FIDO Authenticator WWW CTAP (Client to Authenticator Protocol): Communication Between Platform and External Authenticator

Total Page:16

File Type:pdf, Size:1020Kb

Load more

THE FIDO STANDARDS AND WHY THEY MAKE SENSE IN THE SCOPE OF PSD2 ALAIN MARTIN MEMBER OF THE BOARD AND CO-CHAIR OF FIDO EUROPE WORKING GROUP, FIDO ALLIANCE VP STRATEGIC PARTNERSHIPS, GEMALTO 1 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO: FAST IDENTITY ONLINE • The FIDO Alliance is an open industry association with a focused mission: AUTHENTICATION STANDARDS • The world’s largest ecosystem 240 Member organisations for standards-based, interoperable authentication 450+ FIDO Certified solutions 2 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO SCOPE Single Sign-On MODERN AUTHENTICATION Federation Passwords Strong Risk-Based Authentication User Management Identity proofing/KYC 3 All Rights Reserved | FIDO Alliance | Copyright 2018 240 MEMBERS • 36 board members: + SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS 4 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO MARKETS • Banks • e-Commerce • Social media • Enterprise security • Government • … 5 All Rights Reserved | FIDO Alliance | Copyright 2018 HOW OLD AUTHENTICATION WORKS ONLINE CONNECTION User authenticate themselves online by presenting a human-readable “shared secret” • Inconvenient This is true of One Time • Phishable Passwords as well • Hackable 6 All Rights Reserved | FIDO Alliance | Copyright 2018 HOW FIDO AUTHENTICATION WORKS User Environment User Challenge Relying Party Authenticator User gesture before private key can be used (Touch, PIN entry, Biometric entry) Signed Response Private key Public key Local user verification step On-line authentication step 7 All Rights Reserved | FIDO Alliance | Copyright 2018 SIMPLER AUTHENTICATION Reduces reliance Single gesture Works with Same Fast and on complex to log on commonly used authentication on convenient passwords devices multiple devices 8 All Rights Reserved | FIDO Alliance | Copyright 2018 STRONGER AUTHENTICATION Based on No link-ability public key between services or cryptography accounts Keys Biometrics, if used, generated never leave device and stored on device No server-side No 3rd party in shared secrets the protocol 9 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO STANDARDS UAF: Universal Authentication Framework U2F: Universal 2nd Factor Multi Factor authentication (possession + Login & Password + possession factor knowledge/inherence) FIDO 2: a new standard for native support in (web) platforms WebAuthn: standard APIs allowing web pages WWW to call upon a FIDO authenticator WWW CTAP (Client to Authenticator Protocol): Communication between platform and external authenticator 10 All Rights Reserved | FIDO Alliance | Copyright 2018 WEBAUTHN BRINGS FIDO TO THE WEB BROWSER World Wide Web Consortium (W3C) developed Web Authentication (“WebAuthn”) with FIDO Alliance A new standard Contributions JavaScript API Participation Candidate That works with all FIDO2 from all these Recommendation platforms & authenticators platform providers 11 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO IS … MEMBERS & PARTNERS CERTIFICATIONS DEPLOYMENTS SPECIFICATIONS 12 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO EUROPE WORKING GROUP • Facilitate communication and cooperation within the European market • Promote deployment of FIDO solutions, improve FIDO awareness • Collect regulatory requirements from European stakeholders • Initial Scope: 13 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO & PSD2: PROVIDING FOR A SATISFACTORY USER EXPERIENCE 14 All Rights Reserved | FIDO Alliance | Copyright 2018 VOCABULARY For remote payment, includes: Transaction PSD2: Element categorised as amount and Payee possession PSD2: ASPSP PSD2: PSU FIDO: Authenticator FIDO: Relying Party FIDO: User PSD2: (not mentioned) FIDO: Challenge Authenticator User action PSD2: Authentication Code FIDO: Signed Response PSD2: Personalized Security Credential FIDO: Private key PSD2: (no equivalent) For remote payment: FIDO: Public key Authentication Code with dynamic linking 15 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO MEETS THE PSD2/RTS REQUIREMENTS • Based on Multi factor authentication ➔ Articles 4, 6, 7, 8 [RTS] • Secure separated execution environments ranging from hardened Software to TEE to Secure Elements ➔ Articles 9, 22, 23, 25 [RTS] • Support for dynamic linking ➔ Article 5 [RTS] 16 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO PROTECTS USER AUTHENTICATION DATA • No shared secrets • Bank keys are generated in the authenticator • Public Key is uploaded to bank’s server ➔ the security credential never leaves the authenticator • Local verification (of PIN, of biometric data) ➔ In line with GDPR’s “Privacy by Design” ➔ Facilitates deployment 17 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO SUPPORTS MULTI CHANNEL AUTHENTICATION • Necessity to reach 100% users ➔ multiple devices may be necessary Bank App • A FIDO universal server supports any FIDO compliant authenticator ➔FIDO Standards reduce the cost of deploying multiple devices FIDO server 18 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO COMES WITH A CERTIFICATION PROGRAM • Functional, by the FIDO Alliance • Security, by the FIDO Alliance and independent accredited labs • New biometrics certification ➔The RTS require security evaluation (Article 3 [RTS]) 19 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO WORKS IN ANY OF THE AUTHENTICATION MODELS • In the redirection model FIDO authenticator AISP ASPSP AISP Login Pswd Go Example on a PC/browser FIDO authenticator AISP ASPSP AISP Example on a smart phone, app-to-app 20 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO WORKS IN ANY OF THE AUTHENTICATION MODELS • In the decoupled model FIDO authenticator ASPSP Merchant Merchant PISP 21 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO WORKS IN ANY OF THE AUTHENTICATION MODELS • In the embedded model FIDO authenticator AISP AISP AISP Authenticate with your device Example for account information FIDO authenticator Merchant Merchant PISP PISP Approve Transaction Example for payment initiation 22 All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO SIMPLIFIES THE CUSTOMER JOURNEY With FIDO With SMS OTP Merchant Merchant PISP PISP FIDO authenticator ASPSP OTP: ASPSP Login 1 step Pswd ****** Authorise ASPSP authentication payment? Enter OTP: ****** Merchant 3 step Merchant authentication 23 All Rights Reserved | FIDO Alliance | Copyright 2018 KEY TAKE AWAYS • FIDO standards: a user friendly solution to implement PSD2 • Security and Privacy by design • Meet all the RTS requirements • Alignment with authorization frameworks • FIDO standards maximize reach • They support a multiplicity of devices • FIDO standards: versatile and future proof • Bank can support the redirection and decoupled models • Bank can propose the embedded model to TPPs that integrate FIDO authenticators in their solutions 24 All Rights Reserved | FIDO Alliance | Copyright 2018 Join the FIDO Ecosystem Build FIDO Certified Solutions Deploy Join the Alliance Take Part in FIDO Events www.fidoalliance.org 25 All Rights Reserved | FIDO Alliance | Copyright 2018.
Recommended publications
  • Support for U2F FIDO Tokens in Mobile Applications

