SlideShare a Scribd company logo
1
T
FINGERPRINT
SEC
U
FA
BIOME
TOKEN
RBA
ACTIVE
FINGERPRINT
SECURE
ELEMENT
NFC
BIOMETRIC
PIN
RBA
SILEFINGERPRINT
ELEME
NFFACE
BIOMETRIC
TOKENACTIVE
SILE
ELEMENT
USB
FACE
PIN
TOK
RBA
PASSIVE
SILEN
FINGERPRINT
VOICEUSB
BIOMETRIC
TPM
VOICE
NFC
FACE
TPM
FINGERPRINT
NFC
USB
RBA
ACTIV
TP
FINGERPRINT
SECURE
NFC
FACE
RBA
PASSIVE
SILENT
TPM
FINGERPRINT
VOICE
ELEMENT
ACTIVE
BIOMETRIC
PIN
PASSIVE
SILENT
TPM
FINGERPRINT
SECURE
ELEMENT
NFC
PIN
TOKEN
PASSIVE
FINGERPRINT
VOICE
SECURE
E
TOKEN
R
VOICE
SECURE
NFC
TOKEN
TPM
PIN
RBA
FINGERPRINT
SECURE
NFC
USB
VOICE
NFC
PASSIVE
USB
TOKEN
PASSIVE
TPM
SECURE
ELE
FACE
BIOMETRIC
ACTIVE
SECURE
USB
ACTIVE
TPM
VOICE
NFC
USB
FACE
PIN
RBA
ACTIVE
TPM
SECURE
ELEMENT
PIN
RBA
SILENT
USB
PIN
SILENT
ELEMENT
NFC
FINGERPRINT
USB
TPM
VOICE
RBA
PASSIVE
ACTIVE
TPM
SECURE
USB
FACE
ACTIVE
VOICE
PIN
PASSIVE
TPM
FINGERPRINT
RBA
ACTIVE
TPM
ELEMENT
ACTIVE
SILENT
TPM
USB
RBA
SECURE
BIOMETRIC
PIN
SILENT
TPM
VOICE
USB
PIN
USB
FACE
BIOMETRIC
NFC
TOKEN
RBA
PIN
RBA
SILENT
FACE
RBA
PASSIVE
ACTIVE
SILENT
TPM
FINGERPRINT
RBA
ACTIVE
TPM
TOKEN
ACTIVE SILENT
VOICE
USB
FACE
PIN
RBA
ACTIVE
SILENT
RBA
VOICE
NFC
USB
ACTIVE
TPM
BIOMETRIC
TOKENTPM
FACE
TOKEN
PASSIVE
PIN
TPM
TPM
FACE
TPM
FACE
PASSIVE
SILENT
BIOMETRIC
SECURE
PIN
PASSIVE
SILENT
VOICE
USB
PIN
TOKEN
PASSIVE
NFC
BIOMETRIC
RBA
SILENT
TPM
SECURE
VOICE
USB
USB
FACE
SILENT
SECURE
PIN
SILENT
ELEMENT
USB
FACE
VOICE
USB
SECURE
FACE
PIN
FINGERPRINT
SILENT
PIN
BIOMETRIC
TPM
USB
FACE
ELEMENT
TPM
VOICE
SILENT
USB
RBA
SILENT
TPM
VOICE
FACE
PASSIVE
PIN
TOKEN
ACTIVE
USB
PASSIVE
USB
FACE
TPM
PASSIVE
SECURE
USB
TPM
FACE
PIN
RBA
NFC
USB
RBA
ACTIVE
NFC
USB
PIN NFC
SILENT
VOICE
FACE
PIN
RBA
PASSIVE
NFC
USB
PIN
TPM
PASSIVE
PIN
USB
TPM
NFC
USB
FACE SILENT
FINGERPRINT
USB
USB
USB
TPM
FACE
TPM
USB
PIN
FACE
USB
FACE
USB
NFC
FACE
TPM
PIN
FACE
FACE
USB
TPM
NFC
RBA
USB
PIN
PIN
TPM
USB
RBA
RBA
PIN
USB
USB
USB
USB
NFC
FACE
PIN
NFC
VOICE
USB
USB
USB
TPM
USB
USB
TPM
FACE
NFC
RBA
USB
FACE
PIN
VOICE
USB
USB
USB
RBA
TPM
NFC
USB
TPM
USB
USB
USB
TPM
FACE
USB
FACE
USB
TPM
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
New Trends in Mobile
Authentication
INTRODUCTIONS
2
Sebastien Taveau
Chief Technology Officer
Validity Sensors, Inc
@frogtwitt
Jamie Cowper
Senior Director, Business Development
Nok Nok Labs, Inc
@jcowper
THEPOWEROFAUTHENTICATION
①  Bookonline
②  Ridetorentalcenter
③  Waitinline
④  Handovercreditcard+Driver’s
license
⑤  Sign forms
⑥  Driveaway
①  Bookonline
②  Walktonearbyparkinglot
③  Unlockcarwithmobileapp/
ZipCard
④  Driveaway
3
Total Time: 15-30 min Total Time: 2 min
YOURPHONEISYOURPROXY
4
LATESTNUMBERS
5
Source: IDC Worldwide Quarterly Smart Connected Device Tracker, September 11, 2013
SMARTPHONEMARKETSHARE
6
A Shift in Authentication
New Paradigm
Opportunity for Better Authentication is Upon Us
Are you ready?
For	
  Users	
   For	
  Organiza.ons	
  
