Avoco's Cloud-Based Information Card Selector: Enhancing Usability and Security

Slide Note
Embed
Share

Avoco's Cloud-Based Information Card Selector is a leap forward in Information Card usability, offering benefits such as universal access to Information Cards, zero footprint for end users, and enhanced security features. The platform allows for easy creation, import, and backup of cards, as well as access control for documents. With extensibility and portability options, as well as robust security technology, Avoco's Cloud-Based Information Card Selector provides a secure and convenient solution for managing Information Cards.


Uploaded on Sep 12, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. The I-Card Cloud Selector CloudCard

  2. An introduction to Avocos fully Cloud based I-Card Selector, CloudCard A demonstration of the logon process using the Cloud selector and a shared secret A demonstration of the extended use of Information Cards: Digital signing in the Cloud using Information Cards Access control of documents using Information Cards

  3. A fully Cloud based Information Card selector A leap forward in Information Card usability Bypasses the world of Windows desktops Designed to have similar functionality to Windows CardSpace, e.g. Personal cards can be created Cards can be imported Cards can be backed up Works with standard and auditing cards not yet tested with others e.g. Relationship and Signalling cards Like CardSpace, token encryption is left to IdP for auditing cards

  4. Usability benefits include: Universal access to your Information Cards True zero footprint for end users no plug-ins, ActiveX, downloads, etc. Access from normal desktops/laptops as well as phones/mobile devices Test Implementation Site: https://www.secure2cardspace.com - currently password username only into CloudCard portal but can be almost anything

  5. Extensibility: use of alternative login protocols, etc. Portability other languages such as Java (if needed) Security technology through shared-secret log in control Security Standards standard Extensibility: Modular design permits simple Portability: Written in PHP easy to port to Security: Incorporates anti-phishing Security: SSL - MITM attacks less feasible Standards: HTML spec to be submitted as

  6. CloudCard <a href="https://www.secure2cardspace.com/Clo udCardA/CardView.php?ampIssuer=www.secure2 cardspace.com&amp;RequiredClaims=http.... Link specifies entry point to selector, required card issuer, claims, etc., like calling a desktop selector. Additionally certificate of RP is included. CloudCard called as a post from RP web page: called as a post from RP web page: Link specifies entry point to selector, required card issuer, claims, etc., like calling a desktop selector. Additionally certificate of RP is included.

  7. Used to provide anti-phishing of the I-Card web service account User chooses a photo before logging into their account If correct photo displayed, user can log in knowing the site is genuine A photo always presented to prevent guessing username Sir Henry No-Tail

  8. 1. Generate phishing page Phishin (PS) ishing server 2. Username submitted CS Backend 3. PS submits username to CS backend 4. PS gets image from response 5. Correct image set in fake password entry page

  9. 1. Create page and setup session key CS Backend 2. Username submitted with session key data 3. Valid Session key: Image returned

  10. 1. Generate phishing page Phishin (PS) ishing server 2. Username submitted CS Backend 3. PS submits username to CS backend (invalid session key) 4. No response 5. Cannot set correct image

  11. No protection against desktop Trojan / virus (but then entire system is potentially compromised including desktop selector)

  12. Use your preferred login scheme e.g. OpenID.

  13. Face recognition and recognition of familiar objects is part of an acquired evolutionary trait that helps us survive We are good at it We place trust recognition and object recognition We use processes of cheat recognition all the time, everyday, to interact with others An identity system must mesh real world me with digital me We must use existing human traits when designing the system trust in our ability to use face

  14. If youre interested in the research into cheat recognition and similar: Cartwright, J 2000. Evolution & Human Behaviour. Palgrave Daly, M & Wilson, MI 1999. Human evolutionary psychology and animal behaviour Cosmides, L and Tooby, University of California at Santa Barbara http://www.psych.ucsb.edu/research/cep/primer.html http://www.psych.ucsb.edu/research/cep/papers/TOM broadnarrow.pdf

  15. The Avoco Cloud Selector is modular, so Can choose to use a myriad of authentication techniques this presentation shows one Important not to forget the big picture: Usability for a consumer as well as business audience Represents the real world me in a familiar way I am me because of these reasons (claims) Can be used not just for logging into web sites Identity is more than just access control one

  16. Authentication: Digital certificate OpenID LiveID Card authentication specified by RP e.g. only a card backed by X509 can be selected Seamless upload of cards from IdP to Selector transparent management for users

  17. A system for issuing OpenIDs with an Information Card Links the two ID system best of both worlds OpenID attributes can be set as a Information Card Claim Information card can be authenticated by that OpenID OpenID linked to the extended claims system of the Information Card Best of each to create a symbiotic ID system

  18. Requires additional HTML / JavaScript Recommended for web pages to allow user to select a Cloud Selector and Desktop Selector where appropriate / available. How are multiple Selectors to be addressed? Preconfigured to a single Selector Preconfigured dropdown list Dynamic list populated from discovery service. Requires additional HTML / JavaScript Recommended for web pages to allow user to select a Cloud Selector and Desktop Selector where appropriate / available. How are multiple Selectors to be addressed? Preconfigured to a single Selector Preconfigured dropdown list Dynamic list populated from discovery service.

  19. Digital Signing in the Cloud

  20. Digital certificates are user-unfriendly and unpopular People don t like to install software, including browser plug-ins Current solutions for signing on-line forms are open to denial of signing caused by only including form text in signature Therefore, to encourage digital signing, these issues must be addressed

  21. Avoco Secure have developed first truly Cloud based digital signing Can be used on: On any operating system Using any browser From desktops, laptops, mobile devices, phones and so on Signing does not require user to have X509, but standard PKCS#7 signature produced. Nothing to install fully Cloud based. Non-repudiation addressed.

  22. Always a problem to identify the signer Avoco generate repeatable RSA key pair from ID info e.g. Information Card claims OpenID attributes ATM Card numbers Passwords etc., etc. Exact data specified by host Key pair -> transient X509 used to sign with Cert and key pair destroyed after signing

  23. Image of the completed form incorporated into the digital signature

  24. Incorporates timestamp (RFC3161) Emails signature to user Signature verifiable by common tools as well as Avoco on-line verifier

  25. Controlling Access and Applying Usage Policies to Documents and Emails

  26. Controlling access to documents, emails using Identity Information from Information Cards secure2trust secure2email secure2access Claims used to: Control document and email access Apply usage policies, post access Done in a content centric manner Security is persistent across perimeters

  27. Susan Morrow Head of Product Development Avoco Secure susan.morrow@avocosecure.com

Related