    Support for U2F FIDO Tokens in Mobile Applications

    Masaryk University Faculty of Informatics Support for U2F FIDO tokens in mobile applications Bachelor’s Thesis Marek Hrašna Brno, Spring 2019 Masaryk University Faculty of Informatics Support for U2F FIDO tokens in mobile applications Bachelor’s Thesis Marek Hrašna Brno, Spring 2019 This is where a copy of the official signed thesis assignment and a copy ofthe Statement of an Author is located in the printed version of the document. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Marek Hrašna Advisor: RNDr. Petr Švenda Ph.D. i Acknowledgements I would like to express my gratitude to my advisor, RNDr. Petr Švenda Ph.D. his guidance, patience, and helpful advice throughout the mak- ing of this thesis. iii Abstract One of the biggest security problems on the Internet is the usage of weak credentials, such as passwords, for user authentication. Second- Factor Authentication (2FA) provides a valid answer to this threat. Still, there are many 2FA schemes vulnerable to prominent web threats such as phishing attacks. The U2F protocol provides a phishing-resistant 2FA solution, optionally based on secure hardware elements. This thesis provides an analysis of the security brought by the U2F authen- tication scheme and shows its real-world adaptation in mobile plat- forms. It discusses problems that occur while using commercial tokens implementing this standard and describes the process of installing a U2F applet onto a JavaCard while discussing possible problems that may occur.
  • Unpleasant Secure & Easy Just Bad Just Easy

