SlideShare a Scribd company logo
1 of 27
Download to read offline
Smart Card Forum
May 21st, 2009



     New trends in smart-cards technology
Agenda


                           Gemalto introduction

                     Computer Authentication Solutions

                         Biometrics on Computers

                  Smart Card, Biometrics and Convenience




Reference, date
Making people’s everyday interactions with the
digital world secure and easy




                    Gemalto provides end-to-end solutions for digital security,
                           from the development of software applications,
                  through the design and production of secure personal devices
                       such as smart cards, e-passports and secure tokens,
                     to the deployment of managed services for our customers




Reference, date
Introducing Gemalto
    World Leader:                                                                 Key figures:

•    World’s #1 for SIM (2)                                                        € 1.7 billion revenue 2008

•    World’s #1 for chip payment cards (3)                                         Innovation investment:
                                                                                       10 R&D sites worldwide
•    World’s #1 reference for e-passports (4)                                          1,300 engineers

•    World’s #1 install-base of over-the-air                                       Global footprint:
     (OTA) platforms for GSM networks (5)                                              19 production sites
                                                                                       31 personalization centers
•    Pioneer and patent holder of high-speed                                           85 sales & marketing offices
     SIM for mobile Internet, multimedia and
     mobile contactless applications                                               Experienced team:
                                                                                       10,000 employees
•    Pioneer of the .NET card, the first
                                                                                       90 nationalities
     Microsoft Vista compatible smart card
                                                                                       40 countries
     solution

      Source: (1) Gartner 2006; (2) Frost & Sullivan 2006; (3) The Nilson Report 2007; (4) Keesing Journal of Identity 2007; (5) Gemalto 2007


     Reference, date
Gemalto's worldwide presence




Reference, date
Agenda


                           Gemalto introduction

                     Computer Authentication Solutions

                         Biometrics on Computers

                  Smart Card, Biometrics and Convenience




Reference, date
Computer Authentication Solutions
 There are many ways to authenticate to a computer:
          Username/Password
          Tokens storing credentials
          Tokens storing digital certificates
          Biometrics unlocking credentials or digital certificates stored on PC
          Dynamic passwords (OTP), challenge & response
          ... to name a few


 Multifactor is recognised as necessary
        Something you know, something you are, something you own
 Simplicity is key
        Complex solutions lead users to look for shortcuts!
 Strong link to users is necessary
        Avoid credential passing/borrowing
        Enables non-repudiation


Reference, date                                                                    7
The need for strong authentication
 High profile cases
        UK aide to Gordon Brown gets blackberry stolen
                  – http://www.timesonline.co.uk/tol/news/politics/article4364353.ece
                  – “Downing Street BlackBerrys are password-protected but security officials said
                    most are not encrypted”
        FBI loses 3-4 laptops a month (2007)
                  – AP, http://www.msnbc.msn.com/id/17115660/
                  – “"Perhaps most troubling, the FBI could not determine in many cases whether
                    the lost or stolen laptop computers contained sensitive or classified information”
 Regulatory compliance
 Non repudiation
 Strong Authentication is an enabler
        High mobility
        Home office
        Trust management
 Real Strong authentication is mutual!
        Not only user to computer/network, but also the other way around

Reference, date                                                                                          8
Strong Authentication on computers
 What is “Strong Authentication” ?
       Multifactor
       Mutual
       Secure
 Digital certificates on smart cards/tokens enable all three
       Only solution today
 Remaining issues
       Strong but not absolute binding with user (lending of smart card)
       Potential day to day issues
              – Lost cards
              – Blocked cards
 Enter biometrics
       Enables 3rd factor if needed
       Makes it more convenient!
       Boosts user adoption



Reference, date                                                             9
Agenda


                           Gemalto introduction

                     Computer Authentication Solutions

                         Biometrics on Computers

                  Smart Card, Biometrics and Convenience




Reference, date
Biometrics and Identity
       “Any distinguishing element of a physical person/entity that can be
                              considered as unique”
 Remains constant over time – mostly
 Public – most of the time
 Difficult to revoke
 Sensitive – cultural bias

                  → Needs to be considered carefully before using!


