This document discusses authentication and security across devices, operating systems, applications, and networks. It covers a variety of authentication mechanisms like fingerprints, facial recognition, PINs, and security hardware. It also discusses the FIDO protocol for passwordless authentication and its ability to securely authenticate users across different devices and applications. The growing number of connected devices makes scalable authentication a challenge, but solutions like FIDO aim to simplify authentication without compromising security.
Leveraging Fingerprint Verification on Mobile DevicesNok Nok Labs, Inc
Brendon Wilson, Director, Product Management and Dr William J. Blanke, Mobile Lead Architect, Nok Nok Labs share information the recently introduced Touch ID API and its implications for a mobile authentication strategy. This session also looks at other smartphone and tablet-based authentication solutions, plus the FIDO protocols.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
Leveraging Fingerprint Verification on Mobile DevicesNok Nok Labs, Inc
Brendon Wilson, Director, Product Management and Dr William J. Blanke, Mobile Lead Architect, Nok Nok Labs share information the recently introduced Touch ID API and its implications for a mobile authentication strategy. This session also looks at other smartphone and tablet-based authentication solutions, plus the FIDO protocols.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
VoIP android mobile dialer is the application that allows the people to use their Android phones to connect to landlines and mobile phones across the internet.
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
In this talk, we will unveil the new in-house capabilities of a nation state actor who has been observed deploying both Android and iOS surveillance tooling, known as Stealth Mango and Tangelo. The actor behind these offensive capabilities has successfully compromised the devices of government officials and military personnel in numerous countries with some directly impacting Western interests. Our research indicates this capability has been created by freelance developers who primarily release commodity spouse-ware but moonlight by selling their own custom surveillanceware to state actors. One such state actor has been observed deploying Stealth Mango and this presentation will unveil the depth and breadth of their campaigns, detailing not only how we watched them grow and develop, test, QA, and deploy their offensive tooling, but also how operation security mistakes ultimately led to their attribution.
Top Biometric Identifiers: Risks & RewardsVeridium
The weakest link in data security can never be fully addressed until we have reliable methods of user authentication. In this webinar we will discuss five different biometric identifiers (single fingerprint, four fingers, voice, face, iris), their level of accuracy and usability, and the privacy and security risks associated with each of them.
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
The Privilege of Android™ Privacy: How PRIV™ Safeguards Your Data
This 10-page guide provides an overview of PRIV's key security components and explains what makes it secure and how it protects your privacy.
PRIV combines the superior privacy and security you’ve come to expect from BlackBerry with the flexibility of Android’s ecosystem and apps. It protects your mobile experience from the device level up to the application level, and offers a powerful suite of tools through which you can take charge of your private data. The end result is a device that you can trust will offer you better protection from threats against your apps, networks, and – most importantly – personal information.
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina EhrensvardCloudIDSummit
While hardware MFA is a well-understood concept, what in the past prevented it from winning mainstream consumer and enterprise appeal? Why are next-gen hardware MFA options flirting with that mass appeal? How has the technology changed and how is the current computing environment different?
What old-school weaknesses have been minimized or solved already by modern innovation, and what challenges remain for wide-spread adoption?
How have recent breaches renewed interest? Going forward, what sort of innovation is on the horizon and how might it prevent another adoption barrier around hardware MFA?
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
Fingerprints are one of the most common, easy to use biometric for authentication. With advances in smartphone technology, companies are innovating beyond Touch ID to new biometric capture methods. In this webinar, we discuss the state of mobile biometrics, 4 Fingers technology, and the future of contactless fingerprints.
Moxtra is a power communication platform for real time engagement. Moxtra SDK allows any application on any device to integrate Moxtra capabilities to drive real time engagement of users with just few lines of code.
Integrating Moxtra into your consumer app brings new level of engagement and stickiness to your app and help with adoption, usage and virality.
Integrating Moxtra into your business app allows your app users to engage with other users right from your apps to get things done.
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
When applying multi-factor authentication to your organization, it is highly important to cover all use cases. PingID’s set of integrations, together with PingFederate’s, PingOne’s and PingAccess’ provide you with a wider applications coverage. Come learn about the new enterprise grade VPN, Remote access and SSH integrations and see how easy it is to roll out. In addition, new user authentication methods will be introduced, both mobile App oriented and non-mobile. So all your users can be secured, the easy way.