    Unpleasant Secure & Easy Just Bad Just Easy

    Overview of the FIDO Alliance Overview of the FIDO Alliance: For the overwhelming majority of organizations, user-ID and password authentication has proven to be the path of least resistance in terms of initial deployment. Countless experiences over the last decade have taught organizations that login credentials are not particularly secure. For consumers, it’s not easy either, considering that it’s virtually impossible for each of us to remember the numerous passwords we’re now required to use in our daily lives. According to Microsoft, the average internet user with 25 accounts, performs 8 logins using 6.5 passwords daily. Organizations cannot adequately secure password and PIN authentication and their risk and costs are mounting at $5.5M per data breach, $15M yearly in password resets, and $60 per token replacement. Information Security professionals tend to believe that authentication is a continuum – it could be described as easy to use, if insecure at one end, and hard to use, but secure at the other. You simply pick your level of security and then dial up the corresponding level of pain that you will inflict on your users. The FIDO Alliance believes that authentication can best be represented by a quadrant chart with ease of use on one axis and security on the other. The top right quadrant represents solutions that are simultaneously more secure and easier to use. Authentication is not a Continuum High Unpleasant Secure & Easy Security Just Bad Just Easy Low Low High Usability Today, it’s estimated that there are more than 100 proprietary authentication vendors, a number that historically has increased at a rate of about a dozen a year for the last several years.
  • Functional Certification Program Policy January 2019

    Functional Certification Program Policy January 2019

    Functional Certification Program Policy January 2019 Version 1.3.7 FIDO Functional Certification Program Policy Table of Contents 1 Introduction0B 10 1.1 Audience11B 10 2 Overall1B Functional Certification Policies 11 2.1 FIDO12B First Implementer 11 2.2 Universal Server 12 2.3 Specification13B Version Retirement (Sunset Dates for Specifications) 12 2.4 PolicyB Version Retirement (Sunset Dates for Policy) 13 2.4.1 Functional39B Certification Policy Sunset Dates 13 3 Functional2B Certification Process Overview 15 4 Conformance3B Self-Validation 17 4.1 FIDO15B Test Tools 17 4.1.1 Test40B Tool Maintenance 18 4.2 Reference16B Implementations 18 4.2.1 FIDO2 Reference Implementations 19 5 Interoperability4B Testing 20 5.1 Informal17B (Non-Certification) Testing 21 5.2 Interoperability18B Testing Events 21 5.2.1 Remote41B Interoperability Testing 22 5.2.2 Event42B Logistics 22 5.2.3 Event43B Registration 22 5.2.3.1 Confidential Certification 23 5.2.4 Pre44B -Interop Event Testing 23 5.2.5 Re45B -Testing 23 5.2.6 Interoperability46B Testing Event Criteria 24 5.3 On19B Demand Testing 25 5.3.1 New47B Technology 26 5.3.2 Reference48B Implementation Library 26 5.3.2.1 Donating Implementations 26 5.3.2.2 Reference Implementation Library Management 27 5.3.3 49B On Demand Testing Options 27 ©2018 | FIDO Alliance – All Rights Reserved. Page | 2 FIDO Functional Certification Program Policy 5.3.3.1 Virtual 28 5.3.3.2 Shipped 28 5.3.3.3 In-Person 29 5.3.4 50B Registration 30 5.3.4.1 Book a Testing Slot 30 5.3.5 51B Pre-Testing 31 5.3.6 52B Test Facilitation
  • Security Keys: Practical Cryptographic Second Factors for the Modern Web

