SlideShare a Scribd company logo
1 of 22
Download to read offline
ca Securecenter 
My Phone is Me; 
Hot Topics in Authentication 
R ‘Doc’ Vaidhyanathan 
SCX10S #CAWorld 
CA Technologies 
VP, Product Management
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
R ‘Doc’ Vaidhyanathan 
CA Technologies 
VP Product Management 
Payment Security 
Mobility changes everything.Mobile devices can be used for everything from authenticating people to websites and eCommerce transactions through mobile in-store payments.They are a user’s identity, their payment device, and can even replace their wallets.Learn about new authentication techniques as well as new mobile capabilities for contactless payments that will make this a reality.
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Authentication –Traditional Ideas 
Something that you KNOW 
Something that you HAVE 
Something that you ARE
4 
© 2014 CA. ALL RIGHTS RESERVED. 
The Mobile Device 
Brings together something that you HAVE and something that you ARE 
Is your mobile separate from you?
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Something about mobile devices 
Everyone has one. 
Everyone has their own. 
Everyone (almost) has just one (may change from time to time, but one current). 
And, it is not shared!
6 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile Devices and Authentication 
Authenticate WITH 
Authenticate TO 
Authenticate THROUGH
7 
© 2014 CA. ALL RIGHTS RESERVED. 
Authentication Schemes 
Lifelong 
Thumbprint 
Drivers License 
Years 
Work badge 
Credit/Debit Card 
Days 
Hotel room key 
Boarding Pass
8 
© 2014 CA. ALL RIGHTS RESERVED. 
Authentication Components 
Credential 
Provisioning & Lifecycle Management 
Usage on- demand 
Validation, reconciliation and fallback
9 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile Device for Authentication –Significant benefits 
Provisioning IntegrationThrough Apps 
Same device used through lifecycle 
Multi-mode Usability 
Visual –something user can view and enter 
Interactive –direct interface at POI 
Automatic –backend without user interaction 
Retention of usage history 
User audit possible
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobility Trends 
A BILLION CONSUMERS WITH SMARTPHONES BY 20161 
USER LOCATION AVAILABLE FOR AUTHENTICATION 
MOBILE AUTHENTICATION AND SECURITY WILL BECOME HUMAN- FACTOR FRIENDLY2 
1) ‘Forrester Research Mobile Adoption Forecast, 2012 to 2017 (US); February 28, 2011, “Mobile App Internet Recasts The SoftwareAnd Services Landscape”, 2) Forrester Top 15 Trends S&R Pros Should Watch: 2014” 1) ‘Forrester Research Mobile Adoption Forecast, 2012 to 2017 (US); February 28, 2011, “Mobile App Internet Recasts The Software And Services Landscape”, 2) Forrester Top 15 Trends S&R Pros Should Watch: 2014”
11 
© 2014 CA. ALL RIGHTS RESERVED. 
New Enterprise Applications 
PROXIMITY AUTHENTICATION VIA MOBILE 
BIOMETRICS, MOBILE, WEARABLES 
REPLACE “PLASTIC” BADGES TO OPEN DOORS 
PROVIDE TAP AND PAY TO CUSTOMERS
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile Wallet –The Promised World? 
Simply ‘tap’ or wave mobile device overreader. 
Insert‘chip’ card and enter PIN. 
Swipe ‘mag-stripe’ through reader. 
Well-established infrastructure 
Current,default setup 
Adoptedin Europe 
Being rolled out in Asia, U.S. 
Burgeoningmobile devices 
Potentialfor value added services 
Susceptible to card cloning 
Expensive infrastructure 
Evolving standards,options
13 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile EcoSystems 
NFC Controller 
Secure Element 
What’s next? 
Initial rollouts with card data stored in secure element, all apps that access NFC controller managed by the carriers 
Landscape is still evolving for Blackberry, Windows and older Android based mobile devices 
Apple Pay on iPhone 6 and iPhone 6 Plus. Secure Element controlled by Apple 
Android 4.4 (Kit Kat) based mobile sets allow other apps (including Host Card Emulation –HCE) to access NFC Controller
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Using Mobile as the Payment “Card” Core Sub-Systems 
Personalize and set individual card details. 
Verify user and device prior to provisioning. 
Support card life cycle. 
—lost/new phone 
—card renewal 
—profile changes 
1. Provisioning 
Rapid and easy ‘tap’ to pay experience. 
Enable/disable ‘card’ if required. 
Exceptions —error messages for troubleshooting 
Alternate options 
2. Making Payments 
3.Back-end infrastructure to authorize the new payment method/messages
15 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Solution -Overview 
CA Mobile Wallet Server 
NFC Controller 
Issuer App 
Software Vault Library 
Card Issuer System 
Setup / Provisioning 
Key Exchange 
Provisioning & 
Lifecycle Management 
Purchase 
EMV Standard 
ISO Messages 
Authorization 
Tokenization & 
De-tokenization (optional) 
Card Network 
+ Acquirer
CA Mobile Wallet Screen Shots
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Provisioning –Start 
Click to scan card.
18 
© 2014 CA. ALL RIGHTS RESERVED. 
Provisioning –Complete
19 
© 2014 CA. ALL RIGHTS RESERVED. 
In-Store Purchase (“Tap-and-Pay”)
20 
© 2014 CA. ALL RIGHTS RESERVED. 
Online Payment (“Scan-and-Pay”)
21 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
22 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