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Overview and insights into some of the building blocks that make a modern security and authentication stack work and
why we should be optimistic about our ability to transform
authentication in particular and security in general as these
platforms grow and evolve, in light of the building blocks
provided by modern mobile operating systems and hardware for crafting a robust authentication implementation.
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
In this talk, we will unveil the new in-house capabilities of a nation state actor who has been observed deploying both Android and iOS surveillance tooling, known as Stealth Mango and Tangelo. The actor behind these offensive capabilities has successfully compromised the devices of government officials and military personnel in numerous countries with some directly impacting Western interests. Our research indicates this capability has been created by freelance developers who primarily release commodity spouse-ware but moonlight by selling their own custom surveillanceware to state actors. One such state actor has been observed deploying Stealth Mango and this presentation will unveil the depth and breadth of their campaigns, detailing not only how we watched them grow and develop, test, QA, and deploy their offensive tooling, but also how operation security mistakes ultimately led to their attribution.
Top Biometric Identifiers: Risks & RewardsVeridium
The weakest link in data security can never be fully addressed until we have reliable methods of user authentication. In this webinar we will discuss five different biometric identifiers (single fingerprint, four fingers, voice, face, iris), their level of accuracy and usability, and the privacy and security risks associated with each of them.
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
The Privilege of Android™ Privacy: How PRIV™ Safeguards Your Data
This 10-page guide provides an overview of PRIV's key security components and explains what makes it secure and how it protects your privacy.
PRIV combines the superior privacy and security you’ve come to expect from BlackBerry with the flexibility of Android’s ecosystem and apps. It protects your mobile experience from the device level up to the application level, and offers a powerful suite of tools through which you can take charge of your private data. The end result is a device that you can trust will offer you better protection from threats against your apps, networks, and – most importantly – personal information.
CIS 2015-Can Hardware MFA Move from Meh to Aha?- Stina EhrensvardCloudIDSummit
While hardware MFA is a well-understood concept, what in the past prevented it from winning mainstream consumer and enterprise appeal? Why are next-gen hardware MFA options flirting with that mass appeal? How has the technology changed and how is the current computing environment different?
What old-school weaknesses have been minimized or solved already by modern innovation, and what challenges remain for wide-spread adoption?
How have recent breaches renewed interest? Going forward, what sort of innovation is on the horizon and how might it prevent another adoption barrier around hardware MFA?
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
Fingerprints are one of the most common, easy to use biometric for authentication. With advances in smartphone technology, companies are innovating beyond Touch ID to new biometric capture methods. In this webinar, we discuss the state of mobile biometrics, 4 Fingers technology, and the future of contactless fingerprints.
Moxtra is a power communication platform for real time engagement. Moxtra SDK allows any application on any device to integrate Moxtra capabilities to drive real time engagement of users with just few lines of code.
Integrating Moxtra into your consumer app brings new level of engagement and stickiness to your app and help with adoption, usage and virality.
Integrating Moxtra into your business app allows your app users to engage with other users right from your apps to get things done.
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
When applying multi-factor authentication to your organization, it is highly important to cover all use cases. PingID’s set of integrations, together with PingFederate’s, PingOne’s and PingAccess’ provide you with a wider applications coverage. Come learn about the new enterprise grade VPN, Remote access and SSH integrations and see how easy it is to roll out. In addition, new user authentication methods will be introduced, both mobile App oriented and non-mobile. So all your users can be secured, the easy way.
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
Rajiv Dholakia, Nok Nok Labs
Overview and insights into some of the building blocks that make a modern security and authentication stack work and
why we should be optimistic about our ability to transform
authentication in particular and security in general as these
platforms grow and evolve, in light of the building blocks
provided by modern mobile operating systems and hardware for crafting a robust authentication implementation.
JS Fest 2019. Sebastian Golasch. The Universal Serial WebJSFestUA
As a web developer it´s easy to feel intimidated by the world of hardware hacking and the physical web, we have to leave our comfort zone and need to get familiar with a completely new development environment. But not anymore, thanks to wonderful possibilities that the WebUSB Api brings to our browsers.