    Security Keys: Practical Cryptographic Second Factors for the Modern Web

    Security Keys: Practical Cryptographic Second Factors for the Modern Web Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas Google, Inc., Mountain View, CA, USA Abstract. \Security Keys" are second-factor devices that protect users against phishing and man-in-the-middle attacks. Users carry a single de- vice and can self-register it with any online service that supports the protocol. The devices are simple to implement and deploy, simple to use, privacy preserving, and secure against strong attackers. We have shipped support for Security Keys in the Chrome web browser and in Google's online services. We show that Security Keys lead to both an increased level of security and user satisfaction by analyzing a two year deployment which began within Google and has extended to our consumer-facing web applications. The Security Key design has been standardized by the FIDO Alliance, an organization with more than 250 member companies spanning the industry. Currently, Security Keys have been deployed by Google, Dropbox, and GitHub. An updated and extended tech report is available at https://github.com/google/u2f- ref-code/docs/SecurityKeys_TechReport.pdf. 1 Introduction Recent account takeovers [1{3] have once again highlighted the challenge of securing user data online: accounts are often protected by no more than a weak password [4] and whatever implicit signals (if any) that the online service provider has collected to distinguish legitimate users from account hijackers. Academic research has produced numerous proposals to move away from passwords, but in practice such efforts have largely been unsuccessful [5, 6]. In- stead, many service providers augment password-based authentication with a second factor in the form of a one-time passcode (OTP), e.g., [7, 8].
  • Updates & Overview

    Updates & Overview

    FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 All Rights Reserved | FIDO Alliance | Copyright 2017 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS 2 All Rights Reserved | FIDO Alliance | Copyright 2017 THE WORLD HAS A PASSWORD PROBLEM 81% Data breaches in 65% 2016 that involved Increase in 1,093 weak, default, or phishing attacks Breaches in 2016, 1 stolen passwords over the number of a 40% increase attacks recorded over 20153 in 20152 CLUMSY | HARD TO REMEMBER | NEED TO BE CHANGED ALL THE TIME 1Verizon 2017 Data Breach Report |2Anti-Phishing Working Group | 3Identity Theft Resource Center 2016 3 All Rights Reserved | FIDO Alliance | Copyright 2017 HOW OLD AUTHENTICATION WORKS ONLINE CONNECTION The user authenticates themselves online by presenting a human-readable “shared secret” 4 All Rights Reserved | FIDO Alliance | Copyright 2017 THE NEW MODEL Fast IDentity Online open standards for simpler, stronger authentication using public key cryptography 5 All Rights Reserved | FIDO Alliance | Copyright 2017 HOW FIDO AUTHENTICATION WORKS LOCAL CONNECTION The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography ONLINE CONNECTION 6 All Rights Reserved | FIDO Alliance | Copyright 2017 SIMPLER AUTHENTICATION Reduces reliance on Single gesture Works with commonly Same authentication Fast and convenient complex passwords
  • FIDO Certification Program Policy Authenticator Certification

    FIDO Certification Program Policy Authenticator Certification

    FIDO Certification Program Policy Authenticator Certification Version 1.3 September 2020 ©2020 | FIDO Alliance - All Rights Reserved 2 Revision History Date Version Description Sunset Date 2017-04-20 1.0.0 Approved by CWG. 2017-08-10 Update to Confidentiality section to clarify that anonymized N/A information must be approved by the Vendor prior to being 2017-08-10 1.0.1 shared outside of the Security Secretariat. Approved by CWG. First draft of 1.1.0 to add L4 and L5 to the Policy. 2017-11-02 1.1.0r01 Shared with CWG. Updated to reflect the approved level naming scheme and 2018-04-23 1.1.1 FIDO2 Certification. Updated to reflect the FIAR process for Derivative, Delta and 2019-10-10 1.2 Recertification. Updates related mainly to the introduction of the new L3 TBD 1.3 companion program ©2020 | FIDO Alliance - All Rights Reserved 3 Contents 1 Introduction ................................................................................................................................................... 8 1.1 FIDO Certification Program .................................................................................................................. 8 1.2 FIDO Authenticator Certification ......................................................................................................... 8 1.3 FIDO Functional Certification Prerequisite ......................................................................................... 8 1.4 Audience ...............................................................................................................................................
  • FIDO UAF Webauthentication Assertion Format