Painful to Use
	
  
•  25	
  Accounts	
  
•  8	
  Logins	
  /	
  Day	
  
•  6.5	
  Passwords	
  
Difficult to Secure
	
  
•  $5.5M	
  /	
  Data	
  Breach	
  
•  $15M	
  /	
  PWD	
  Reset	
  
•  $60+	
  	
  /	
  	
  Token	
  
For	
  the	
  Ecosystem	
  
Impossible to Scale
	
  
•  Fragmented	
  
•  Inflexible	
  
•  Slow	
  to	
  Adopt	
  
User Auth Online
Do you want to login?
Do you want to transfer $100 to Joe?
Do you want to ship to a new address?
Do you want to delete all of your emails?
Do you want to share your dental record?
Auth today: Ask user for a password
(and perhaps a one time code)
Consumer Focus"
Security Options"


"
Natural ID and User Options
Passwords
Too many to remember, difficult to type,
and not secure
REUSED PHISHED KEYLOGGED
Password and PIN: harsh reality
Source:	
  XQCD	
  
One Time Codes
Improves security but not easy enough
SMS
USABILITY
DEVICE
USABILITY
USER
EXPERIENCE
STILL
PHISHABLE
Coverage | Delay | Cost One per site | Fragile User confusion Known attacks today
Megatrend
Simpler, Stronger Local Device Auth
PERSONAL DEVICES LOCAL LOCKING NEW WAVE: CONVENIENT SECURITY
Carry Personal Data Pins & Patterns today Simpler, Stronger local auth
	
  2F	
  
Strong Consent"
How does it work? "
How does it work? "
Enrollment and Matching"
Reconstruct Image
01FE B93F 00F1 0A2B 001D
4752 648B 5563 5362 6A79
...
(292 bytes per scan line)
Host Platform
Raw Image Data
Fingerprint Template
Sensor
Extract Minutiae
M1={x1,y1,a1,z1)
M2={x2,y2,a2,z2}
...
Where? "
NFC"
STANDARDIZING SECURITY
HOWDOWEKNOWIT’SREALLYYOU?
24
?
EXTENDLOCALAUTHENTICATION
25
Protocol
Local Remote
COMMONAUTHENTICATIONPROTOCOL
26
Users
Cloud
Devices
Federation
27
EXPANSION
(POST FEB)
AuthenticatorsWeb Services Devices Implementers
FOUNDERS
THEFIDOSOLUTION
28
Discovery 
Provisioning 
Authentication
MORESECUREAUTHENTICATION




