Brendon Wilson, Director, Product Management and Dr William J. Blanke, Mobile Lead Architect, Nok Nok Labs share information the recently introduced Touch ID API and its implications for a mobile authentication strategy. This session also looks at other smartphone and tablet-based authentication solutions, plus the FIDO protocols.
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Overview and insights into some of the building blocks that make a modern security and authentication stack work and
why we should be optimistic about our ability to transform
authentication in particular and security in general as these
platforms grow and evolve, in light of the building blocks
provided by modern mobile operating systems and hardware for crafting a robust authentication implementation.
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
In an ever interconnected and inter-reliant world, the state of security has been a cause for deep pessimism. In the midst of all the gloom, there is good cause for optimism.
With some fits and starts, the building blocks for transforming mobile security are taking shape at every level from the processor, to the chipset to special purpose hardware to operating systems and protocols that address use cases from device integrity to user authentication to payments.
How do we think about security, privacy, identity and authentication in this world? This talk will provide a rapid overview of some selected building blocks and some practical examples that are now deployed at scale to illustrate the coming wave and how you as a practitioner or customer can participate and position yourself for maximum benefit.
Smart Alarm System in Kenya
Monitor, Connect and Control your alarm system from anywhere in the world from your smartphone.
With smart automation feature easyLive Alarm is the smartest alarm system you can have for your home or business in Kenya
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Overview and insights into some of the building blocks that make a modern security and authentication stack work and
why we should be optimistic about our ability to transform
authentication in particular and security in general as these
platforms grow and evolve, in light of the building blocks
provided by modern mobile operating systems and hardware for crafting a robust authentication implementation.
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
In an ever interconnected and inter-reliant world, the state of security has been a cause for deep pessimism. In the midst of all the gloom, there is good cause for optimism.
With some fits and starts, the building blocks for transforming mobile security are taking shape at every level from the processor, to the chipset to special purpose hardware to operating systems and protocols that address use cases from device integrity to user authentication to payments.
How do we think about security, privacy, identity and authentication in this world? This talk will provide a rapid overview of some selected building blocks and some practical examples that are now deployed at scale to illustrate the coming wave and how you as a practitioner or customer can participate and position yourself for maximum benefit.
Smart Alarm System in Kenya
Monitor, Connect and Control your alarm system from anywhere in the world from your smartphone.
With smart automation feature easyLive Alarm is the smartest alarm system you can have for your home or business in Kenya
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
FIDO U2F (Universal Authentication Framework) Specifications: Overview & Tutorial
by Jerrod Chong, Yubico
Explore how FIDO U2F works and how it is used in the world today.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
The rise in mobile and cloud computing continue to drive the urgent need to rethink whether authentication is fit for purpose. The Mobile Network Operators (MNO) are well positioned to participate in this evolution, by enabling the secure storage of credentials within the SIM and delivering authentication-driven services to their business customers.
These slides cover:
- The respective roles of the FIDO Alliance, The Organization for the Advancement of Structured Information Standards (OASIS) and The OpenID Foundation;
- GSMA’s Mobile Connect program which supports the use of mobile devices for authentication purposes;
- The benefits of Nok Nok’s FIDO Ready™ technology for the MNO
Torsten Meister
Touchless Biometric System
http://www.security-session.cz
Přednáška: Touchless Fingerprint Recognition
The lesson given by Mr. Torsten Meister (Touchless Biometric System) will cover the topic of fingerprint recognition based on touchless fingerprint acquirement. Closer details of this technology will be explained and practical issues will be discussed.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
Google Case Study: Becoming UnphishableFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
FIDO UAF (Universal Second Factor Framework) Specifications: Overview & Tutorial
by Todd Thiemann, Nok Nok Labs
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
Security from the cloud is challenging traditional approaches. As organizations transition from perimeter-based security towards user-centric approaches, Security and Risk professionals are transitioning to cloud IAM services or IDaaS (Identity as a Service) to manage identities across cloud environments. By overcoming the limitations of legacy on-premises IAM solutions, organizations are accelerating SaaS adoption, increasing user productivity and recognizing greater returns on their cloud investments.
