11th September 2008 Stockholm Sweden Simon Josefsson Head of R&D

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Bookseller Guide How to do a BALANCE ENQUIRY on a National Book Token Electronic Gift Card using the Web Recommended solution for booksellers with broadband.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Attributes of SharePoint Migration  Quickly Migrate bulk SharePoint offline or Online database in other SharePoint or Office365.  Transfer Multiple.
Using Evernote and Google Docs in your web or mobile application (and potentially Dropbox and Skydrive) By Peter Messenger Senior Developer – Triple Point.
The team - currently 25 people
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Chromebook Basics:. Using Chromebooks In the Classroom: Proper storage and charging within the charging cart Distributing devices to students.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
By: Ansuya Chauhan.
Blogs Return on Marketing Investment MARK 430 Week 2 Lab.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Quick Guide Completing the External Examiner’s On-line Annual Report MITRE Quick Guide Completing the External Examiner’s On-line Annual Report Version.
Multi-Factor Authentication Added protection for a more secure you Presenter: Jeff Penn.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Web Design, DreamWeaver, HTML, etc. Snyder p
Certificate and Key Storage Tokens and Software
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Bookseller Guide How to SELL a National Book Token Electronic Gift Card using the Web Recommended solution for booksellers with broadband computer access.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
So – You want to learn how to put an advanced article submission (cut and paste) onto the state website. (Note: If you have not done so, you will need.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
BIF713 Operating Systems & Project Management Instructor: Murray Saul
A Back-Stage Pass: What Every Hacker Wants Presented by: Art Jones.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
INNOV-11: Can You Please SmartID Yourself? How can you use SmartCards in your OpenEdge ® application? Wouter Dupré Senior Solution Consultant.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Chromebook Basics:. Chromebook Components: Memory Card Slot 3.0 USB Port USB Port HDMI Port Power Port (Charging) Head Phone Jack SD Card Slot.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
RSS Basics and Beyond RSS Basics and Beyond Tips and Tricks for Getting the Most out of Syndicated Content.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
New Hire Registration for ADP Self Service
Angelos Barmpoutis Web-based Authentication Technique for Systems without database Server Angelos Barmpoutis Aristotle University.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
If you need to use some information that is not contained in one of the pre-selected tables, you can find out where that data is stored through the Banner.
Online Parking System.
Session: MIX09-T27F. Web Developers Customizable identity UX Single Sign On Access to user data ISVs Federation for selling their applications to organizations.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
Scout First Time Login and Setting Up PIN Number.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
PHP Form Processing * referenced from
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
If you come directly to you will see this page. If you follow the link from nuskin.com you will go past this page into your market.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
1 1 Social Security Platform James Wu We Simplify Security.
DOE Consolidated Audit Program 1. » Requires a UCAMS Username and Password » Requires 2 Factor Authentication ˃Either HSPD12 Badge and PIV Card Reader.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Yubikeys in the Enterprise Talk for Programmers Special Interest Group (PSIG) Canberra Bob Edwards, June 2009.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
U.S. Department of Energy Consolidated Audit Program
Step 1 Login on UHCP Site
Digital Literacy Computational Thinking and Coding
Registering on the SITE is a MULTI-STEP process:
Notice The office made this file for the students who have difficulties in accessing Sejong Web site. You can apply class registration and find your course.
Presentation transcript:

11th September 2008 Stockholm Sweden Simon Josefsson Head of R&D

Company started in May 2007

9 people in Stockholm and California

Invention: USB-based one-time-password generator

Product History: Version 0, Version 1,...

RFID card with buttons, card reader and proprietary device drivers

USB key with pin entry

USB key with one button

Ultra-Thin Touch button

yubico Market positioning yubico Security Overall simplicity and cost-efficiency Software certificates Digital keyboards USB- /smartcards Username / passwords SMS autentication Authenication tokens

How does the Yubikey work?

128-bit AES key

Unique ID Time variant pass code tndrvbtecccunbhkddvclbckjbidjbbftcebjkkhcfle tndrvbtecccunvtkkuvblbbbkbcerefuvuckbdhhucid tndrvbtecccunclhhvkthctdnclgktdktvnttfcgikic tndrvbtecccuhjvgrhdvbjlglicchdgvjniglujuvdjl Simulates an USB keyboard

Two-factor authentication

Wallet size

No display or batteries

No mechanical parts

Web 2.0 Authentication Low Cost Low manufacturing cost Low shipping cost Unlimited lifetime Free SDK High Security State of the art Success factors for the mass market Overall Simplicity All computers One click login No software Portable Easy integration

How can I integrate the YubiKey?

All open source....NET C# C++ Java PHP Perl Python Ruby

What is......?

Decentralized web-based authentication system

What does that mean?

You can reduce the number of username and passwords you need to remember

You don't need to maintain a username and password database for your web site aka: out-source the authentication service to someone else!

And this is new?

Higgins Cardspace SAML X.509 / eID

Demo!

Questions? Answers? Copyright © 2007, 2008 Simon Josefsson Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. Credits: Some screenshots from Simon Willison

How to use your own webpage as an OpenID URL authenticated using YubiKey Add to the HTML HEAD section of your webpage. Replace ljitnjbcujvh with the identity string of your YubiKey, i.e., the first 12 characters printed by the key when you touch the button