SlideShare une entreprise Scribd logo
1  sur  17
© jun 2016 | liga.com
Bjarke Alling | CEO
Brian O. Bentzen | iOS developer
Cryptovision Mindshare June 30 - 2016
Kill passwords on the tablets
© jun 2016 | liga.com
© jun 2016 | liga.com
© jun 2016 | liga.com
DIGITISATION
© jun 2016 | liga.com
A. Current method of manually typing user name and
password is technically outdated
B. The development in user complexity and numbers of
IT systems is exponentially growing
The password challenge
© jun 2016 | liga.com
Usage
Signing
Encryption
Authentication
Maintenance
Revoke
Renew
Re-issue
Issuing
National ID
Global ID
Local ID
Full life cycle
management of
emplyees
digital signature
and their
digital identities
© jun 2016 | liga.com
Level 1
Level 2
Level 3
Travel itinerary
© jun 2016 | liga.com
 Standards
 Custom apps
 Rapid change
 Different needs
 Consumerization
 Multiple platforms
 Multiple form factors
© jun 2016 | liga.com
The SDK allows iOS
programmers easy access to
certificates and encryption keys
on smartcards through a
smartcard reader
Mobile SDK
© jun 2016 | liga.com
Componenets in the SDK iOS App
Mobile SDK
PKCS#11
Hardware
• SmartSignatur library + browser
• OpenSSL library
• cv Cryptovision PKCS#11 library
• Precise Biometrics / Tactivo library
• Sample PHP web server code
© jun 2016 | liga.com
Generates signature for data using current private key.
There are a number of available signature schemes (Signing algorithms)
(NSData*)sign:(NSData*)data digestType: (SigningAlgorithm)
type pinCode: (NSString*) pinCode;
© jun 2016 | liga.comsmartsignatur.eu/mobilesdk
© jun 2016 | liga.com
Free trial version available
© jun 2016 | liga.com
Traditional solutions
 OTP token
 MicroSD card
 Bluetooth/NFC token
 Cover with std. smart card
Next generation solutions
 Mobile phone
 Fingerprint + Remote signature
 Central certificate server
 BYOS – bring your own security
 Interim soft-key certificates
combined National ID service
© jun 2016 | liga.com
Complete solution build on open
standards and many vendors
© jun 2016 | liga.com
• Classic analog login methods is outdated
• User experiance needs simplification when complixity is growing
• Integrated and automated administration is necessary for success
• Stepwise implementation on top of existing infrastructure
• Mobility requires new security frameworks to be secure and efficient
• Download free trial from Apple iTunes AppStore
© jun 2016 | liga.com
Bjarke Alling
Funder & CEO
+45 40 13 91 05 | ba@liga.com
Brian Overgaard Bentzen
iOS developer
+45 31 72 57 91 | bob@liga.com
twitter.com/smartsignatur
smartsignatur.eu/newsletter
linkedin.com/company/smartsignatur

Contenu connexe

Tendances

Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyFIDO Alliance
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesFIDO Alliance
 
Introduction to FIDO Authentication
Introduction to FIDO AuthenticationIntroduction to FIDO Authentication
Introduction to FIDO AuthenticationFIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
 
Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2FIDO Alliance
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamForgeRock
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5digiflak
 
Fast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standardsFast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standards.NET Crowd
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO Alliance
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications OverviewFIDO Alliance
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBee
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBeeWSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBee
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBeeWSO2
 
FIDO Specifications Tutorial
FIDO Specifications TutorialFIDO Specifications Tutorial
FIDO Specifications TutorialFIDO Alliance
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecurityAndreas Leicher
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 

Tendances (20)

Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
Introduction to FIDO Authentication
Introduction to FIDO AuthenticationIntroduction to FIDO Authentication
Introduction to FIDO Authentication
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
Fast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standardsFast IDentity Online New wave of open authentication standards
Fast IDentity Online New wave of open authentication standards
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBee
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBeeWSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBee
WSO2 IoT Server: Implementing Device Gateway Pattern using Android Device & XBee
 
FIDO Specifications Tutorial
FIDO Specifications TutorialFIDO Specifications Tutorial
FIDO Specifications Tutorial
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 

En vedette

Mindshare@SXSWi 2016: The Takeaways for Marketers
Mindshare@SXSWi 2016: The Takeaways for MarketersMindshare@SXSWi 2016: The Takeaways for Marketers
Mindshare@SXSWi 2016: The Takeaways for MarketersMindshare North America
 
POVERTY IN INDIA
POVERTY IN INDIAPOVERTY IN INDIA
POVERTY IN INDIALhamu Lama
 
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16Inma Ferragud
 
Poverty in INDIA
Poverty in INDIAPoverty in INDIA
Poverty in INDIAVipul Mehta
 
POVERTY IN INDIA
POVERTY IN INDIAPOVERTY IN INDIA
POVERTY IN INDIAINDIASJJK
 
Poverty slideshow
Poverty slideshowPoverty slideshow
Poverty slideshowkraekerc
 
Poverty Powerpoint
Poverty PowerpointPoverty Powerpoint
Poverty Powerpointsmuench
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 

En vedette (17)

IDEALOGY Content Marketing Services
IDEALOGY Content Marketing ServicesIDEALOGY Content Marketing Services
IDEALOGY Content Marketing Services
 
Mindshare@SXSWi 2016: The Takeaways for Marketers
Mindshare@SXSWi 2016: The Takeaways for MarketersMindshare@SXSWi 2016: The Takeaways for Marketers
Mindshare@SXSWi 2016: The Takeaways for Marketers
 