29
Unique Cryptographic Secrets
Feature Security Benefit
Unique key per user/device/site Segmentation of risk
High-entropy asymmetric keys
instead of passwords
Protection against dictionary, brute
force attacks
Secrets not exposed to user Protection against phishing, key
logging, shoulder surfing
User Account Device Site
LEVERAGINGHARDWARESECURITY
User Space 
Secure 
Hardware 
MFAC SDK
UX Layer
Input, Display
Crypto Layer
MFAC SDK
UX Layer
Input, Display
Crypto Layer
MFAC SDK
Crypto Layer
UX Layer
Input, Display
No Secure HW Secure Crypto
+
Storage
Secure
Execution
Environment
DEVICESARERICHINAUTHENTICATION
CAPABILITIES
31
Camera
Fingerprint Sensor
Microphone
Secure Execution
Secure Storage
Location
Motion, Heartbeat, etc.
M7
Face
Recognition
Fingerprint
Recognition
Voice
Recognition
COMPLEMENTARY
DESIGNEDFORMODERNAUTHENTICATION
32
IMPLICIT
AUTHENTICATION
EXPLICIT
AUTHENTICATION
AUTHENTICATION
USERVERIFICATION
33
Launch Press Success
MOBILE PAYMENTS
TRANSACTIONCONFIRMATION 
34
Setup Confirm Sent
35
FIDO
	
  	
  
	
  	
  
	
  	
  
	
  	
  
DOCUMENT TITLE

More Related Content

PDF
Leveraging Fingerprint Verification on Mobile Devices
Nok Nok Labs, Inc
 
PDF
Technical Overview of FIDO Solution
ForgeRock
 
PDF
CIS14: Building Blocks for Mobile Authentication and Security
CloudIDSummit
 
PPTX
Perangkat output komputer
Alvin Alfian Alfiansyah
 
PPTX
Siganl messaging
Yuvaraj R
 
PPTX
R1 - Slides
ezSec
 
PDF
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
viaForensics
 
PDF
Honeywell 6160-brochure
Alarm Grid
 
Leveraging Fingerprint Verification on Mobile Devices
Nok Nok Labs, Inc
 
Technical Overview of FIDO Solution
ForgeRock
 
CIS14: Building Blocks for Mobile Authentication and Security
CloudIDSummit
 
Perangkat output komputer
Alvin Alfian Alfiansyah
 
Siganl messaging
Yuvaraj R
 
R1 - Slides
ezSec
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
viaForensics
 
Honeywell 6160-brochure
Alarm Grid
 

Viewers also liked (20)

PPTX
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
PPTX
Mobile device security using transient authentication
Paulo Martins
 
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
PPTX
Reduce Friction and Risk with Device Authentication
TransUnion
 
PPTX
FIDO Specifications Overview
FIDO Alliance
 
PPTX
Skyfi Labs Biometric Authentication Project
vasanthvidyakar
 
PPTX
Introduction to FIDO Alliance
FIDO Alliance
 
PPTX
FIDO & Strong Authentication Technology Landscape
FIDO Alliance
 
PDF
Biometric Security Mobile
Jerry Ruggieri
 
PDF
Landscape of Web Identity Management
Fraunhofer AISEC
 
PPT
Technet System Center Mobile Device Manager Presentation
jasonlan
 
PPTX
Introduction to FIDO Alliance
FIDO Alliance
 
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
PDF
Biometric Authentication in Banking
Muthu Ramanathan
 
PPTX
Strong Authentication Trends in Government
FIDO Alliance
 
PDF
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
PPTX
Introduction to FIDO: A New Model for Authentication
FIDO Alliance
 
PDF
FIDO Alliance Activity in Japan
FIDO Alliance
 
PDF
Biometric Authentication, Dragon Unleashed, V1.5
Clare Nelson, CISSP, CIPP-E
 
PDF
Node.js Authentication and Data Security
Tim Messerschmidt
 
KeystrokeGuard_Presentation_20141024
Frank Maiorca
 
Mobile device security using transient authentication
Paulo Martins
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
Reduce Friction and Risk with Device Authentication
TransUnion
 
FIDO Specifications Overview
FIDO Alliance
 
Skyfi Labs Biometric Authentication Project
vasanthvidyakar
 
Introduction to FIDO Alliance
FIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO Alliance
 
Biometric Security Mobile
Jerry Ruggieri
 
Landscape of Web Identity Management
Fraunhofer AISEC
 
Technet System Center Mobile Device Manager Presentation
jasonlan
 
Introduction to FIDO Alliance
FIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
Biometric Authentication in Banking
Muthu Ramanathan
 
Strong Authentication Trends in Government
FIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
FIDO Alliance
 
