Smart Card Talk a Quarterly Newsletter for Members and Friends of the Smart Card Alliance May 2016

Total Page:16

File Type:pdf, Size:1020Kb

Smart Card Talk a Quarterly Newsletter for Members and Friends of the Smart Card Alliance May 2016 Smart Card Talk A quarterly newsletter for members and friends of the Smart Card Alliance May 2016 In This Issue: ② Executive Director Letter >> A Message From the ③ Latin America Letter >> Executive Director ④ Profile >> It’s been a few months since I’ve talked about the government ⑥ Feature Article >> market, and with our 2016 Government Conference coming ⑩ Council Reports >> up in a few weeks, I’ve turned my attention to the government security marketplace. I hope you’ll join us for Securing Federal Identity 2016, which On the Web: will be held on June 6th at the Ronald Reagan International Alliance in the News >> Trade Center Building in Washington, DC. This issue of the newsletter also features updates on Alliance Councils, a profile Members in the News >> of our newest Internet of Things (IoT) Security Council, new members and CSCIP and CSEIP recipients. Sincerely, Smart Card Alliance Events Randy Vanderhoof SECURING Executive Director, Smart Card Alliance FEDERAL IDENTITY2016 06.06.16 RONALD REAGAN BUILDING GOVERNMENT EVENT WASHINGTON, D.C. Click to Read Letter ... SecuringFederalID.com Securing Federal Identity 2016 June 6, 2016 Ronald Reagan Building Washington, D.C. GlobalPlatform TEE Conference 2016 Call for Papers – Speakers are invited to participate in the world’s only dedicated trusted execution environ- ment (TEE) conference: Next Generation Mobile Feature Article: Profile: Security for Today and Tomorrow Conference, Smart Card Technology and the Internet of Things which will take place in October 2016 in Santa FIDO Protocols Security Council Clara, CA. Today, the FIDO Alliance is working to pro- In the spring issue of 2016, Smart Card Talk vide simpler, stronger authentication to re- spoke with Executive Director Randy Van- duce reliance on usernames and passwords, derhoof about the organization’s new Inter- which are susceptible to a wide range of at- net of Things (IoT) Security Council, which OCTOBER 19-20 CHICAGO, IL tacks. This month’s article provides an over- was formed to develop and promote best view of the FIDO authentication standards practices and provide educational resources Security of Things Conference and describes how smart card technology on implementing secure IoT architectures October 19-20, 2016 can enhance the security of FIDO protocol by using embedded security and privacy. Hilton Rosemont Chicago O’Hare implementations. Chicago, Illinois Click to Read More … Click to Read More … A Look at the Government Security Marketplace Dear Members and Friends of the credentials for administrators with access privileges to the most Alliance, secure systems so that breaches of personal information, like last year’s OPM data breach, will not be repeated. In this month’s letter to our Smart Card Alliance organization mem- What I heard during the preparation is that infrastructure interop- bers, I turn my attention to our gov- erability remains the “devil in the details” for faster adoption, par- ernment security marketplace. It has ticularly with mobile credentials. When most of the federal enter- been a few months since I’ve talked prise mobile infrastructure was built on the Blackberry operating about the government market; much system platform, development and testing could be concentrated attention instead has gone into the on a few smart phone models and a common mobile management complex payments industry migra- system approach. However, now there are Apple and Android and tion to EMV chip cards and our ef- Windows devices, and still some Blackberry devices, that need to forts in forming the new IoT Security be supported, with multiple mobile operating system revision lev- Council. But we have our annual Government Conference com- els running on multiple smart phone devices. Developing a testing ing up in a few weeks, so I think it would be wise to share some program to validate all of the use cases to meet the identity man- insights into the Alliance efforts in education, industry collabora- agement and authentication requirements for encryption services tion, and training that is supporting government use of HSPD-12 and mobile access to remote networks will be challenging, as de- based PIV credentials. mand for such services is increasing. The 2016 Government Conference event, Securing Federal Iden- I learned that the biggest challenge to using PIV credentials for tity 2016, will be held on June 6th at the Ronald Reagan Interna- two-factor authentication in government IT networks is that fed- tional Trade Center Building in Washington, DC. The event has eral CIOs need to evaluate all of the existing IT services that rely undergone a complete make-over from previous years. What we on Windows log-in and legacy system access rules before develop- came to realize is that, more than anything, most people wanted to ing a solution that will replace current approaches with the certif- learn about the new identity management and security