 Principle of Psychological Acceptability:

 A security mechanism should not make accessing a resource, or
 taking some action more difficult than it would be if security
 mechanism were not present.

Reference, date                                                              11
What type of biometrics ?

 Linked to
        User acceptance
        Technology maturity
        Performance
 Fingerprint recognition is the only prevalent type of biometrics
  on regular computers
        Does not mean other types won't catch up quickly!
        Swipe readers are now common




                                                              Source: JF Mainguet

Reference, date                                                                     12
Fingerprint authentication
 Good maturity – standards and evaluation campaigns
 Large-scale deployments – National ID schemes
 Good user acceptance
 Can be achieved in “Match On Card” mode
 Performance is a tradeoff between:
       Quality (FAR) – Typical figures are well below 0.001%
       Convenience (FRR) – Typical figures are below 2%
       Accessibility (FTE) – Below 1%




Reference, date                                                 13
Biometrics on computers
 Almost all corporate notebook brands embed a fingerprint
  reader either as option or standard
 Mostly swipe readers, varying quality
 Surface readers emerging
       Government standards (FIPS201) as driver
 61 Million fingerprint readers to be shipped in 2009
       Cumulative 300 Million to date
       (F&S WW Silicon Chip fingerprint market, 2007)




Reference, date                                              14
Biometrics and regulations
 The use of biometrics needs to take local regulations into
  account
       CNIL in France
       European data privacy directives (data protection working party Art 29)
       UK Data Protection Act
 Regulations mostly require
       Justification of means
       Appropriate protection of biometric data




Reference, date                                                                   15
Biometric Technologies : Reliability vs Convenience



                             +       Iris/Retina

                                                   Fingerprint

                                            Hand
                                                       Face

 Signature                                     Voice

             Gait
 Keystroke                   -
 +   User friendliness   -       -   User friendliness   +
       Behavioral                     Physiological
                                                                 16
Fingerprint Recognition

  Strengths
     Long experience
     Good user acceptance
     Good reliability
     Easy to use


  Weaknesses
     Criminality-related image
     Leaves traces (latent prints)




                                      17
Agenda


                           Gemalto introduction

                     Computer Authentication Solutions

                         Biometrics on Computers

                  Smart Card, Biometrics and Convenience




Reference, date
Merging Biometrics & Smart Card

  Mutual & Strong authentication
         Using X509 certificates
  Portable device
         Personal, linked to user, “regulator friendly”
         Biometrics establish a strong link to user
         Multifactor security
  Convenience
         User adoption
  Evolutivity
         Can adapt to rapidly evolving technology




 Reference, date                                           19
Existing implementations
 Standalone Match On Card not linked to certificates
       Used with ad hoc software
       Standalone 3rd authentication factor
       Can be used for identification purposes
 Standalone Match On Card protecting PIN code and credential
  storage
       Enables biometric-protected credential storage
       Enables biometric-protected PKI certificate usage by PIN replay
 Match Off Card with fingerprints stored on card
       Compatible with every existing PKI smart card
       “Regulator-friendly”
       Enables both credential storage & PKI cert usage by PIN replay
 PKI Smart card accepting PIN and/or Match On Card
       Most secure implementation
       Enables card-enforced authentication policy (2 to 3 factor)



Reference, date                                                           20
Current limitations and way forward
   OS Architecture can lead to limitations
           MS Crypto API was not written for anything else than PIN code
           Even though there are openings in future Windows versions
   Practical Workarounds are available
           PKCS#11 API has better support for biometrics natively
           Wrappers for ill-behaving applications are possible
   Most important limitation
           A lof of software assumes the use of PIN code for smart cards
   Practical approach
           Test and validation !
                          PIN or Fingerprint Authentication


                            Biometric Verification
                            Please swipe your finger OR enter your PIN



                                             Biometric Authentication
                                             SWIPE FINGER

                                             PIN Authentication
                                              PIN

                                    Select Finger             Click here for more information


                                                                         OK           Cancel
Reference, date                                                                                 21
Why Smart Card with Biometrics?