View our slides for IAM overview and learn about:
• Trends in cloud, and the standards to support them
• State of Identity, Digital Trust, Authentication and Access
• Directory Services and Federation
• SSO (Desktop SSO, Web SSO, and Mobile SSO)
• Automating Onboarding Practices, Provisioning and Deprovisioning
Watch the on-demand webinar here: https://www.brighttalk.com/channel/12923/onelogin?utm_source=brighttalk
FIDO U2F (Universal Authentication Framework) Specifications: Overview & Tutorial
by Jerrod Chong, Yubico
Explore how FIDO U2F works and how it is used in the world today.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
The rise in mobile and cloud computing continue to drive the urgent need to rethink whether authentication is fit for purpose. The Mobile Network Operators (MNO) are well positioned to participate in this evolution, by enabling the secure storage of credentials within the SIM and delivering authentication-driven services to their business customers.
These slides cover:
- The respective roles of the FIDO Alliance, The Organization for the Advancement of Structured Information Standards (OASIS) and The OpenID Foundation;
- GSMA’s Mobile Connect program which supports the use of mobile devices for authentication purposes;
- The benefits of Nok Nok’s FIDO Ready™ technology for the MNO
Torsten Meister
Touchless Biometric System
http://www.security-session.cz
Přednáška: Touchless Fingerprint Recognition
The lesson given by Mr. Torsten Meister (Touchless Biometric System) will cover the topic of fingerprint recognition based on touchless fingerprint acquirement. Closer details of this technology will be explained and practical issues will be discussed.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
Google Case Study: Becoming UnphishableFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
FIDO UAF (Universal Second Factor Framework) Specifications: Overview & Tutorial
by Todd Thiemann, Nok Nok Labs
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
Security from the cloud is challenging traditional approaches. As organizations transition from perimeter-based security towards user-centric approaches, Security and Risk professionals are transitioning to cloud IAM services or IDaaS (Identity as a Service) to manage identities across cloud environments. By overcoming the limitations of legacy on-premises IAM solutions, organizations are accelerating SaaS adoption, increasing user productivity and recognizing greater returns on their cloud investments.
View our slides for IAM overview and learn about:
• Trends in cloud, and the standards to support them
• State of Identity, Digital Trust, Authentication and Access
• Directory Services and Federation
• SSO (Desktop SSO, Web SSO, and Mobile SSO)
• Automating Onboarding Practices, Provisioning and Deprovisioning
Watch the on-demand webinar here: https://www.brighttalk.com/channel/12923/onelogin?utm_source=brighttalk
Mobile ist weiterhin ein riesiger Wachstumsgarant für Unternehmen. Mittlerweile haben die meisten Unternehmen Mobil-optimierte Webseiten.
Jetzt geht es darum, die User Experience zu verbessern und alle Effekte von Mobile zu messen – und den Wert der Interaktion für den Werbeerfolg besser zuzuordnen.
Dominik Wöber hat den Besuchern der PERFORMIX.Wien in seinem Vortrag Neuerungen vorgestellt, um die Performance KPIs zu verbessern und den Impact von Mobile zu messen.
Shmulik Ben-Shemen, Ping Identity
Demonstration of Ping Identity’s newest
solution to the Identity challenge, using
your mobile device as part of a strong
authentication solution that integrates with
Ping’s other solutions—PingFederate and
PingOne
Presentación de John Cardenas, Solution Sales South Cone, Banking & Payment en Gemalto. 33º Congreso de Marketing Financiero AMBA.
11 y 12 de septiembre de 2017
How many non-employee users do you store in your on-premise, enterprise directory? In most organizations, the answer is too many. If you need a way to authenticate customers and partners to give them access to applications, but you don't want to be in the business of storing and managing those identities yourself, we have an alternative. Come learn about PingOne's directory, a user directory available to you in the PingOne IDaaS platform.