    FIDO UAF Webauthentication Assertion Format

    FIDO UAF WebAuthentication Assertion Format FIDO Alliance Proposed Standard 20 October 2020 This version: https://fidoalliance.org/specs/fido-uaf-v1.2-ps-20201020/fido-uaf-webauthn-v1.2-ps-20201020.html Editor: Dr. Rolf Lindemann, Nok Nok Labs, Inc. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2013-2020 FIDO Alliance All Rights Reserved. Abstract This document defines the assertion format "WAV1CBOR" in order to use Web Authentication assertions through the FIDO UAF protocol. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current FIDO Alliance publications and the latest revision of this technical report can be found in the FIDO Alliance specifications index at https://fidoalliance.org/specifications/. This document was published by the FIDO Alliance as a Proposed Standard. If you wish to make comments regarding this document, please Contact Us. All comments are welcome. Implementation of certain elements of this Specification may require licenses under third party intellectual property rights, including without limitation, patent rights. The FIDO Alliance, Inc. and its Members and any other contributors to the Specification are not, and shall not be held, responsible in any manner for identifying or failing to identify any or all such third party intellectual property rights. THIS FIDO ALLIANCE SPECIFICATION IS PROVIDED “AS IS” AND WITHOUT ANY WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY EXPRESS OR IMPLIED WARRANTY OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  • A Tale of Two Studies: the Best and Worst of Yubikey Usability

    A Tale of Two Studies: the Best and Worst of Yubikey Usability

    A Tale of Two Studies: The Best and Worst of YubiKey Usability †∗ ∗ ∗ ∗ z ∗ Joshua Reynolds , Trevor Smith , Ken Reese , Luke Dickinson , Scott Ruoti , Kent Seamons y ∗ z University of Illinois at Urbana-Champaign, Brigham Young University, MIT Lincoln Laboratory [email protected], ftsmith, ken.reese, [email protected], [email protected], [email protected] Abstract—Two-factor authentication (2FA) significantly device that authenticates the user after the user presses a improves the security of password-based authentication. button on the security key [8]. The button tap is a test of Recently, there has been increased interest in Universal 2nd user presence and prevents malware on the host device from Factor (U2F) security keys—small hardware devices that require users to press a button on the security key to authenticate. To using the security key surreptitiously. Most commonly, security examine the usability of security keys in non-enterprise usage, keys are designed to be plugged into a USB port, though we conducted two user studies of the YubiKey, a popular line they can also communicate with other devices using wireless of U2F security keys. The first study tasked 31 participants protocols (e.g., NFC, Bluetooth). with configuring a Windows, Google, and Facebook account to U2F security keys are designed to be easy-to-adopt and authenticate using a YubiKey. This study revealed problems with setup instructions and workflow including users locking use in day-to-day life, while protecting users against phishing themselves out of their operating system or thinking they had and man-in-the-middle attacks [8].
  • Of Two Minds About Two-Factor: Understanding Everyday FIDO U2F

    Of Two Minds About Two-Factor: Understanding Everyday FIDO U2F

    Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling Stéphane Ciolino, OneSpan Innovation Centre & University College London; Simon Parkin, University College London; Paul Dunphy, OneSpan Innovation Centre https://www.usenix.org/conference/soups2019/presentation/ciolino This paper is included in the Proceedings of the Fifteenth Symposium on Usable Privacy and Security. August 12–13, 2019 • Santa Clara, CA, USA ISBN 978-1-939133-05-2 Open access to the Proceedings of the Fifteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling Stéphane Ciolino Simon Parkin Paul Dunphy OneSpan Innovation Centre University College London OneSpan Innovation Centre & University College London [email protected] [email protected] [email protected] Abstract words and tokens) is widely recognized as an effective tech- Security keys are phishing-resistant two-factor authentica- nique to protect both corporate and personal online accounts tion (2FA) tokens based upon the FIDO Universal 2nd Factor against account hijacking threats. Indeed, there are already ex- (U2F) standard. Prior research on security keys has revealed amples of citizens being advised to use Two-Factor Authenti- intuitive usability concerns, but there are open challenges to cation (2FA) by government agencies (as in the UK [35]). The better understand user experiences with heterogeneous de- most common second factor is a One-Time Passcode (OTP) vices and to determine an optimal user experience for every- received via a text message to a mobile device [5].
  • U2F & UAF Tutorial