FIDO Alliance Activity in Japan
FIDO Alliance
 
Biometric Authentication, Dragon Unleashed, V1.5
Clare Nelson, CISSP, CIPP-E
 
Node.js Authentication and Data Security
Tim Messerschmidt
 
Ad

Similar to New Trends in Mobile Authentication (20)

PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CloudIDSummit
 
PDF
Rebooting the smartcard
Eric Larcheveque
 
PPT
sharing the data using audio and image Steganography-
Nikhil Praharshi
 
PPTX
Authentifusion: Clarifying the Future of Customer Authentication
Michael Thelander
 
PPTX
Authentifusion: Clarifying the Future of User Authentication
TransUnion
 
PPTX
Authentifusion: Clarifying the Future of User Authentication
Kelly Colbert
 
PPTX
Pre-Quiz Symantec Endpoint Encryption
Matt Dawdy
 
PPTX
Audio card - VoIP - Phonecard
Guy Romanus
 
PDF
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
PPSX
NFC Bootcamp Seattle Day 1
traceebeebe
 
PPTX
Cyber intro 2017_hebrew
Moti Sagey מוטי שגיא
 
PDF
Biometric Technology
Tony Chew
 
PPTX
Sw assignment week12
you-ly05
 
PDF
Trust & UX
Michael Le
 
PDF
NFC Everywhere Brochure 2016
Laurent Dardé
 
PDF
NFC Everywhere Brochure 2016_WEB
Richard Schmidmaier
 
PDF
nullcon 2011 - Chupa Rustam
n|u - The Open Security Community
 
PDF
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
PDF
Mobile Solutions and Market Trends
ForgeRock
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CloudIDSummit
 
Rebooting the smartcard
Eric Larcheveque
 
sharing the data using audio and image Steganography-
Nikhil Praharshi
 
Authentifusion: Clarifying the Future of Customer Authentication
Michael Thelander
 
Authentifusion: Clarifying the Future of User Authentication
TransUnion
 
Authentifusion: Clarifying the Future of User Authentication
Kelly Colbert
 
Pre-Quiz Symantec Endpoint Encryption
Matt Dawdy
 
Audio card - VoIP - Phonecard
Guy Romanus
 
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
NFC Bootcamp Seattle Day 1
traceebeebe
 
Cyber intro 2017_hebrew
Moti Sagey מוטי שגיא
 
Biometric Technology
Tony Chew
 
Sw assignment week12
you-ly05
 
Trust & UX
Michael Le
 
NFC Everywhere Brochure 2016
Laurent Dardé
 
NFC Everywhere Brochure 2016_WEB
Richard Schmidmaier
 
nullcon 2011 - Chupa Rustam
n|u - The Open Security Community
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
Mobile Solutions and Market Trends
ForgeRock
 
Ad

Recently uploaded (20)

PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPT
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
This slide provides an overview Technology
mineshkharadi333
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 

New Trends in Mobile Authentication

Editor's Notes

  • #33: The protocol allows the authentication client to communicate with the server. It has 3 main functions: Discovery – Allows the servers to discovery what capabilities are present on the client device. Enables the use of existing device capabilities for authentication Provisioning -Allows users to self-register using authenticator(s) by the server. Keys are provisioned in this step. Authentication – Provides token-abstracted authentication using a challenge-response model based on OCRA (Oath Challenge-Response Algorithms)FIDO is designed to be extensible - Enables plugging-in of new authenticators, cryptographic, etcFollows a challenge response model based on OCRA It supports both symmetric and asymmetric key encryptionValidates authenticators present in client devices to verify their genuineness
  • #35: MFAC’s design takes advantage of secure hardware when it is available on devicesDepending on device capabilities, more parts of MFAC can be “sunk into” secure hardware When no secure hardware is present, all software executes in userspaceSoftware techniques are used to protect cryptographic material and code Whitebox encryption Code obfuscation Signing of code When cyrptographic chips like TPMs and Secure Elements are present MFAC SDK and the UX Layer execute in userspaceCryptographic operations and key storage use secure hardware When full secure execute enviroments like Trustzone are availableMFAC SDK still executes in userspaceCryptographic operations and key storage use secure hardware UX Layer uses secure keyboards and secure display Fingerprint sensors and also securely hardwired This mode is provides the most security