Mindshare NA's Guide to SXSW 2016
Mindshare NA's Guide to SXSW 2016Mindshare NA's Guide to SXSW 2016
Mindshare NA's Guide to SXSW 2016
 
Mindshare's Global POVs: 2015-2016
Mindshare's Global POVs: 2015-2016Mindshare's Global POVs: 2015-2016
Mindshare's Global POVs: 2015-2016
 
Ram
RamRam
Ram
 
Poverty in World & India
Poverty in World & IndiaPoverty in World & India
Poverty in World & India
 
Poverty in india
Poverty in indiaPoverty in india
Poverty in india
 
Poverty in india
Poverty in indiaPoverty in india
Poverty in india
 
POVERTY IN INDIA
POVERTY IN INDIAPOVERTY IN INDIA
POVERTY IN INDIA
 
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16
"Hackeando el algoritmo: innovación en redes sociales". Presentación del #CW16
 
Poverty in INDIA
Poverty in INDIAPoverty in INDIA
Poverty in INDIA
 
Budget Ppt
Budget PptBudget Ppt
Budget Ppt
 
POVERTY IN INDIA
POVERTY IN INDIAPOVERTY IN INDIA
POVERTY IN INDIA
 
Poverty In India
Poverty In IndiaPoverty In India
Poverty In India
 
Poverty slideshow
Poverty slideshowPoverty slideshow
Poverty slideshow
 
Poverty Powerpoint
Poverty PowerpointPoverty Powerpoint
Poverty Powerpoint
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Similaire à Kill passwords on the tablets

Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...modolabs
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.FIDO Alliance
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarForgeRock
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected SocietyCOMPUTEX TAIPEI
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleFIDO Alliance
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyFIDO Alliance
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen VascoLeenVerleyen
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATUREProfesia Srl, Lynx Group
 
MODRNA WG Update - April 2021
MODRNA WG Update - April 2021MODRNA WG Update - April 2021
MODRNA WG Update - April 2021Bjorn Hjelm
 

Similaire à Kill passwords on the tablets (20)

Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
Kurogo Higher Ed Mobile Conference 2017: How Mobility is Driving Changes in C...
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More SimpleNTT DOCOMO Deployment Case Study: Your Security, More Simple
NTT DOCOMO Deployment Case Study: Your Security, More Simple
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 
Kona SL Profile
Kona SL ProfileKona SL Profile
Kona SL Profile
 
MODRNA WG Update - April 2021
MODRNA WG Update - April 2021MODRNA WG Update - April 2021
MODRNA WG Update - April 2021
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Kill passwords on the tablets

  • 1. © jun 2016 | liga.com Bjarke Alling | CEO Brian O. Bentzen | iOS developer Cryptovision Mindshare June 30 - 2016 Kill passwords on the tablets
  • 2. © jun 2016 | liga.com
  • 3. © jun 2016 | liga.com
  • 4. © jun 2016 | liga.com DIGITISATION
  • 5. © jun 2016 | liga.com A. Current method of manually typing user name and password is technically outdated B. The development in user complexity and numbers of IT systems is exponentially growing The password challenge
  • 6. © jun 2016 | liga.com Usage Signing Encryption Authentication Maintenance Revoke Renew Re-issue Issuing National ID Global ID Local ID Full life cycle management of emplyees digital signature and their digital identities
  • 7. © jun 2016 | liga.com Level 1 Level 2 Level 3 Travel itinerary
  • 8. © jun 2016 | liga.com  Standards  Custom apps  Rapid change  Different needs  Consumerization  Multiple platforms  Multiple form factors
  • 9. © jun 2016 | liga.com The SDK allows iOS programmers easy access to certificates and encryption keys on smartcards through a smartcard reader Mobile SDK
  • 10. © jun 2016 | liga.com Componenets in the SDK iOS App Mobile SDK PKCS#11 Hardware • SmartSignatur library + browser • OpenSSL library • cv Cryptovision PKCS#11 library • Precise Biometrics / Tactivo library • Sample PHP web server code
  • 11. © jun 2016 | liga.com Generates signature for data using current private key. There are a number of available signature schemes (Signing algorithms) (NSData*)sign:(NSData*)data digestType: (SigningAlgorithm) type pinCode: (NSString*) pinCode;
  • 12. © jun 2016 | liga.comsmartsignatur.eu/mobilesdk
  • 13. © jun 2016 | liga.com Free trial version available
  • 14. © jun 2016 | liga.com Traditional solutions  OTP token  MicroSD card  Bluetooth/NFC token  Cover with std. smart card Next generation solutions  Mobile phone  Fingerprint + Remote signature  Central certificate server  BYOS – bring your own security  Interim soft-key certificates combined National ID service
  • 15. © jun 2016 | liga.com Complete solution build on open standards and many vendors
  • 16. © jun 2016 | liga.com • Classic analog login methods is outdated • User experiance needs simplification when complixity is growing • Integrated and automated administration is necessary for success • Stepwise implementation on top of existing infrastructure • Mobility requires new security frameworks to be secure and efficient • Download free trial from Apple iTunes AppStore
  • 17. © jun 2016 | liga.com Bjarke Alling Funder & CEO +45 40 13 91 05 | ba@liga.com Brian Overgaard Bentzen iOS developer +45 31 72 57 91 | bob@liga.com twitter.com/smartsignatur smartsignatur.eu/newsletter linkedin.com/company/smartsignatur

Notes de l'éditeur

  1. Baggrund Digital Livscyklus Modenhed Mobilitet
  2. Put power to the paper Moved from manual to automatic process Did not reform the methology
  3. Replaced 100 lines of code with less than 5 lines