programs icate-based PIV smart card credential. Likewise, those IT systems that are coming, rather than look back on past successes and exist- in need of strong two-factor authentication lack uniform means ing standards and policies for using chip-enabled PIV credentials of access, run on different types of PC platforms and mainframe for physical access for the federal market. servers, and require the addition of a smart card reader at every access point to leverage the two-factor authentication the PIV cre- In the past, we held a three-day event at the Washington Conven- dential provides over weaker and more easily compromised user tion Center with over 75 speakers and multiple tracks covering names and passwords. executive director’s corner executive director’s every aspect of identity, security, biometrics, and healthcare. It was costly for industry participants to attend and for government It is the challenge for technology providers and standards groups to workers to devote three days from their schedules to sit through all work with their government customers to come up with the solu- of the tracks and talk with scores of exhibitors. tions that work across this wide array of infrastructure conditions. I am confident that our Smart Card Alliance members will lever- The Securing Federal Identity 2016 event is a one-day, highly-fo- age their experience with commercial clients and overseas markets cused and high-energy event that will concentrate on how federal to find the solutions that meet these challenges and adapt to the agencies are using PIV and PIV-I credentials as strong, two-factor changing hardware and software needs of our federal enterprise authentication devices to secure federal networks. It will also focus customers. If you are interested in the government identity man- on how federal programs are extending the usage of the PIV cre- agement and access security markets, you should definitely plan dential’s identity management and authentication capabilities to on attending the June 6th Securing Federal Identity 2016 event. mobile devices through the use of derived credentials. The agenda features a select group of mostly federal government speakers, and Thank you for your continued support. we will have room for a small group of government security indus- try exhibitors who will highlight the present capabilities and the Sincerely, future direction of the government’s efforts to replace user names and passwords on desktops and mobile devices and use PIV-based authentication to log into Microsoft Windows-based network sys- tems and legacy systems for all federal agencies. Randy Vanderhoof In preparing for this event, I worked closely with our federal and Executive Director, Smart Card Alliance industry contacts. Doing so, I learned of the renewed commit- [email protected] ment to further adoption of the PIV card to replace weaker log-in 2 Smart Card Talk latin america corner Transformation Moves Forward Dear Members and Friends of the cultures within their institutions. They are rewarded by the market Smart Card Alliance Latin America and their employees, and are viewed as important icons of society, (SCALA), wisdom, knowledge, innovation, riches, efficiency, and collabo- ration. They offer their customers the tools to accomplish a high Today we find ourselves in the middle level of existence while connecting the world with services and of a digital transformation, where it solutions. Some examples are Google, Samsung, Apple, Facebook, seems that services, processes, com- WhatsApp, YouTube, Netflix, Skype, Uber and Amazon. panies, and governments are chang- ing their core businesses to serve the In this context and to promote this digital transformation, we have needs of a population that demands created The Digital Tour – Americas, organized in collaboration transparency, efficiency, speed, con- with the Banking Association of Panama (ABP). We also have sup- venience, and personal attention, all port from the Latin American and Caribbean Council for Civil of which can only be provided through a digital medium. The Registration, Identity, and Vital Statistics (CLARCIEV), the Latin transformation process has not been equitable for all. American Security Association (ALAS), the Panamanian Public Health Society (SPSP), the National Bureau of Science, Technol- It wasn’t too long ago that I remember a period when tablets, cell ogy, and Innovation (SENACYT), the Public Registry of Panama phones, and other digital means of customer service didn’t exist. (RPP), and the Panamanian Association of Company Executives I still recall all of the processes that were completed in person, on (APEDE), among others. These organizations are focused on the paper, signed and handwritten; that created long lines in public implementation of systems that facilitate interaction with their cli- institutions such as banks; that resulted in office file cabinets filled ents/citizens and at the same time remain at the forefront of tech- to the top and lost paperwork; and that required return trips to nology advances. resolve a small but vital procedure such as getting a letter notarized or adding extra postage stamps.