  Provides «Something you have» to the authentication scheme
      & smart card PIN code provides «something you know»
  Provides privacy
      No centralized database
      You carry your own biometric template
  Provides trust between Authority & End User
      Mutual authentication
  Provides simplification of operations
      One to one matching




                                                                23
Process : Template Extraction & Storage




                                          24
Process : Matching




                     25
Pin vs Bio

         PinCode                  Biometrics
           
           Secret                    
                                     Public

          
          Modifiable                  
                                  Fixed (Template)

           
          Delegation                 
                                   No delegation

          
      Exhaustive attacks             
                                    Not possible

          
       Perso very easy              Very  
                                      difficult
      Match very 
            simple              Match not 
                                       trivial

Very efficient counter measures
(for example against physical &
                                  
                                     Not Yet
        logical attacks)


                                                     27
Conclusion : Smart Cards / Biometrics ?
 Smart-Card + PIN & Biometrics have to be considered as
  complementary technologies.


 Smart cards & pin-code need Biometrics
    Card holder authentication
    Non repudiable transaction


 Biometrics need Smart cards & pin-code
    Privacy
    Large volume opportunity
    Simplification : One to One matching


 The ultimate solution :
             Smart card & Pin-code + Biometrics + PKI

                                                           28
THANK YOU

More Related Content

What's hot

DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Accenture - Innovation at Work
Accenture - Innovation at WorkAccenture - Innovation at Work
Accenture - Innovation at WorkRobert Casselman
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Strong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerceStrong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commercenathconsult
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief Mestizo Enterprises
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionSymantec
 
New Science Transaction Security Journal
New Science Transaction Security JournalNew Science Transaction Security Journal
New Science Transaction Security JournalUL
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationOKsystem
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?John ILIADIS
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hatgopikurup
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformRamesh Nagappan
 

What's hot (20)

DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Accenture - Innovation at Work
Accenture - Innovation at WorkAccenture - Innovation at Work
Accenture - Innovation at Work
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Strong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerceStrong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerce
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
Report
ReportReport
Report
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
 
New Science Transaction Security Journal
New Science Transaction Security JournalNew Science Transaction Security Journal
New Science Transaction Security Journal
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hat
 
Nxtd
NxtdNxtd
Nxtd
 
Currency
CurrencyCurrency
Currency
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
 
Digital Cash Overview
Digital Cash OverviewDigital Cash Overview
Digital Cash Overview
 

Similar to SmartCard Forum 2009 - New trends in smart-cards technology

Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint RecognitionSecurity Session
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...Edge AI and Vision Alliance
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
The challenges of making data secure
The challenges of making data secureThe challenges of making data secure
The challenges of making data secureLudovic Tant
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 

Similar to SmartCard Forum 2009 - New trends in smart-cards technology (20)

Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
The challenges of making data secure
The challenges of making data secureThe challenges of making data secure
The challenges of making data secure
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 

More from OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíOKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securityOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?OKsystem
 