More Related Content

More from CA Technologies

Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 

More from CA Technologies (20)

Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

My Phone Is Me: Hot Topics in Authentication

  • 1. ca Securecenter My Phone is Me; Hot Topics in Authentication R ‘Doc’ Vaidhyanathan SCX10S #CAWorld CA Technologies VP, Product Management
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract R ‘Doc’ Vaidhyanathan CA Technologies VP Product Management Payment Security Mobility changes everything.Mobile devices can be used for everything from authenticating people to websites and eCommerce transactions through mobile in-store payments.They are a user’s identity, their payment device, and can even replace their wallets.Learn about new authentication techniques as well as new mobile capabilities for contactless payments that will make this a reality.
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Authentication –Traditional Ideas Something that you KNOW Something that you HAVE Something that you ARE
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. The Mobile Device Brings together something that you HAVE and something that you ARE Is your mobile separate from you?
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Something about mobile devices Everyone has one. Everyone has their own. Everyone (almost) has just one (may change from time to time, but one current). And, it is not shared!
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. Mobile Devices and Authentication Authenticate WITH Authenticate TO Authenticate THROUGH
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. Authentication Schemes Lifelong Thumbprint Drivers License Years Work badge Credit/Debit Card Days Hotel room key Boarding Pass
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. Authentication Components Credential Provisioning & Lifecycle Management Usage on- demand Validation, reconciliation and fallback
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. Mobile Device for Authentication –Significant benefits Provisioning IntegrationThrough Apps Same device used through lifecycle Multi-mode Usability Visual –something user can view and enter Interactive –direct interface at POI Automatic –backend without user interaction Retention of usage history User audit possible
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Mobility Trends A BILLION CONSUMERS WITH SMARTPHONES BY 20161 USER LOCATION AVAILABLE FOR AUTHENTICATION MOBILE AUTHENTICATION AND SECURITY WILL BECOME HUMAN- FACTOR FRIENDLY2 1) ‘Forrester Research Mobile Adoption Forecast, 2012 to 2017 (US); February 28, 2011, “Mobile App Internet Recasts The SoftwareAnd Services Landscape”, 2) Forrester Top 15 Trends S&R Pros Should Watch: 2014” 1) ‘Forrester Research Mobile Adoption Forecast, 2012 to 2017 (US); February 28, 2011, “Mobile App Internet Recasts The Software And Services Landscape”, 2) Forrester Top 15 Trends S&R Pros Should Watch: 2014”
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. New Enterprise Applications PROXIMITY AUTHENTICATION VIA MOBILE BIOMETRICS, MOBILE, WEARABLES REPLACE “PLASTIC” BADGES TO OPEN DOORS PROVIDE TAP AND PAY TO CUSTOMERS
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Mobile Wallet –The Promised World? Simply ‘tap’ or wave mobile device overreader. Insert‘chip’ card and enter PIN. Swipe ‘mag-stripe’ through reader. Well-established infrastructure Current,default setup Adoptedin Europe Being rolled out in Asia, U.S. Burgeoningmobile devices Potentialfor value added services Susceptible to card cloning Expensive infrastructure Evolving standards,options
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. Mobile EcoSystems NFC Controller Secure Element What’s next? Initial rollouts with card data stored in secure element, all apps that access NFC controller managed by the carriers Landscape is still evolving for Blackberry, Windows and older Android based mobile devices Apple Pay on iPhone 6 and iPhone 6 Plus. Secure Element controlled by Apple Android 4.4 (Kit Kat) based mobile sets allow other apps (including Host Card Emulation –HCE) to access NFC Controller
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Using Mobile as the Payment “Card” Core Sub-Systems Personalize and set individual card details. Verify user and device prior to provisioning. Support card life cycle. —lost/new phone —card renewal —profile changes 1. Provisioning Rapid and easy ‘tap’ to pay experience. Enable/disable ‘card’ if required. Exceptions —error messages for troubleshooting Alternate options 2. Making Payments 3.Back-end infrastructure to authorize the new payment method/messages
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. CA Solution -Overview CA Mobile Wallet Server NFC Controller Issuer App Software Vault Library Card Issuer System Setup / Provisioning Key Exchange Provisioning & Lifecycle Management Purchase EMV Standard ISO Messages Authorization Tokenization & De-tokenization (optional) Card Network + Acquirer
  • 16. CA Mobile Wallet Screen Shots
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Provisioning –Start Click to scan card.
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. Provisioning –Complete
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. In-Store Purchase (“Tap-and-Pay”)
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. Online Payment (“Scan-and-Pay”)
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 22. 22 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation