1 © SURFnet 1998 Smart Access: Strong Authentication on the Web TNC Dresden 5-8 October 1998.

Slides:



Advertisements
Similar presentations
Smart Card Security Xufen Gao CS 265 Spring, 2004 San Jose State University.
Advertisements

Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Basic Computer Vocabulary
PKCS #15 v1.1 Magnus Nyström RSA Laboratories PKCS Workshop, 1999.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
1 3. Smart Identification 3.1 Smart Cards What Is a Smart Card?  Smart cards evolved from plastic identification and magnetic stripe cards through.
Introduction CSCI 444/544 Operating Systems Fall 2008.
Database Encryption. Encryption: overview Encrypting Data-in-transit As it is transmitted between client-server Encrypting Data-at-rest Storing data in.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Submitted by: Rahul Rastogi, CS Department.  Introduction  What is a smart card?  Better than magnetic stripe card.  Technology What’s in a card?
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Muhammad Wasim Raad1 Smart Cards Operating Systems أنظمة التشغيل للبطاقات الذكية By: Dr Muhammad Wasim Raad Computer Engineering Department.
Payment Card Industry (PCI) Data Security Standard
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Cutting Edge 2005 workshop, IIT Kanpur Smart Cards: Technology for Secure Management of Information Rajat Moona Computer Science and Engineering IIT Kanpur.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Java Card Technology Ch02: Smart card Basics Instructors: Fu-Chiung Cheng ( 鄭福炯 ) Associate Professor Computer Science & Engineering Computer Science &
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
Windows Server 2003 Terminal Server. Windows Terminal Server Rapid access to data and applications from anywhere LAN Data Wireless LAN VPN Applications.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Epayment System using Java April, Computer Security and Electronic Payment System Cho won chul Kim Hee Dae Lee Jung Hwan Yoon Won Jung.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University.
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
Copyright ONE-O-ONE iSOLUTIONS Inc Smart Card Technology for the Macintosh Chris Goeltner January 30, 2001.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Smart Card Technology & Features
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
PCaPAC Rome, October 14 th 2002 Paolo Sestini System Engineer Controlling large systems apparatus in an effective manner using the.
Building Security into Your System Bill Major Gregory Ponto.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
RL78 Code & Dataflash.
©2013 Monet Online Commercial Service Co., Ltd. All rights reserved. MONET 09/2015.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Wireless and Mobile Security
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
Day 1,2 Review. Review: Parts of a Computer CPU (Processor) Main Memory (RAM) External Memory (ROM) -Hard Drive-Floppy-USB Drive I/O Devices -Keyboard-Monitor-Printer-Speakers.
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Presented By: Kasey Campbell John Geer.  Hermes Company Transfer will allow the passing of files, large or small, between companies.  All files are.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
AGW Express Interface RMS Express - Sound Card Interface
©2013 Monet Online Commercial Service Co., Ltd. All rights reserved.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
1 1 Social Security Platform James Wu We Simplify Security.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
Introduction The State of Security Laptops Flash Drives Data Storage Smart Cards Internet Login Wifi and Internet.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Xerox Analyst Training
Smart Cards: Technology for Secure Management of Information
REAL QUESTIONS,100% PASSING GUARANTEED
What is an Operating System?
Training 9/20/2018.
SAPC Hardware Pentium CPU (or 486) 4M usable memory
Presentation transcript:

1 © SURFnet 1998 Smart Access: Strong Authentication on the Web TNC Dresden 5-8 October 1998

2 © SURFnet 1998 What’s the problem?

3 © SURFnet 1998 Authentication solutions

4 © SURFnet 1998 Introducing…the smartcard EEPROM ROM RAMRAM CPU I/O etc IBM MFC smartcard: 8 bit  Processor 2K ROM (OS) 10K EEPROM (Apps) <1K RAM 3,64Mhz clockspeed

5 © SURFnet 1998 Smartcard intro (Cont’d) EF MF EF DF EF DF EF DF EF DF MF Master File DF Dedicated File EF Elementary Files

6 © SURFnet 1998 Access conditions For each command on a file: ALW (Always) CHV (CardHolder Verification) PRO (Protected with key X) –Secure handshake with MAC AUT (External Authentication) ENC (Enciphered) –PRO plus encrypted data NEV (never) (triple) DES !

7 © SURFnet 1998 Student Smartcard College pass library pass loan/grant registration number membership data e-purse (Chipper)

8 © SURFnet 1998 Our model is ISI

9 © SURFnet 1998 ISI Protocol

10 © SURFnet 1998 Current applications Downloading of commercial software (Smart Server) Access to exam results database Student grants/loans system StudyNet: –registration for courses and exams –access to exam results

11 © SURFnet 1998 Issues Java implementations in browsers Support for smartcard readers (com port) Use of DES in public key world Scaling of DES-based two-party authentication

12 © SURFnet 1998 Tree-party Authentication

13 © SURFnet 1998 Demo time! Setup Card Reader StudyNet Faculty of Arts, Utrecht UniversityStudyNet

14 © SURFnet 1998 References (dutch)

15 © SURFnet 1998 Be Smart!

16 © SURFnet 1998

17 © SURFnet 1998 Offline demo

18 © SURFnet 1998 Offline Demo (cont’d)

19 © SURFnet 1998 Offline Demo (cont’d)

20 © SURFnet 1998 Offline Demo (cont’d)

21 © SURFnet 1998 Offline Demo (cont’d)

22 © SURFnet 1998 Offline Demo (cont’d)