In this talk I will give an intro to the endless wonders we can encounter in the hardware world through our browser windows. Aside from leaerning the basics of USB and serial port communication, we´ll paint on USB displays, live tweet to receipt printers, control an Arduino, steal data from Android phones and many more… The only limit is your imagination.
The Web of Things - The story of a browser escaping into the physical world
A deep dive into the world of Web USB, the Serial port protocol & everything in-between.
Mobile Security: A Glimpse from the TrenchesYair Amit
Hackers today apply covert and persistent techniques to attack mobile devices. In this presentation, Yair Amit, CTO & Founder of Skycure, talks about the latest threats on mobile devices. Mr. Amit describes and demonstrates emerging mobile security threats: from physical, through network and up to application level.
Presentation on topics beyond the conventional ethical hacking , discusses job factors and scope in the security field :) this was presented in LPU (Lovely Professional University) as a Seminar with attendees over 200. Meet m e at FB if u want it fb/nipun.jaswal
An overview of the technology options for adding speech to web applications. It covers the HTML5 Speech Input API for speech recognition, using the Audio tag with 3rd party APIs for text-to-speech, and an overview of WebRTC application possibilities.
Presented at the Atlanta Ruby Users Group meeting on November 13, 2013.
Content without Borders: How Ontologies Help You Provide Customers with Acces...LavaConConference
Within an organization, each department uses their own content tools and formats. How to put them together into an interconnected web of knowledge that customers can navigate? We’ll discuss how an ontology can become a tool independent knowledge model connecting department-level content. We’ll see how through the web of semantic relationships, customers can start, for example, from a troubleshooting procedure written by technical writers, continue to an instructional video created by trainers, and get to best practices prepared by marketers.
In this session, attendee’s will learn:
What’s the difference between taxonomy and ontology?
How an ontology defines the knowledge model of a domain
How an ontology links a semantic model of the domain with the actual knowledge about the domain regardless of the format in which the content is created
How an ontology makes information created by different departments in different formats an interconnected web of knowledge
How to visualize ontologies
How ontologies help you discover how seemingly unrelated issues are interconnected and affect each other
How customer-facing intelligent applications, such as chatbots or customer portals, can use the ontology
How to build an ontology: where to start and what tools to use
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
The Cloud Identity Summit was founded by Ping Identity with support from industry leaders in 2010 to bring together the brightest minds across the identity and security industry. Today the event is recognized as the world’s premier identity industry conference and includes tracks from industry thought leaders, CIOs and practitioners. Cloud Identity Summit serves as a multi-year roadmap to deploy solutions that are here today but built for the future. For more info, go to www.cloudidentitysummit.com.
Be apart of the convo on Twitter: @CloudIDSummit + #CISNOLA
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
In an ever interconnected and inter-reliant world, the state of security has been a cause for deep pessimism. In the midst of all the gloom, there is good cause for optimism.
With some fits and starts, the building blocks for transforming mobile security are taking shape at every level from the processor, to the chipset to special purpose hardware to operating systems and protocols that address use cases from device integrity to user authentication to payments.
How do we think about security, privacy, identity and authentication in this world? This talk will provide a rapid overview of some selected building blocks and some practical examples that are now deployed at scale to illustrate the coming wave and how you as a practitioner or customer can participate and position yourself for maximum benefit.
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
Does anybody remember seeing a big red button with the word “PANICK!” written on it? I know it was around here somewhere. Also, there’s all these cats running pell-mell around the place, can someone give me a hand in herding them?
In this real-world case study, come and learn how a Fortune 100 with a diverse and extremely mobile work-force was able to turn up strong authentication protections for our critical cloud resources, and how the IT department lived to tell the tale. You’ll hear about the technical implementation of strong authentication enforcement, and how we made key design decisions in the ongoing balancing act between security and user experience, and how we managed up-and-down the chain from executive stakeholders to the boots-on-the-ground who were being asked to join us on this new security adventure.
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
This session will review digital identity’s transition from vulnerable authentication methods and what Microsoft and others are doing to address the hard problems associated with managing and protecting digital identities.
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
You'll laugh, you'll cry, and you might even pick up a useful nugget or two listening to a real-world enterprise IT architect share the experiences of the past year trying to support his business migrating to cloud services, and sharing the lessons learned from trying to integrate 2 hybrid enterprises into a single, streamlined company. You'll hear where the cloud came through for us, and how we often had to fall back to on-prem services such as FIM, Ping Federate, and ADFS to make the glue which binds it all together.