More from OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

SmartCard Forum 2009 - New trends in smart-cards technology

  • 1. Smart Card Forum May 21st, 2009 New trends in smart-cards technology
  • 2. Agenda Gemalto introduction Computer Authentication Solutions Biometrics on Computers Smart Card, Biometrics and Convenience Reference, date
  • 3. Making people’s everyday interactions with the digital world secure and easy Gemalto provides end-to-end solutions for digital security, from the development of software applications, through the design and production of secure personal devices such as smart cards, e-passports and secure tokens, to the deployment of managed services for our customers Reference, date
  • 4. Introducing Gemalto World Leader: Key figures: • World’s #1 for SIM (2)  € 1.7 billion revenue 2008 • World’s #1 for chip payment cards (3)  Innovation investment:  10 R&D sites worldwide • World’s #1 reference for e-passports (4)  1,300 engineers • World’s #1 install-base of over-the-air  Global footprint: (OTA) platforms for GSM networks (5)  19 production sites  31 personalization centers • Pioneer and patent holder of high-speed  85 sales & marketing offices SIM for mobile Internet, multimedia and mobile contactless applications  Experienced team:  10,000 employees • Pioneer of the .NET card, the first  90 nationalities Microsoft Vista compatible smart card  40 countries solution Source: (1) Gartner 2006; (2) Frost & Sullivan 2006; (3) The Nilson Report 2007; (4) Keesing Journal of Identity 2007; (5) Gemalto 2007 Reference, date
  • 6. Agenda Gemalto introduction Computer Authentication Solutions Biometrics on Computers Smart Card, Biometrics and Convenience Reference, date
  • 7. Computer Authentication Solutions  There are many ways to authenticate to a computer:  Username/Password  Tokens storing credentials  Tokens storing digital certificates  Biometrics unlocking credentials or digital certificates stored on PC  Dynamic passwords (OTP), challenge & response  ... to name a few  Multifactor is recognised as necessary  Something you know, something you are, something you own  Simplicity is key  Complex solutions lead users to look for shortcuts!  Strong link to users is necessary  Avoid credential passing/borrowing  Enables non-repudiation Reference, date 7
  • 8. The need for strong authentication  High profile cases  UK aide to Gordon Brown gets blackberry stolen – http://www.timesonline.co.uk/tol/news/politics/article4364353.ece – “Downing Street BlackBerrys are password-protected but security officials said most are not encrypted”  FBI loses 3-4 laptops a month (2007) – AP, http://www.msnbc.msn.com/id/17115660/ – “"Perhaps most troubling, the FBI could not determine in many cases whether the lost or stolen laptop computers contained sensitive or classified information”  Regulatory compliance  Non repudiation  Strong Authentication is an enabler  High mobility  Home office  Trust management  Real Strong authentication is mutual!  Not only user to computer/network, but also the other way around Reference, date 8
  • 9. Strong Authentication on computers  What is “Strong Authentication” ?  Multifactor  Mutual  Secure  Digital certificates on smart cards/tokens enable all three  Only solution today  Remaining issues  Strong but not absolute binding with user (lending of smart card)  Potential day to day issues – Lost cards – Blocked cards  Enter biometrics  Enables 3rd factor if needed  Makes it more convenient!  Boosts user adoption Reference, date 9
  • 10. Agenda Gemalto introduction Computer Authentication Solutions Biometrics on Computers Smart Card, Biometrics and Convenience Reference, date
  • 11. Biometrics and Identity “Any distinguishing element of a physical person/entity that can be considered as unique”  Remains constant over time – mostly  Public – most of the time  Difficult to revoke  Sensitive – cultural bias → Needs to be considered carefully before using! Principle of Psychological Acceptability: A security mechanism should not make accessing a resource, or taking some action more difficult than it would be if security mechanism were not present. Reference, date 11
  • 12. What type of biometrics ?  Linked to  User acceptance  Technology maturity  Performance  Fingerprint recognition is the only prevalent type of biometrics on regular computers  Does not mean other types won't catch up quickly!  Swipe readers are now common Source: JF Mainguet Reference, date 12