Recommended publications
  • Unpleasant Secure & Easy Just Bad Just Easy
    Overview of the FIDO Alliance Overview of the FIDO Alliance: For the overwhelming majority of organizations, user-ID and password authentication has proven to be the path of least resistance in terms of initial deployment. Countless experiences over the last decade have taught organizations that login credentials are not particularly secure. For consumers, it’s not easy either, considering that it’s virtually impossible for each of us to remember the numerous passwords we’re now required to use in our daily lives. According to Microsoft, the average internet user with 25 accounts, performs 8 logins using 6.5 passwords daily. Organizations cannot adequately secure password and PIN authentication and their risk and costs are mounting at $5.5M per data breach, $15M yearly in password resets, and $60 per token replacement. Information Security professionals tend to believe that authentication is a continuum – it could be described as easy to use, if insecure at one end, and hard to use, but secure at the other. You simply pick your level of security and then dial up the corresponding level of pain that you will inflict on your users. The FIDO Alliance believes that authentication can best be represented by a quadrant chart with ease of use on one axis and security on the other. The top right quadrant represents solutions that are simultaneously more secure and easier to use. Authentication is not a Continuum High Unpleasant Secure & Easy Security Just Bad Just Easy Low Low High Usability Today, it’s estimated that there are more than 100 proprietary authentication vendors, a number that historically has increased at a rate of about a dozen a year for the last several years.
    [Show full text]
  • Functional Certification Program Policy January 2019
    Functional Certification Program Policy January 2019 Version 1.3.7 FIDO Functional Certification Program Policy Table of Contents 1 Introduction0B 10 1.1 Audience11B 10 2 Overall1B Functional Certification Policies 11 2.1 FIDO12B First Implementer 11 2.2 Universal Server 12 2.3 Specification13B Version Retirement (Sunset Dates for Specifications) 12 2.4 PolicyB Version Retirement (Sunset Dates for Policy) 13 2.4.1 Functional39B Certification Policy Sunset Dates 13 3 Functional2B Certification Process Overview 15 4 Conformance3B Self-Validation 17 4.1 FIDO15B Test Tools 17 4.1.1 Test40B Tool Maintenance 18 4.2 Reference16B Implementations 18 4.2.1 FIDO2 Reference Implementations 19 5 Interoperability4B Testing 20 5.1 Informal17B (Non-Certification) Testing 21 5.2 Interoperability18B Testing Events 21 5.2.1 Remote41B Interoperability Testing 22 5.2.2 Event42B Logistics 22 5.2.3 Event43B Registration 22 5.2.3.1 Confidential Certification 23 5.2.4 Pre44B -Interop Event Testing 23 5.2.5 Re45B -Testing 23 5.2.6 Interoperability46B Testing Event Criteria 24 5.3 On19B Demand Testing 25 5.3.1 New47B Technology 26 5.3.2 Reference48B Implementation Library 26 5.3.2.1 Donating Implementations 26 5.3.2.2 Reference Implementation Library Management 27 5.3.3 49B On Demand Testing Options 27 ©2018 | FIDO Alliance – All Rights Reserved. Page | 2 FIDO Functional Certification Program Policy 5.3.3.1 Virtual 28 5.3.3.2 Shipped 28 5.3.3.3 In-Person 29 5.3.4 50B Registration 30 5.3.4.1 Book a Testing Slot 30 5.3.5 51B Pre-Testing 31 5.3.6 52B Test Facilitation
    [Show full text]
  • Everything You Need to Know About Crypto Management Contents
    Everything you need to know about Crypto Management Contents The New Data Security Landscape ......................................................................................3 Encryption ..........................................................................................................................3 What About the Cryptographic Keys? ................................................................................4 Building a Crypto Foundation ............................................................................................4 The Four V’s Model ............................................................................................................5 1. Crypto Processing and Acceleration ..............................................................................6 Gemalto Integration Ecosystem ........................................................................................6 2. Key Storage .......................................................................................................................7 Centralized key storage (keys stored in hardware) ..........................................................7 Distributed key storage (keys stored at the endpoints) ....................................................8 3. Key Lifecycle Management .............................................................................................9 Key generation and certification ......................................................................................9 Key distribution ..................................................................................................................9
    [Show full text]
  • Updates & Overview
    FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 All Rights Reserved | FIDO Alliance | Copyright 2017 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS 2 All Rights Reserved | FIDO Alliance | Copyright 2017 THE WORLD HAS A PASSWORD PROBLEM 81% Data breaches in 65% 2016 that involved Increase in 1,093 weak, default, or phishing attacks Breaches in 2016, 1 stolen passwords over the number of a 40% increase attacks recorded over 20153 in 20152 CLUMSY | HARD TO REMEMBER | NEED TO BE CHANGED ALL THE TIME 1Verizon 2017 Data Breach Report |2Anti-Phishing Working Group | 3Identity Theft Resource Center 2016 3 All Rights Reserved | FIDO Alliance | Copyright 2017 HOW OLD AUTHENTICATION WORKS ONLINE CONNECTION The user authenticates themselves online by presenting a human-readable “shared secret” 4 All Rights Reserved | FIDO Alliance | Copyright 2017 THE NEW MODEL Fast IDentity Online open standards for simpler, stronger authentication using public key cryptography 5 All Rights Reserved | FIDO Alliance | Copyright 2017 HOW FIDO AUTHENTICATION WORKS LOCAL CONNECTION The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography ONLINE CONNECTION 6 All Rights Reserved | FIDO Alliance | Copyright 2017 SIMPLER AUTHENTICATION Reduces reliance on Single gesture Works with commonly Same authentication Fast and convenient complex passwords
    [Show full text]
  • FIDO Certification Program Policy Authenticator Certification
    FIDO Certification Program Policy Authenticator Certification Version 1.3 September 2020 ©2020 | FIDO Alliance - All Rights Reserved 2 Revision History Date Version Description Sunset Date 2017-04-20 1.0.0 Approved by CWG. 2017-08-10 Update to Confidentiality section to clarify that anonymized N/A information must be approved by the Vendor prior to being 2017-08-10 1.0.1 shared outside of the Security Secretariat. Approved by CWG. First draft of 1.1.0 to add L4 and L5 to the Policy. 2017-11-02 1.1.0r01 Shared with CWG. Updated to reflect the approved level naming scheme and 2018-04-23 1.1.1 FIDO2 Certification. Updated to reflect the FIAR process for Derivative, Delta and 2019-10-10 1.2 Recertification. Updates related mainly to the introduction of the new L3 TBD 1.3 companion program ©2020 | FIDO Alliance - All Rights Reserved 3 Contents 1 Introduction ................................................................................................................................................... 8 1.1 FIDO Certification Program .................................................................................................................. 8 1.2 FIDO Authenticator Certification ......................................................................................................... 8 1.3 FIDO Functional Certification Prerequisite ......................................................................................... 8 1.4 Audience ...............................................................................................................................................
    [Show full text]
  • FIDO UAF Webauthentication Assertion Format
    FIDO UAF WebAuthentication Assertion Format FIDO Alliance Proposed Standard 20 October 2020 This version: https://fidoalliance.org/specs/fido-uaf-v1.2-ps-20201020/fido-uaf-webauthn-v1.2-ps-20201020.html Editor: Dr. Rolf Lindemann, Nok Nok Labs, Inc. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2013-2020 FIDO Alliance All Rights Reserved. Abstract This document defines the assertion format "WAV1CBOR" in order to use Web Authentication assertions through the FIDO UAF protocol. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current FIDO Alliance publications and the latest revision of this technical report can be found in the FIDO Alliance specifications index at https://fidoalliance.org/specifications/. This document was published by the FIDO Alliance as a Proposed Standard. If you wish to make comments regarding this document, please Contact Us. All comments are welcome. Implementation of certain elements of this Specification may require licenses under third party intellectual property rights, including without limitation, patent rights. The FIDO Alliance, Inc. and its Members and any other contributors to the Specification are not, and shall not be held, responsible in any manner for identifying or failing to identify any or all such third party intellectual property rights. THIS FIDO ALLIANCE SPECIFICATION IS PROVIDED “AS IS” AND WITHOUT ANY WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY EXPRESS OR IMPLIED WARRANTY OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals
    Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals Dilpreet Singh, Ron Ruhl and Hamman Samuel Information System Security and Management Department, Concordia University College of Alberta, 7128 Ada Blvd NW, Edmonton, AB, Canada Keywords: EMV, EMV Transaction Process, Attack, Attack Tree Methodology, Point of Sale Terminal, PCIDSS. Abstract: Europay, MasterCard and Visa (EMV) is a dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. One goal of the EMV protocol is to secure debit and credit transactions at a point-of-sale (POS) terminal, but still there are vulnerabilities, which can lead to unauthorized disclosure of cardholder data. This research paper will provide the reader with a single document listing the vulnerabilities leading to various possible attacks against EMV payment card transaction process at a POS terminal. Attack tree methodology will be used to document these vulnerabilities. This research will also provide the countermeasures against various possible attacks. 1 INTRODUCTION 2.1.1 Application Selection For 25 years, EMV has implemented payment cards EMV cards may contain multiple applications which initially used a magnetic stripe only but now (Debit/Credit/ATM) and files supporting the contain a chip microprocessor which processes applications. On inserting the EMV card into the payments at POS devices. This research examines POS terminal, the terminal requests to read the EMV when the card is present at a POS terminal and will file “1PAY.SYS.DDF01” listing the applications use attack tree methodology to describe the security that the chip card contains. After successful of dynamic data authentication and combined data application selection, the card sends the Processing authentication (DDA/CDA) EMV cards.