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
When applying multi-factor authentication to your organization, it is highly important to cover all use cases. PingID’s set of integrations, together with PingFederate’s, PingOne’s and PingAccess’ provide you with a wider applications coverage. Come learn about the new enterprise grade VPN, Remote access and SSH integrations and see how easy it is to roll out. In addition, new user authentication methods will be introduced, both mobile App oriented and non-mobile. So all your users can be secured, the easy way.
The Consumerization of Authentication with iovationTransUnion
A quantum shift in authentication is already underway, where user experience takes center stage, customer expectations soar, and we realize – painfully – that the tools we’ve used to authenticate within the enterprise simply won’t cut it “beyond the firewall” where most customers live. Now it’s time to learn from it.
In this webinar, you’ll learn:
* How to move beyond outdated two-factor authentication to embrace the future of multifactor authentication
* How existing customer expectations should drive your emerging multifactor authentication strategies
* How a layered approach – interweaving different user authentication services – solves new problems
* Promising technologies: what RSA 2017 taught us about new tools we can use
Authentifusion: Clarifying the Future of User AuthenticationTransUnion
In January, PwC’s The Global State of Information Security declared its top 8 goals for 2016. Among these it asserted CISOs need to focus on “Replacing passwords with advanced authentication.” With terms like advanced authentication being thrown into a mix that already includes adaptive, contextual, behavioral, risk-based, multifactor and dozens more, it’s easy to give up and let confusion reign over the authentication space. And the idea of replacing passwords altogether? Is that even possible?
In this on demand webinar, iovation’s Michael Thelander will clarify the authentication landscape and make sense of a rapidly evolving field that brings together the needs of both information security and fraud prevention teams.
You’ll learn:
* What analysts like PwC mean by “advanced security,” and what it might provide
* Some ways password-less authentication might be achieved at scale
* How different technologies might be combined to bring to the nirvana state of “continuous authentication”
Authentifusion: Clarifying the Future of User AuthenticationKelly Colbert
In January, PwC’s The Global State of Information Security declared its top 8 goals for 2016. Among these it asserted CISOs need to focus on “Replacing passwords with advanced authentication.” With terms like advanced authentication being thrown into a mix that already includes adaptive, contextual, behavioral, risk-based, multifactor and dozens more, it’s easy to give up and let confusion reign over the authentication space. And the idea of replacing passwords altogether? Is that even possible?
In this on demand webinar, iovation’s Michael Thelander will clarify the authentication landscape and make sense of a rapidly evolving field that brings together the needs of both information security and fraud prevention teams.
You’ll learn:
* What analysts like PwC mean by “advanced security,” and what it might provide
* Some ways password-less authentication might be achieved at scale
* How different technologies might be combined to bring to the nirvana state of “continuous authentication”
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Basics of how FIDO protocols work, how they fit into the broader identity ecosystem, the benefits of the design and the state of implementation/deployment in the market; appropriate for both technical and non-technical individuals, giving orientation before diving into the details of the specific FIDO protocols.
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
The theft – over the last decade – of over 6 billion usernames, passwords, and online credentials has given hackers and fraudsters a steady supply of ammo with which to chip away at defenses. 63% of confirmed breaches in 2015 stemmed from compromised credentials and 81% of hacking-related breaches used either stolen or weak passwords (2017 Verizon Data Breach Investigations Report).
What does this tell us? That a more holistic approach is needed to stop fraud and mitigate breach risks under the GDPR. Securing customers personal data starts at login, but needs to follow customers throughout their online journey without adding friction.
Topics covered:
Secure the customer journey, while also mitigating breach risks
A no-hype overview of key provisions of the GDPR as they relate to fraud prevention
Minimizing the use of personal data while improving fraud detection
Best integration points to assess for risk and fraud
Q&A
Everyone knows that you need to provide your consumers with excellent online experiences, and that you have to do it while also protecting them against account takeovers, session hijacking and credential compromise. But very few know how to do it. Everything you do to improve the login experience for your users erodes assurance and security, right?