  • 13. Fingerprint authentication  Good maturity – standards and evaluation campaigns  Large-scale deployments – National ID schemes  Good user acceptance  Can be achieved in “Match On Card” mode  Performance is a tradeoff between:  Quality (FAR) – Typical figures are well below 0.001%  Convenience (FRR) – Typical figures are below 2%  Accessibility (FTE) – Below 1% Reference, date 13
  • 14. Biometrics on computers  Almost all corporate notebook brands embed a fingerprint reader either as option or standard  Mostly swipe readers, varying quality  Surface readers emerging  Government standards (FIPS201) as driver  61 Million fingerprint readers to be shipped in 2009  Cumulative 300 Million to date  (F&S WW Silicon Chip fingerprint market, 2007) Reference, date 14
  • 15. Biometrics and regulations  The use of biometrics needs to take local regulations into account  CNIL in France  European data privacy directives (data protection working party Art 29)  UK Data Protection Act  Regulations mostly require  Justification of means  Appropriate protection of biometric data Reference, date 15
  • 16. Biometric Technologies : Reliability vs Convenience + Iris/Retina Fingerprint Hand Face Signature Voice Gait Keystroke - + User friendliness - - User friendliness + Behavioral Physiological 16
  • 17. Fingerprint Recognition  Strengths  Long experience  Good user acceptance  Good reliability  Easy to use  Weaknesses  Criminality-related image  Leaves traces (latent prints) 17
  • 18. Agenda Gemalto introduction Computer Authentication Solutions Biometrics on Computers Smart Card, Biometrics and Convenience Reference, date
  • 19. Merging Biometrics & Smart Card  Mutual & Strong authentication  Using X509 certificates  Portable device  Personal, linked to user, “regulator friendly”  Biometrics establish a strong link to user  Multifactor security  Convenience  User adoption  Evolutivity  Can adapt to rapidly evolving technology Reference, date 19
  • 20. Existing implementations  Standalone Match On Card not linked to certificates  Used with ad hoc software  Standalone 3rd authentication factor  Can be used for identification purposes  Standalone Match On Card protecting PIN code and credential storage  Enables biometric-protected credential storage  Enables biometric-protected PKI certificate usage by PIN replay  Match Off Card with fingerprints stored on card  Compatible with every existing PKI smart card  “Regulator-friendly”  Enables both credential storage & PKI cert usage by PIN replay  PKI Smart card accepting PIN and/or Match On Card  Most secure implementation  Enables card-enforced authentication policy (2 to 3 factor) Reference, date 20
  • 21. Current limitations and way forward  OS Architecture can lead to limitations  MS Crypto API was not written for anything else than PIN code  Even though there are openings in future Windows versions  Practical Workarounds are available  PKCS#11 API has better support for biometrics natively  Wrappers for ill-behaving applications are possible  Most important limitation  A lof of software assumes the use of PIN code for smart cards  Practical approach  Test and validation ! PIN or Fingerprint Authentication Biometric Verification Please swipe your finger OR enter your PIN Biometric Authentication SWIPE FINGER PIN Authentication PIN Select Finger Click here for more information OK Cancel Reference, date 21
  • 22. Why Smart Card with Biometrics?  Provides «Something you have» to the authentication scheme  & smart card PIN code provides «something you know»  Provides privacy  No centralized database  You carry your own biometric template  Provides trust between Authority & End User  Mutual authentication  Provides simplification of operations  One to one matching 23
  • 23. Process : Template Extraction & Storage 24
  • 25. Pin vs Bio PinCode Biometrics  Secret  Public  Modifiable  Fixed (Template)  Delegation  No delegation  Exhaustive attacks  Not possible  Perso very easy Very    difficult Match very    simple Match not    trivial Very efficient counter measures (for example against physical &   Not Yet logical attacks) 27
  • 26. Conclusion : Smart Cards / Biometrics ?  Smart-Card + PIN & Biometrics have to be considered as complementary technologies.  Smart cards & pin-code need Biometrics  Card holder authentication  Non repudiable transaction  Biometrics need Smart cards & pin-code  Privacy  Large volume opportunity  Simplification : One to One matching  The ultimate solution : Smart card & Pin-code + Biometrics + PKI 28