SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
From Card to Mobile
Evolving Identity
Credentials
Julian Lovelock
Senior Director, Product Marketing
July 2014
An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
2An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
How do I identify thee?
Let me count the ways
?
1.  What you have
you hold a credential that proves who you are
2.  What you do
you act in a recognizable way
3.  What you know
you know the secret password
4.  What you are
you have identifiable biometric characteristics
This is our traditional domain of expertise
3An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The mobile credential
Keys and access cards
in your daily life
Digital Form Factor,
Converged in
your smartphone
Challenges
•  Multiple digital keys
on a single device
•  Secure provisioning
of those keys
•  Broad phone support
4An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The mobile credential
Keys and access cards
in your daily life
Digital Form Factor,
Converged in
your smartphone
5An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Replacing the card with a phone
6An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Seos: Powering Mobile Access
Hotel
Security
System
Residential
Security
System
Seos
TSM
Secure
Element
Issuer TSM
Enterprise
Security
System
Mobile
OperatorSeos
Mobile
App
Seos
Applet
Seos
Contactless
Technology
HID
Secure
Identity
Services™
Portal
Seos
Enabled Locks/
Readers
7An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Mobile access control
Enjoyed at ASU
First Generation Mobile Access
Mobile access control
prized at Netflix
NFC technology in
phones enables them to
be used as RFID
credentials
8An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
What did we learn?
Sleeves are
challenging
Balance between
security and
convenience
NFC
Host Card Emulation (HCE)
9An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
9
NFC Host Card Emulation (HCE)
What is Host Card Emulation?
With the Android 4.4 release, it’s possible to
emulate a card in software.
Why is that important?
Card can be emulated in the HID mobile App
with no reliance on third-parties
What is the benefit?
Readers and locks supporting Seos over NFC
are compatible.
Note - HCE is supported by the financial
industry (Visa and Mastercard) which will drive
adoption.
10An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
10
Bluetooth Smart
Bluetooth Smart
(BT Smart)
What is Bluetooth Smart?
Bluetooth with lower power consumption
Does not require pairing
Is supported in iPhone 4s and Android 4.3
forward.
Why is that important?
The use of Bluetooth smart allows Seos to
be used to open doors with iPhones,
Android phones and tablet devices with no
reliance on third-parties.
How will we benefit from it?
The longer reading distance will allow us to
open doors in new ways.
11An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Deployment model
•  Use existing purchase models
•  Mobile credentials generated
•  Supports a simple enablement process
•  Receive an invitation
•  Install the App from the App store
•  Receive the digital key
•  Offers centralized key management
through a mobile access portal
•  For issuing, revoking, and managing
available digital credentials
•  Focus on simplicity and a streamlined
process
HID Mobile
Access
New user
Invitation Digital key
E-mail
12An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Evolution of the physical credential
§  Card remains good
§  Phone is interesting
–  Cool
–  Online
–  Convenient
§  But…not owned by the enterprise
§  Heterogeneous platform (challenging to manage in a consistent way)
§  Doesn’t work well as a secure badge
§  Don’t just see the phone as a simple replacement for the badge but something that
supplements and extends the convenience and security
13An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The Mobile reader
Access
Granted
Identity
Validated
Card
updated
14An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Use cases for Trusted Tags
Trusted Transaction Proof Of Presence Authenticity
Trusted loyalty cards
prevent unauthorized
loyalty points
Tap a tag to prove that
a home healthcare
visit took place
Prevent counterfeiting
and warranty fraud
while also engaging
the consumer
15An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Future generation of laptops/tablets
Enabled for ‘contactless’ for contactless cards
Impact: Leverage contactless card for
two factor authentication, without the
need for a separate card reader
16An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Conclusions
Evolving Identity Credentials
17An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
First generation solutions
Replace an existing credential with a
mobile phone in a ‘like for like’ use
case
E.g.
§  Tap a phone instead of a card to
enter a building
§  Use a phone instead of a token to
generate an OTP
18An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Second generation solutions
Improve the use case by leveraging
capability of the phone
e.g.
§  Bluetooth based ‘frictionless’
access
§  Authentication to offline access
points
19An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
3rd Generation solutions
Support for a broad range of
interchangeable convenient form
factors
Identity managed through the
cloud for multiple applications
Mobile devices form an integral
part of that ecosystem
-  Credentials
-  Readers
-  Encoders
-  Applications
20An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.

Más contenido relacionado

Similar a CIS14: From Card to Mobile—Evolving Identity Credentials

RBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID PresentationRBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID Presentation
ProxamaLDN
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
 
Corporate presentationjune2013
Corporate presentationjune2013Corporate presentationjune2013
Corporate presentationjune2013
Company Spotlight
 

Similar a CIS14: From Card to Mobile—Evolving Identity Credentials (20)

Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
 
NFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless Trust
 
RBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID PresentationRBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID Presentation
 
Access control Systems - Digital Factors
Access control Systems - Digital Factors Access control Systems - Digital Factors
Access control Systems - Digital Factors
 
The Future of Social Business
The Future of Social BusinessThe Future of Social Business
The Future of Social Business
 
Stand Out Customer Experience
Stand Out Customer ExperienceStand Out Customer Experience
Stand Out Customer Experience
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Zycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptxZycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptx
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Workshop mma nissan kadu zagatti adobe
Workshop mma nissan kadu zagatti adobeWorkshop mma nissan kadu zagatti adobe
Workshop mma nissan kadu zagatti adobe
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Building Saas for the Enterprise
Building Saas for the EnterpriseBuilding Saas for the Enterprise
Building Saas for the Enterprise
 
Presentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, AdobePresentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, Adobe
 
Corporate presentationjune2013
Corporate presentationjune2013Corporate presentationjune2013
Corporate presentationjune2013
 
Shareholder meetingjune13
Shareholder meetingjune13Shareholder meetingjune13
Shareholder meetingjune13
 
Client Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementClient Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and Engagement
 

Más de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

CIS14: From Card to Mobile—Evolving Identity Credentials

  • 1. From Card to Mobile Evolving Identity Credentials Julian Lovelock Senior Director, Product Marketing July 2014 An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
  • 2. 2An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. How do I identify thee? Let me count the ways ? 1.  What you have you hold a credential that proves who you are 2.  What you do you act in a recognizable way 3.  What you know you know the secret password 4.  What you are you have identifiable biometric characteristics This is our traditional domain of expertise
  • 3. 3An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The mobile credential Keys and access cards in your daily life Digital Form Factor, Converged in your smartphone Challenges •  Multiple digital keys on a single device •  Secure provisioning of those keys •  Broad phone support
  • 4. 4An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The mobile credential Keys and access cards in your daily life Digital Form Factor, Converged in your smartphone
  • 5. 5An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Replacing the card with a phone
  • 6. 6An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Seos: Powering Mobile Access Hotel Security System Residential Security System Seos TSM Secure Element Issuer TSM Enterprise Security System Mobile OperatorSeos Mobile App Seos Applet Seos Contactless Technology HID Secure Identity Services™ Portal Seos Enabled Locks/ Readers
  • 7. 7An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Mobile access control Enjoyed at ASU First Generation Mobile Access Mobile access control prized at Netflix NFC technology in phones enables them to be used as RFID credentials
  • 8. 8An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. What did we learn? Sleeves are challenging Balance between security and convenience NFC Host Card Emulation (HCE)
  • 9. 9An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 9 NFC Host Card Emulation (HCE) What is Host Card Emulation? With the Android 4.4 release, it’s possible to emulate a card in software. Why is that important? Card can be emulated in the HID mobile App with no reliance on third-parties What is the benefit? Readers and locks supporting Seos over NFC are compatible. Note - HCE is supported by the financial industry (Visa and Mastercard) which will drive adoption.
  • 10. 10An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 10 Bluetooth Smart Bluetooth Smart (BT Smart) What is Bluetooth Smart? Bluetooth with lower power consumption Does not require pairing Is supported in iPhone 4s and Android 4.3 forward. Why is that important? The use of Bluetooth smart allows Seos to be used to open doors with iPhones, Android phones and tablet devices with no reliance on third-parties. How will we benefit from it? The longer reading distance will allow us to open doors in new ways.
  • 11. 11An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Deployment model •  Use existing purchase models •  Mobile credentials generated •  Supports a simple enablement process •  Receive an invitation •  Install the App from the App store •  Receive the digital key •  Offers centralized key management through a mobile access portal •  For issuing, revoking, and managing available digital credentials •  Focus on simplicity and a streamlined process HID Mobile Access New user Invitation Digital key E-mail
  • 12. 12An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Evolution of the physical credential §  Card remains good §  Phone is interesting –  Cool –  Online –  Convenient §  But…not owned by the enterprise §  Heterogeneous platform (challenging to manage in a consistent way) §  Doesn’t work well as a secure badge §  Don’t just see the phone as a simple replacement for the badge but something that supplements and extends the convenience and security
  • 13. 13An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The Mobile reader Access Granted Identity Validated Card updated
  • 14. 14An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Use cases for Trusted Tags Trusted Transaction Proof Of Presence Authenticity Trusted loyalty cards prevent unauthorized loyalty points Tap a tag to prove that a home healthcare visit took place Prevent counterfeiting and warranty fraud while also engaging the consumer
  • 15. 15An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Future generation of laptops/tablets Enabled for ‘contactless’ for contactless cards Impact: Leverage contactless card for two factor authentication, without the need for a separate card reader
  • 16. 16An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Conclusions Evolving Identity Credentials
  • 17. 17An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. First generation solutions Replace an existing credential with a mobile phone in a ‘like for like’ use case E.g. §  Tap a phone instead of a card to enter a building §  Use a phone instead of a token to generate an OTP
  • 18. 18An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Second generation solutions Improve the use case by leveraging capability of the phone e.g. §  Bluetooth based ‘frictionless’ access §  Authentication to offline access points
  • 19. 19An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 3rd Generation solutions Support for a broad range of interchangeable convenient form factors Identity managed through the cloud for multiple applications Mobile devices form an integral part of that ecosystem -  Credentials -  Readers -  Encoders -  Applications
  • 20. 20An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.