    [Show full text]
  • U2F & UAF Tutorial
    U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues 1 2 Password might be Password could be stolen entered into untrusted from the server App / Web-site (“phishing”) 4 Inconvenient to type password on phone 3 Too many passwords to remember à re-use / cart abandonment OTP Issues 1 OTP vulnerable to real- time MITM and MITB attacks 4 Inconvenient to type OTP on phone 3 OTP HW tokens are expensive and people 2 don’t want another device SMS security questionable, especially when Device is the phone Implementation Challenge A Plumbing Problem User Verification Methods Applications Organizations Silo 1 Silo 2 App 1 Silo 3 App 2 Silo N ? ? New App Authentication Needs Do you want to login? Do you want to transfer $100 to Frank? Do you want to ship to a new address? Do you want to delete all of your emails? Do you want to share your dental record? Authentication today: Ask user for a password (and perhaps a one time code) Authentication & Risk Engines Purpose Geolocation … (from IP addr.) Explicit Authentication Authentication Risk Engine Server Summary 1. Passwords are insecure and inconvenient especially on mobile devices 2. Alternative authentication methods are silos and hence don‘t scale to large scale user populations 3. The required security level of the authentication depends on the use 4. Risk engines need information about the explicit authentication security for good decision How does FIDO work? Device FIDO
    [Show full text]
  • FIDO Security Reference
    REVIEW DRAFT FIDO Security Reference FIDO Alliance Review Draft 25 May 2021 This version: https://fidoalliance.org/specs/common-specs/fido-security-ref-v2.1-rd-20210525.html Previous version: https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html Editor: Rolf Lindemann, Nok Nok Labs, Inc. Contributors: Davit Baghdasaryan, Nok Nok Labs, Inc. Brad Hill, PayPal, Inc. Dr. Joshua E. Hill, InfoGard Laboratories Douglas Biggs, InfoGard Laboratories Copyright © 2013-2021 FIDO Alliance All Rights Reserved. Abstract This document analyzes the security properties of FIDO UAF, FIDO U2F and FIDO 2 (i.e. CTAP and Web Authentication) specifications. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current FIDO Alliance publications and the latest revision of this technical report can be found in the FIDO Alliance specifications index at https://fidoalliance.org/specifications/. This document was published by the FIDO Alliance as a Review Draft. This document is intended to become a FIDO Alliance Proposed Standard. If you wish to make comments regarding this document, please Contact Us. All comments are welcome. This is a Review Draft Specification and is not intended to be a basis for any implementations as the Specification may change. Permission is hereby granted to use the Specification solely for the purpose of reviewing the Specification. No rights are granted to prepare derivative works of this Specification. Entities seeking permission to reproduce portions of this Specification for other uses must contact the FIDO Alliance to determine whether an appropriate license for such use is available.