A "from the trenches" view into how GE is using federation standards to abstract & harden our growing cloud WAM platform. Topics covered: GE's approach to OpenID Connect for cross platform authentication (web, mobile), 2) GE's API management platform for API publishing, subscription & security, 3) how the two work together, 4) lessons learned & areas for improvement.
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
The IAM program needs to align behind the shift towards ITaaS, building the platform for execution and supporting transformation and migration activities. CIOs should keep informed through a relevant IAM capability roadmap in order to make calculated decisions on where investments should be made. Ongoing investments in the IAM program are crucial in order to fill capability gaps, keep up-to-date with support and license agreements and make opportunistic progress on the strategic roadmap. In this talk, Steve discusses recent experiences and lessons learned in preparing for and pitching VMware’s CIO on enterprise IAM program initiatives.
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
Companies and researchers are exploring ways to make software and hardware development easier for the masses. Soon you will be able to build your own autonomous drone, create a sensor that assess the watering needs of your plants, and develop a cat tracking device with minimal coding and hardware skills.
What is the place of security and privacy in this exciting development?
Are we building the next generation of Internet security vulnerabilities right now?
In his talk Hannes Tschofenig will highlight challenges with Internet of Things, what role standardization plays, and what contributions ARM, a provider of microprocessor IP, is making to improve IoT security.
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
The IDaaS (identity as a service) market segment continues to grow in popularity, and the scope of its vendor's capabilities continue to grow as well. It's still not a match for everyone, however. Join identity architect Sean Deuby for an overview of the most popular IDaaS deployment scenarios, scenarios where IDaaS has a tougher time meeting customer requirements, and whether your company is likely to find its perfect IDaaS mate.
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
In the past Enterprise Mobility Management (EMM) has focused primarily on MDM, MAM and MCM. Recently there has been a lot of focus on the fourth pillar of EMM - Mobile Identity Management (MIM). This session will cover the primary use cases and discuss current solutions available for managed/un-managed, internal/public and mobile/web apps for iOS/Android devices.
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
This talk will review the breadth of the Internet of Things (IoT), the challenges of Identity Management and the IoT and the impact to Industrial Enterprise.
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
Are you in a situation where you have two business units (maybe because of a merger) that have their own Federation solutions and now you need to share access to SaaS resources among the 2 workforces. But you don't want to have to setup to separate SaaS connections to the same vendor and you want to manage this connection on premises instead of in the Cloud. We can help with that, come see how!
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
Centralized session management has long been a goal of Web Access Management systems: the idea that one session can give end users access to dozens of protected applications with a seamless SSO experience, and terminating it (either by the end user themselves, or by an administrator) cuts off access instantly. It’s a nice dream isn’t it? Turns out that while most WAM products claim they can do this, when deployment time comes around (especially in globally distributed organizations) serious security and scalability challenges emerge that make it unfeasible. In this “session”, come and learn our vision for deploying session management at scale and see how Ping Identity has implemented it in our Federated Access Management solution.
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
Are you asking yourself how do I take my inhouse application and make it available to internal users, partners or customers using SSO and access management technologies? Oh, and you don't want it to be a 6 month project? No problem. Come and find out how to leverage your existing investments and move to modern standards like OpenID Connect, without having to rip and replace infrastructure. Learn the capabilities and tradeoffs you can make to deploy the right level of identity and access management infrastructure to match your security needs.
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
Devices need owners, people need confidence in device authenticity, data needs to persist in systems long after devices change hands, and access needs to be authorized selectively. That's a lot to ask; even if emerging web identity and security technologies are simpler than the models of yesteryear, IoT devices have complicating limitations when it comes to processing power, memory, user interface, and connectivity. But many use cases span web and IoT environments, so we must try! What are the specific requirements? What elements of web technologies can we borrow outright? What elements may need tweaking?
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
We're all more conscious than we were 2 years ago, about how much data is collected about us, and how revealing it can be. The commercial and government direction of travel is clear: more data, more mining, more monetization. And if personal data fuels the information economy, who'd want to stop that? But can we get the economic benefits, without selling our digital souls in the process?
