and certificate pinning Hack Threats: False issuer Man-in-the-Middle App cracking BLE sniffing and replaying Firmware Hardware Conekt Reader End-to-end encryption Conekt Cloud Your µController LEGIC Connect Reader IC With SE Key derivation (unique keys per device) https with TLS Smartcard IC Host IF encryption (AES 128/256, 3DES) Key & Authorization Management

Conekt Addresses Hack Threats Conekt secures against False Issuer hacking Connections to mobile cloud services are verified using HTTPS with TLS, certificate pinning and API keys Conekt secures against Man-in-the-middle hacking Connections between mobile cloud services and mobile app are verified using HTTPS with TLS, certificate pinning. All file data is encrypted in the hardware secure modules (HSM) before being transmitted to the mobile app. Unique derived keys per smartphone are used. Encryption keys are only stored in HSMs. Conekt secures against App hacking No data encryption keys are stored within the mobile app software. Thus hacker attacks focusing on the mobile app will not be successful in compromising data encryption security. Conekt secures against Replay Attack hacking Through the use of mutual authentication and session keys between the mobile app and reader IC historic recorded session data cannot be replayed to the reader IC. Conekt secures against Lock/Reader Firmware hacking Data encryption keys are stored in physical tamper-resistant EAL5+ compliant hardware security module (SM) in the reader IC. The SM can detect physical attacks, such as IC shaving and electronic signals monitoring.

Conekt Thank you! © 2018 Farpointe Data, Inc. All rights reserved. Patent Pending. Specifications subject to change without notice.