    [Show full text]
  • Qualcomm® Snapdragon Sense™ ID 3D Fingerprint Technology
    Asaf Ashkenazi, Director of Product Management Qualcomm Technologies, Inc. Qualcomm® Snapdragon Sense™ ID 3D fingerprint technology 1 Qualcomm Snapdragon Sense is a product of Qualcomm Technologies, Inc. Qualcomm® Snapdragon™ processors in the leading devices 825+ 85+ 1, 0 8 0 + designs in development manufacturers shipping devices announced or with Snapdragon commercially available in FY’14 As of Sep. ’14: Qualcomm Snapdragon is a product of Qualcomm T echnologies, Inc. 2 A mobile technology leader 919M MSM™ chipset shipments in FY’14 1B + 5th Gen Android smartphones 3G/4G multimode modem announced Source: Qualcomm T echnologies, Inc. data Qualcomm Snapdragon, Qualcomm Gobi and MSM are products of Qualcomm T echnologies, Inc. 3 Qualcomm® Security Solutions Robust, multi-dimensional security Content Protection Trusted content protection, so users can enjoy the latest 4K Ultra HD content from movie studios Enterprise & Authentication BYOD Developing Security solutions authentication Qualcomm® that help ensure that alternatives such SecureMSM™ corporate networks as biometrics and can safely and important related Technology securely connect standards like with employee and FIDO corporate owned devices Theft Deterrence Enabling users to remotely lock their mobile device if it’s lost or stolen, and then unlock it if it’s found Qualcomm Secur eMSM is a product of Qualcomm Technologies, Inc. 4 Proud Member of the FIDO Alliance Working with other FIDO members to create a world beyond passwords • End-to-end security • Incorporating the FIDO UAF
    [Show full text]
  • Industry Perspectives on the Evolution of EMV Payment Tokenization
    Industry Perspectives on the Evolution of EMV Payment Tokenization Revised May 6, 2019 [Original release date September 24, 2018] Susan Pandy, Ph.D. and Marianne Crowe, Federal Reserve Bank of Boston Marianne Crowe is Vice President and Susan Pandy is Director in the Payments Strategies Group at the Federal Reserve Bank of Boston. The views expressed in this paper are solely those of the authors and do not reflect official positions of the Federal Reserve Banks of Boston or the Federal Reserve System. Mention or display of a trademark, proprietary product or firm in this report does not constitute an endorsement or criticism by the Federal Reserve Bank of Boston or the Federal Reserve System and does not imply approval to the exclusion of other suitable products or firms. The authors would like to thank members of the MPIW and other industry stakeholders for their engagement and contributions to this report. Table of Contents Executive Summary ...................................................................................................................................... 3 I. Introduction ............................................................................................................................................ 4 II. Changes between EMV Payment Tokenisation Specification v1.0 versus v2.0 .................................... 5 III. Impacts of Evolution of Payment Tokenization on the Mobile Payments Landscape ........................... 7 A. Emergence Third Party Token Service Providers (TSPs) ...............................................................
    [Show full text]
  • FIDO White Paper SCA Delegation to Merchants Or Wallet
    FIDO Alliance White Paper: FIDO for SCA Delegation to Merchants or Wallet Providers March 2021 Editors: Jonathan Grossar, Mastercard Alain Martin, Thales Melanie Maier, Entersekt Bernard Joly, OneSpan Felix Magedanz, Hanko Arshad Noor, StrongKey © 2021 FIDO Alliance. All rights reserved. FIDO for SCA Delegation to Merchants or Wallet Providers Abstract The authentication of consumers during remote transactions has undeniable benefits in terms of security and approval rates but raises concerns of transactions being abandoned by consumers, as those consumers are not always able to authenticate properly to their banks. Merchants and wallet providers have an existing relationship with consumers, and there is an opportunity to leverage authentication mechanisms established during that relationship to authenticate to remote transactions as a delegation of the bank’s authentication. This white paper reviews the different authentication mechanisms that can be used by merchants or wallet providers in the context of Strong Customer Authentication (SCA) Delegation and explains why FIDO is best positioned to meet the requirements from regulatory authorities, banks, merchants, or wallet providers. FIDO is an industry standard designed to authenticate consumers with a high level of security and privacy but with minimal friction, and the implementation of FIDO standards is scalable across multiple consumer devices and platforms, making FIDO the recommended solution for SCA Delegation. Audience This paper is intended for: • Merchants, Payment Service Providers, and wallet providers interested in implementing a FIDO solution to authenticate consumers as a delegation of a bank’s authentication. • Banks interested in understanding the benefits of FIDO in SCA Delegation, including how the implementation of FIDO meets their requirements.
    [Show full text]