    U2F & UAF Tutorial

    U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues 1 2 Password might be Password could be stolen entered into untrusted from the server App / Web-site (“phishing”) 4 Inconvenient to type password on phone 3 Too many passwords to remember à re-use / cart abandonment OTP Issues 1 OTP vulnerable to real- time MITM and MITB attacks 4 Inconvenient to type OTP on phone 3 OTP HW tokens are expensive and people 2 don’t want another device SMS security questionable, especially when Device is the phone Implementation Challenge A Plumbing Problem User Verification Methods Applications Organizations Silo 1 Silo 2 App 1 Silo 3 App 2 Silo N ? ? New App Authentication Needs Do you want to login? Do you want to transfer $100 to Frank? Do you want to ship to a new address? Do you want to delete all of your emails? Do you want to share your dental record? Authentication today: Ask user for a password (and perhaps a one time code) Authentication & Risk Engines Purpose Geolocation … (from IP addr.) Explicit Authentication Authentication Risk Engine Server Summary 1. Passwords are insecure and inconvenient especially on mobile devices 2. Alternative authentication methods are silos and hence don‘t scale to large scale user populations 3. The required security level of the authentication depends on the use 4. Risk engines need information about the explicit authentication security for good decision How does FIDO work? Device FIDO
  • FIDO Security Reference

    FIDO Security Reference

    REVIEW DRAFT FIDO Security Reference FIDO Alliance Review Draft 25 May 2021 This version: https://fidoalliance.org/specs/common-specs/fido-security-ref-v2.1-rd-20210525.html Previous version: https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html Editor: Rolf Lindemann, Nok Nok Labs, Inc. Contributors: Davit Baghdasaryan, Nok Nok Labs, Inc. Brad Hill, PayPal, Inc. Dr. Joshua E. Hill, InfoGard Laboratories Douglas Biggs, InfoGard Laboratories Copyright © 2013-2021 FIDO Alliance All Rights Reserved. Abstract This document analyzes the security properties of FIDO UAF, FIDO U2F and FIDO 2 (i.e. CTAP and Web Authentication) specifications. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current FIDO Alliance publications and the latest revision of this technical report can be found in the FIDO Alliance specifications index at https://fidoalliance.org/specifications/. This document was published by the FIDO Alliance as a Review Draft. This document is intended to become a FIDO Alliance Proposed Standard. If you wish to make comments regarding this document, please Contact Us. All comments are welcome. This is a Review Draft Specification and is not intended to be a basis for any implementations as the Specification may change. Permission is hereby granted to use the Specification solely for the purpose of reviewing the Specification. No rights are granted to prepare derivative works of this Specification. Entities seeking permission to reproduce portions of this Specification for other uses must contact the FIDO Alliance to determine whether an appropriate license for such use is available.
  • Qualcomm® Snapdragon Sense™ ID 3D Fingerprint Technology

    Qualcomm® Snapdragon Sense™ ID 3D Fingerprint Technology

    Asaf Ashkenazi, Director of Product Management Qualcomm Technologies, Inc. Qualcomm® Snapdragon Sense™ ID 3D fingerprint technology 1 Qualcomm Snapdragon Sense is a product of Qualcomm Technologies, Inc. Qualcomm® Snapdragon™ processors in the leading devices 825+ 85+ 1, 0 8 0 + designs in development manufacturers shipping devices announced or with Snapdragon commercially available in FY’14 As of Sep. ’14: Qualcomm Snapdragon is a product of Qualcomm T echnologies, Inc. 2 A mobile technology leader 919M MSM™ chipset shipments in FY’14 1B + 5th Gen Android smartphones 3G/4G multimode modem announced Source: Qualcomm T echnologies, Inc. data Qualcomm Snapdragon, Qualcomm Gobi and MSM are products of Qualcomm T echnologies, Inc. 3 Qualcomm® Security Solutions Robust, multi-dimensional security Content Protection Trusted content protection, so users can enjoy the latest 4K Ultra HD content from movie studios Enterprise & Authentication BYOD Developing Security solutions authentication Qualcomm® that help ensure that alternatives such SecureMSM™ corporate networks as biometrics and can safely and important related Technology securely connect standards like with employee and FIDO corporate owned devices Theft Deterrence Enabling users to remotely lock their mobile device if it’s lost or stolen, and then unlock it if it’s found Qualcomm Secur eMSM is a product of Qualcomm Technologies, Inc. 4 Proud Member of the FIDO Alliance Working with other FIDO members to create a world beyond passwords • End-to-end security • Incorporating the FIDO UAF