Скачать презентацию IIIII A Smarter Way to Store PKI Credentials Скачать презентацию IIIII A Smarter Way to Store PKI Credentials

8ca24d931efe3f5b8e873adba7f05dea.ppt

  • Количество слайдов: 11

IIIII A Smarter Way to Store PKI Credentials APKI Forum India IIIII A Smarter Way to Store PKI Credentials APKI Forum India

Gemalto’s secure personal devices are in the hands of billions of individuals ª We Gemalto’s secure personal devices are in the hands of billions of individuals ª We produced and securely personalized over 1. 5 billion devices in 2009 ª 200 million citizens use our e. Passports ª 500 million people use our credit cards ª 400 mobile operators worldwide connect 2 billion subscribers with our solutions ª 30 years experience in designing and producing secure personal devices October 2010 1

Gemalto: world leader in digital security ª World’s #1 for chip-based corporate security solutions(1) Gemalto: world leader in digital security ª World’s #1 for chip-based corporate security solutions(1) ª World’s #1 for smart card readers ª World’s #1 for e. Banking solutions ª World’s #1 for chip payment cards(4) and a leader in contact less payment ª World’s #1 for SIM cards(1) and Over-The-Air platforms for mobile networks(2) ª World’s first commercial deployment of SIM-based NFC mobile contactless solution ª World’s #1 for e-passports (3) and a leader in e-ID & e-healthcare government projects ª World’s #1 for Machine-to-Machine (M 2 M) Source: (1) Frost & Sullivan 2009; (2) Gemalto 2009; (3) Keesing Journal of Identity 2009; (4) The Nilson Report 2009 3 2

Online Security – Ezio Solutions Ezio OTP Display Card PKI solutions Bingo Cards 12 Online Security – Ezio Solutions Ezio OTP Display Card PKI solutions Bingo Cards 12 45 67 23 91 34 56 78 97 09 11 19 48 61 PKI OTP Ezio OTP token Challenge-Response OATH OCRA EMV based 59 Transactions signature User Auth Non repudiation Increased Assurance October 2010 3

Ezio Solutions Gemlto E-Banking Authentication Solutions Ezio EMV Solution Ezio Token Solution Online Banking Ezio Solutions Gemlto E-Banking Authentication Solutions Ezio EMV Solution Ezio Token Solution Online Banking Phone Banking IVR E-Commerce (3 D Secure) Any E-services Strong User Authentication Digital Signature Ezio Mobile Solution A complete offer for securing e-banking services based on market standards October 2010 4

IT Security investments rising Business and government organizations : cyber crime is one of IT Security investments rising Business and government organizations : cyber crime is one of the fastest growing threats to the continuity of their operations. A worldwide survey commissioned by Mc. Afee estimates that the damage from data loss exceeded one trillion dollars in 2008. New technologies such as virtualization, cloud computing and social networking are among the latest challenges facing IT security professionals. PKI – The wait is over PKI is a proven technology for identity and access management systems that are pervasive throughout the enterprise. System design considerations : Unauthorized access enable entire network being compromised. Chain of trust in PKI System is based on widespread use of private keys and certificates. Private keys must be protected and managed carefully. Anyone with access to these keys can be assumed to be the owner. Most important decisions in PKI deployments is the method of storing and protecting these PKI credentials. October 2010 4

Certificate Storage Protecting PKI Certificates with smart card security October 2010 5 Certificate Storage Protecting PKI Certificates with smart card security October 2010 5

Challenge faced in PKI usage Middleware installation. Middleware upgradation. Specific driver for Different OS. Challenge faced in PKI usage Middleware installation. Middleware upgradation. Specific driver for Different OS. What we need Plug and Play (Driverless). Centralized Middleware upgradation. Online middleware Services. October 2010 6

e-GOV 2. 0: For Secure, accessible, trusted e. Government Services October 2010 7 e-GOV 2. 0: For Secure, accessible, trusted e. Government Services October 2010 7

Goal Requirement for a comon authentication to public services and information. Strong user authentication Goal Requirement for a comon authentication to public services and information. Strong user authentication is the key. Convenience and user-friendliness is essential. ** ZERO foot print solution for smart card scheme implementation October 2010 8

Gemalto and digital security 1. 2. 3. 4. 5. 6. 7. The digital revolution Gemalto and digital security 1. 2. 3. 4. 5. 6. 7. The digital revolution is transforming the way people go about their everyday lives The freedom to communicate, buy or travel, anytime or anywhere has become an integral part of what each individual wants, and expects The business of our customers is to enable individuals to make the most of these digital interactions. We help them by making these more convenient, secure and enjoyable We are part of a large and fast developing market that is growing with the spread of these digital interactions to every aspect of a person’s life. Be it at work or at home, or in between As the scope of the digital world extends, and in order to provide our clients with solutions that are more comprehensive and useful, Gemalto has chosen to expand its activities throughout the value chain As a result, smart cards have come to only partly represent what Gemalto does or can do Today, Gemalto’s expertise and experience in developing secure personal devices, software and related services enable the company to become a leader and to thrive in this market October 2010 9