- Is there a data equivalent to the ""polluter pays"" principle? And if not, is there an alternative?
- Ethical data handling sounds great in principle, but can it be practical?
- How can organizations put ethical data handling into practice?
2. SECURITY IN PERSPECTIVE:
Its like drinking water from the tap in 1800s
NOK NOK LABS 2
Pills, Potions & Spells vs. Chlorination
3. PURPOSE OF SECURITY
Device Integrity Network Integrity
OS & App Integrity User Integrity
Data & Transaction
Integrity
(and Privacy where appropriate)
3
4. SECURITY NEEDS TO SPAN LINKS
4
Integrity
User Hardware OS/App Network Service
NOK NOK LABS
18. BUILDING AUTHENTICATORS: THREE PROFILES
18
RichOS#
Trusted#
Execu@on#
Environment#
Secure#Element#
Soeware#and#Tamper>Resistant#Hardware#
Cost#to#Acquire#and#Manage#Tokens# Stronger#
Soeware#&#Hardware#
Cost#to#Acquire#and#Manage#Mobile#Device# Stronger#
Soeware#Only#
No#extra#cost# Strong#
NOK NOK LABS
19. A UNIQUE OPPORTUNITY
19
Hardware Integrity
OS Integrity
App Integrity
Network Integrity
User Integrity
Re-Architect
Computing Using
Hardware-Based Trust
Chain of Trust
Trusted Platform for Authentication
NOK NOK LABS
20. SUPPORT IN THE FABRIC
• QualcommshippingFIDOsupportinSnapDragon
chipsetsstartingDec2014
• Microsoftdeclares inFeb2015FIDOsupportcoming
toWindows10andaffiliatedservices
• GoogleintendstobringbiometricAPIs&system
keychaintoAndroidM–June2015
• ApplecontinuingtosupportTouchID&system
keychaininiOS–2014-2015
NOK NOK LABS 20
21. FIDO-CAPABLEMOBILE,TABLET+PCFORECAST
Non-FIDO
FIDO iOS
FIDO Android
FIDO Windows
35#Million,#Aug.#2014#
2.5&Billion,&Dec.&2019&User#Growth#of#70.43%#over#5#
Years#
2016 201920182017
86.73% 93.43% 96.98% 98.61%
6.57%
3.02% 1.39%
2.6BTotal Devices
2.5B Fido Capable
331M iOS Devices
1.1B Android Devices
1.16B Windows Devices
2.08B Total Devices
1.8B Fido Capable
281M iOS Devices
793M Android Devices
724M Windows Devices
2.19B Total Devices
2.05B Fido Capable
298M iOS Devices
945M Android Devices
805M Windows Devices
2.36B Total Devices
2.29B Fido Capable
315M iOS Devices
942M Android Devices
1.04B Windows Devices
13.27%
NOK NOK LABS
23. ONLINEAUTHENTICATIONFORDOCOMOSERVICES
Biometric Authentication from DOCOMO, May 26, 2015
Online#authen@ca@on#using#biometric#informa@on:#
Authen@ca@on#for#docomo#ID#and#carrier#billing#payments
Password>less#biometric#
authen@ca@on
Iris Fingerprint login
Unlock#
devices#
payments#
24. 24
Everything
Authenticates
50 Billion
Connected Devices by 2020:
Internet of Things
People Devices Ecosystems
+ +
Corporate Networks
Mobile Commerce
Mobile Payments
Social Networks
eHealth
Consumer Use Cases
Enterprise Use Cases
HOPEFORSCALINGAHIGHLYCONNECTEDWORLD
NOK NOK LABS
25. Any Device.
Any Application.
Any Authenticator.
25
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
27. BENEFITSOFTHEFIDOAPPROACH
27
PrivacySecurityUser
Experience
AuthenticateAuthenticate
Requirements for next generation authentication
Public/private keys
instead of passwords
Fraud Reduction
Unified Auth
Infrastructure#
Natural and faster
authentication
Use authentication method
of choice
User& Device& Service&
User information stays
on device
Not stored on servers
that can be
compromised
Cost
Standards -Based
Adaptable infrastructure
Future-proofed and
flexible
Scalability
NOK NOK LABS