In this webinar, we’ll discuss Dynamic Authentication, a method of combining authentication controls in a risk-responsive, user-friendly way. You’ll learn:
* The importance of context in providing the right level of authentication for any circumstance
* The need for authentication that is continuous, throughout the user’s online journey
* How authentication tools in the consumer environment need to become complementary, supporting each other as conditions of risk or context change
We’ll discuss how device intelligence provides the risk insight that can drive authentication decisions in real time, and provide examples of customers in retail, finance and gaming verticals who are achieving this balance today.
Similar to Leveraging Fingerprint Verification on Mobile Devices (20)
4. TOUCH ID API – WHAT DOES IT DO?
4
App
1. Determine if a fingerprint
touch was recognized
2. Unlock keychain data with
successful touch
• Keychain data protected
by secure enclave
Key
Store
Secure
Enclave
5. HOW DOES THE SERVER KNOW?
THEREMOTEAUTHENTICATIONCHALLENGE
5
① Was a user successfully verified?
② Who was verified?
③ How was the user verified?
④ What assurance do we get?
?
7. LOCAL AUTHENTICATION API
7
App
Yes/No
ü Was a user successfully verified?
o Who was verified?
o How was the user verified?
o What assurance do we get?
8. PASSWORD IN IOS KEYCHAIN
8
App
ü Was a user successfully verified?
ü Who was verified?
o How was the user verified?
o What assurance do we get?
9. COOKIE IN IOS KEYCHAIN
9
App
ü Was a user successfully verified?
ü Who was verified?
o How was the user verified?
o What assurance do we get?
10. KEY IN IOS KEYCHAIN
10
App
ü Was a user successfully verified?
ü Who was verified?
o How was the user verified?
Ø What assurance do we get?
11. WHAT ABOUT OTHER DEVICES?
11
Android
52%
iOS
42%
Windows
Phone
3%
Blackberry
2%
Others
1%
Q1 ‘14
And older devices…….?
14. MFAC
UAF + IOS KEYCHAIN
14
App
ü Was a user successfully verified?
ü Who was verified?
ü How was the user verified?
ü What assurance do we get?
UAF
20. TRANSACTION CONFIRMATION
20
Initiate Transaction
Authentication Response
+ Text Hash
Validate
Response &
Text Hash
Auth Req+ Challenge +
Policy + Transaction Text
MFAS
MFAC
RelyingPartyServer
Relying
Party
App
2
4
5
Device
Relying Party
1
3
Display Text,
Authenticate User
& Unlock Key
21. The S3 Authentication Suite
21
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
24. THE DEVIL IS IN THE DETAILS
LAYEREDSECURITYMECHANISMS
24
Authenticator
MFAC
TLS Channel
ASM
App
Web Backend
MFAS
User consent
Channel binding
Key handle access token
FacetID token match
Unique Uauth keys
Uauth keys protection
Authenticator attestation
Client-side nonces
Signature counter
Transaction confirmation
Channel binding/AppID
TLS server key
FacetID list
Round-trip integrity
Server-side nonces
Authenticator metadata
Secured verifier DB
Registration confidentiality
Uauth.pub
Keys
Metadata
Service
Certified
authenti
cators
Account
secrecy
25. AVAILABLE ON THE GALAXY S5
25
50-60M Units
Expected to ship
150
Launch Countries
World’s First FIDO
Ready Smartphone
Introducing
Fingerprint Authentication
Used by
27. CONCLUSION
27
Touch ID
Authentication
Transactions
Other Authenticators
Other Devices
Inter-Device Authentication
• Touch ID API offers
local authentication
only
• Integration options
differ in levels of
authentication
integrity
• Nok Nok Labs’
solution, built on
FIDO Alliance’s UAF
offers a turnkey
robust option
29. Any Device.
Any Application.
Any Authenticator.
29
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB