SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
From Card to Mobile
Evolving Identity
Credentials
Julian Lovelock
Senior Director, Product Marketing
July 2014
An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
2An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
How do I identify thee?
Let me count the ways
?
1.  What you have
you hold a credential that proves who you are
2.  What you do
you act in a recognizable way
3.  What you know
you know the secret password
4.  What you are
you have identifiable biometric characteristics
This is our traditional domain of expertise
3An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The mobile credential
Keys and access cards
in your daily life
Digital Form Factor,
Converged in
your smartphone
Challenges
•  Multiple digital keys
on a single device
•  Secure provisioning
of those keys
•  Broad phone support
4An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The mobile credential
Keys and access cards
in your daily life
Digital Form Factor,
Converged in
your smartphone
5An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Replacing the card with a phone
6An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Seos: Powering Mobile Access
Hotel
Security
System
Residential
Security
System
Seos
TSM
Secure
Element
Issuer TSM
Enterprise
Security
System
Mobile
OperatorSeos
Mobile
App
Seos
Applet
Seos
Contactless
Technology
HID
Secure
Identity
Services™
Portal
Seos
Enabled Locks/
Readers
7An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Mobile access control
Enjoyed at ASU
First Generation Mobile Access
Mobile access control
prized at Netflix
NFC technology in
phones enables them to
be used as RFID
credentials
8An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
What did we learn?
Sleeves are
challenging
Balance between
security and
convenience
NFC
Host Card Emulation (HCE)
9An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
9
NFC Host Card Emulation (HCE)
What is Host Card Emulation?
With the Android 4.4 release, it’s possible to
emulate a card in software.
Why is that important?
Card can be emulated in the HID mobile App
with no reliance on third-parties
What is the benefit?
Readers and locks supporting Seos over NFC
are compatible.
Note - HCE is supported by the financial
industry (Visa and Mastercard) which will drive
adoption.
10An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
10
Bluetooth Smart
Bluetooth Smart
(BT Smart)
What is Bluetooth Smart?
Bluetooth with lower power consumption
Does not require pairing
Is supported in iPhone 4s and Android 4.3
forward.
Why is that important?
The use of Bluetooth smart allows Seos to
be used to open doors with iPhones,
Android phones and tablet devices with no
reliance on third-parties.
How will we benefit from it?
The longer reading distance will allow us to
open doors in new ways.
11An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Deployment model
•  Use existing purchase models
•  Mobile credentials generated
•  Supports a simple enablement process
•  Receive an invitation
•  Install the App from the App store
•  Receive the digital key
•  Offers centralized key management
through a mobile access portal
•  For issuing, revoking, and managing
available digital credentials
•  Focus on simplicity and a streamlined
process
HID Mobile
Access
New user
Invitation Digital key
E-mail
12An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Evolution of the physical credential
§  Card remains good
§  Phone is interesting
–  Cool
–  Online
–  Convenient
§  But…not owned by the enterprise
§  Heterogeneous platform (challenging to manage in a consistent way)
§  Doesn’t work well as a secure badge
§  Don’t just see the phone as a simple replacement for the badge but something that
supplements and extends the convenience and security
13An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
The Mobile reader
Access
Granted
Identity
Validated
Card
updated
14An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Use cases for Trusted Tags
Trusted Transaction Proof Of Presence Authenticity
Trusted loyalty cards
prevent unauthorized
loyalty points
Tap a tag to prove that
a home healthcare
visit took place
Prevent counterfeiting
and warranty fraud
while also engaging
the consumer
15An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Future generation of laptops/tablets
Enabled for ‘contactless’ for contactless cards
Impact: Leverage contactless card for
two factor authentication, without the
need for a separate card reader
16An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Conclusions
Evolving Identity Credentials
17An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
First generation solutions
Replace an existing credential with a
mobile phone in a ‘like for like’ use
case
E.g.
§  Tap a phone instead of a card to
enter a building
§  Use a phone instead of a token to
generate an OTP
18An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
Second generation solutions
Improve the use case by leveraging
capability of the phone
e.g.
§  Bluetooth based ‘frictionless’
access
§  Authentication to offline access
points
19An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
3rd Generation solutions
Support for a broad range of
interchangeable convenient form
factors
Identity managed through the
cloud for multiple applications
Mobile devices form an integral
part of that ecosystem
-  Credentials
-  Readers
-  Encoders
-  Applications
20An ASSA ABLOY Group brand
PROPRIETARY INFORMATION.
© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.

Más contenido relacionado

Similar a CIS14: From Card to Mobile—Evolving Identity Credentials

Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleNFC Forum
 
NFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Forum
 
RBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID PresentationRBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID PresentationProxamaLDN
 
Access control Systems - Digital Factors
Access control Systems - Digital Factors Access control Systems - Digital Factors
Access control Systems - Digital Factors Digital Factors
 
Stand Out Customer Experience
Stand Out Customer ExperienceStand Out Customer Experience
Stand Out Customer ExperienceAdobe
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Zycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptxZycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptxsachu82
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverRebecca Lieb
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software DeliveryTiffany Jachja
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
Building Saas for the Enterprise
Building Saas for the EnterpriseBuilding Saas for the Enterprise
Building Saas for the EnterpriseBeau Christensen
 
Presentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, AdobePresentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, AdobeIAB México
 
Corporate presentationjune2013
Corporate presentationjune2013Corporate presentationjune2013
Corporate presentationjune2013Company Spotlight
 
Client Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementClient Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementGlobal Creative Group, Inc
 

Similar a CIS14: From Card to Mobile—Evolving Identity Credentials (20)

Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
 
NFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless TrustNFC Tags: The Need for Frictionless Trust
NFC Tags: The Need for Frictionless Trust
 
RBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID PresentationRBTE Breakfast Seminar - HID Presentation
RBTE Breakfast Seminar - HID Presentation
 
Access control Systems - Digital Factors
Access control Systems - Digital Factors Access control Systems - Digital Factors
Access control Systems - Digital Factors
 
The Future of Social Business
The Future of Social BusinessThe Future of Social Business
The Future of Social Business
 
Stand Out Customer Experience
Stand Out Customer ExperienceStand Out Customer Experience
Stand Out Customer Experience
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Zycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptxZycloud Corporate Presentation.pptx
Zycloud Corporate Presentation.pptx
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Workshop mma nissan kadu zagatti adobe
Workshop mma nissan kadu zagatti adobeWorkshop mma nissan kadu zagatti adobe
Workshop mma nissan kadu zagatti adobe
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Building Saas for the Enterprise
Building Saas for the EnterpriseBuilding Saas for the Enterprise
Building Saas for the Enterprise
 
Presentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, AdobePresentación Loni Stark, Director of Product & Industry Marketing, Adobe
Presentación Loni Stark, Director of Product & Industry Marketing, Adobe
 
Corporate presentationjune2013
Corporate presentationjune2013Corporate presentationjune2013
Corporate presentationjune2013
 
Shareholder meetingjune13
Shareholder meetingjune13Shareholder meetingjune13
Shareholder meetingjune13
 
Client Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementClient Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and Engagement
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

CIS14: From Card to Mobile—Evolving Identity Credentials

  • 1. From Card to Mobile Evolving Identity Credentials Julian Lovelock Senior Director, Product Marketing July 2014 An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.
  • 2. 2An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. How do I identify thee? Let me count the ways ? 1.  What you have you hold a credential that proves who you are 2.  What you do you act in a recognizable way 3.  What you know you know the secret password 4.  What you are you have identifiable biometric characteristics This is our traditional domain of expertise
  • 3. 3An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The mobile credential Keys and access cards in your daily life Digital Form Factor, Converged in your smartphone Challenges •  Multiple digital keys on a single device •  Secure provisioning of those keys •  Broad phone support
  • 4. 4An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The mobile credential Keys and access cards in your daily life Digital Form Factor, Converged in your smartphone
  • 5. 5An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Replacing the card with a phone
  • 6. 6An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Seos: Powering Mobile Access Hotel Security System Residential Security System Seos TSM Secure Element Issuer TSM Enterprise Security System Mobile OperatorSeos Mobile App Seos Applet Seos Contactless Technology HID Secure Identity Services™ Portal Seos Enabled Locks/ Readers
  • 7. 7An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Mobile access control Enjoyed at ASU First Generation Mobile Access Mobile access control prized at Netflix NFC technology in phones enables them to be used as RFID credentials
  • 8. 8An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. What did we learn? Sleeves are challenging Balance between security and convenience NFC Host Card Emulation (HCE)
  • 9. 9An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 9 NFC Host Card Emulation (HCE) What is Host Card Emulation? With the Android 4.4 release, it’s possible to emulate a card in software. Why is that important? Card can be emulated in the HID mobile App with no reliance on third-parties What is the benefit? Readers and locks supporting Seos over NFC are compatible. Note - HCE is supported by the financial industry (Visa and Mastercard) which will drive adoption.
  • 10. 10An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 10 Bluetooth Smart Bluetooth Smart (BT Smart) What is Bluetooth Smart? Bluetooth with lower power consumption Does not require pairing Is supported in iPhone 4s and Android 4.3 forward. Why is that important? The use of Bluetooth smart allows Seos to be used to open doors with iPhones, Android phones and tablet devices with no reliance on third-parties. How will we benefit from it? The longer reading distance will allow us to open doors in new ways.
  • 11. 11An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Deployment model •  Use existing purchase models •  Mobile credentials generated •  Supports a simple enablement process •  Receive an invitation •  Install the App from the App store •  Receive the digital key •  Offers centralized key management through a mobile access portal •  For issuing, revoking, and managing available digital credentials •  Focus on simplicity and a streamlined process HID Mobile Access New user Invitation Digital key E-mail
  • 12. 12An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Evolution of the physical credential §  Card remains good §  Phone is interesting –  Cool –  Online –  Convenient §  But…not owned by the enterprise §  Heterogeneous platform (challenging to manage in a consistent way) §  Doesn’t work well as a secure badge §  Don’t just see the phone as a simple replacement for the badge but something that supplements and extends the convenience and security
  • 13. 13An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. The Mobile reader Access Granted Identity Validated Card updated
  • 14. 14An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Use cases for Trusted Tags Trusted Transaction Proof Of Presence Authenticity Trusted loyalty cards prevent unauthorized loyalty points Tap a tag to prove that a home healthcare visit took place Prevent counterfeiting and warranty fraud while also engaging the consumer
  • 15. 15An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Future generation of laptops/tablets Enabled for ‘contactless’ for contactless cards Impact: Leverage contactless card for two factor authentication, without the need for a separate card reader
  • 16. 16An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Conclusions Evolving Identity Credentials
  • 17. 17An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. First generation solutions Replace an existing credential with a mobile phone in a ‘like for like’ use case E.g. §  Tap a phone instead of a card to enter a building §  Use a phone instead of a token to generate an OTP
  • 18. 18An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. Second generation solutions Improve the use case by leveraging capability of the phone e.g. §  Bluetooth based ‘frictionless’ access §  Authentication to offline access points
  • 19. 19An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution. 3rd Generation solutions Support for a broad range of interchangeable convenient form factors Identity managed through the cloud for multiple applications Mobile devices form an integral part of that ecosystem -  Credentials -  Readers -  Encoders -  Applications
  • 20. 20An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. Contents are confidential and proprietary and not intended for external distribution.