SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
0
Managing & Securing the Online
and Mobile Banking Transaction
18th March 2015
Chew Chee Seng
ManagePay Group
Malaysia
ManagePay Group
Business Presentation
1 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Mobile device is the new normal for computing
“Global mobile devices and connections in 2013 grew to 7 billion, up from
6.5 billion in 2012. Smartphones accounted for 77 percent of that growth,
with 406 million net additions in 2013.” - Cisco 2014 –
“80% of Smartphones Used in the Workplace are Employee Owned”
- McKinsey 2012 -
“Smart phones and tablets are giving people new levels of mobile
connectivity, and we expect to be able to use them for work and leisure.”
Whether in private or in workplace, the demand for security has arisen to
protect business critical information, communication and IT processes against
threats like unauthorized access, data leakage, espionage, identity theft and
fraud, and denial of service.
2 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
OTP: Security Past its Expiration Date
• For more than 25
years, the financial
services industry has
relied on one-time
passwords for online
banking security.
• The advent of Internet
and mobile technology
and an explosion in
digital crime have
rendered these single-
use strings of digits
obsolete, both in
terms of security and
convenience.
3 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
All OTP systems share the same inherent flaws
• OTP-based authentication systems,
– The OTPs are generated as either time-synchronized or counter-synchronized codes
and it requires the user to carry a small hardware device, i.e. a “Token”, which may
look like a small calculator or a keychain charm with an LCD display.
– Some banks generate and dispatch OTPs to the customer’s mobile phone via SMS
which is referred to as Transaction Authorization Code (TAC)
• OTP systems share the same flaws and vulnerabilities.
– First, they are all symmetric because the bank has access to the same secrets as its
customer (and the mobile carrier does too, in the case of SMS transmission).
– Secondly, OTP systems all remain reliant on browser-based communications back to
the bank & Anything that goes through a browser can be compromised by a Trojan!!
– Trojan-enabled “man-in-the-middle” or “man-in-the-browser” attacks circumvent
the security promised by sophisticated-looking OTP generators, chip cards and
biometric technology.
– According to Kasperksy Labs, 2013 saw an almost twenty-fold increase in the
number of recorded banking trojans, many of them targeting SMS OTPs
4 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
if OTPs are the past, what’s the future?
• For financial institutions intent on providing a
secure and convenient method for customers to
transact online, there are new solutions
available today that can virtually eliminate
all types of man-in-the-middle attacks.
• Deploying industry-standard X.509
digital certificates to mobile phones and
tablets allows them to be uniquely identified,
transforming them into second factors of
authentication.
5 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
What is two-factor authentication
There are three (3) types/factors of human authentication :
• Something you know – a password or PIN
• Something you have – a smart card, USB key, PKI (Public Key
Infrastructure) certificate or mobile phone
• Something you are – a biometric characteristic, e.g. fingerprint or
voice pattern
two-factor authentication means that you authenticate a user with two
or more factors. Ideally, different authentication factors should be used in
combination.
Mobile PKI is a technology which allows users to place PKI certificates
(electronic signatures) with their mobile phone, and the mobile phone
will ask the user for his or her PIN before he/she places his/her electronic
signature onto transactions that requires multiple authentication.
6 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Why Mobile PKI Security?
• The mobile phone is everywhere and available to almost everyone. By
2015, the number of mobile phones should exceed world population.
• Today, more people own and use a mobile phone than a personal
computer. Mobile penetration in Malaysia is way above 100%.
• So is mobile PKI (Public Key Infrastructure) security:
– Every mobile phone and every other device (Internet of Things) i.e. smart
watch, CCTV, wearables) that works with a SIM card supports mobile PKI.
• Legally bind:
– All transactions are digitally signed with non-repudiation as provisioned by
the Digital Signature Act.
– Avoid disputes and provide better customer service and experience.
7 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Single ID for Multiple Applications
8 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Mobile ID or Mobile Signature for Banks
Mobile PKI on
SIM’s SE
Certificate
Authority
9 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Licensed CA
Banks
Government
Agencies
Corporate
Entities
Merchants
Service Provider Aggregator
MSSP
MSSP
Mobile
Operators
WAP
SMS
USSD
App
Service Request
Auth Request
Generate
Signature
Request
SignatureRequest
Signature Request
Cancel OK
Pay RMXXX from
your Acc 123456789
to Mr. Aan Smith.
Please confirm with
signature
Signature (Transaction encrypted at SIM)
CA
Signature(Transaction
encrypted)
Signature
attached with
CertSignature & Cert
Decrypt
Trans & Verify
Signature
Proceed with
Service
Service Fulfillment
Cancel OK
Key in PIN to sign
PIN: ******
Mobile Signature
Service Platform
How it works?
RCA
10 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Licensed CA
MSSP
Mobile Signature
Service Platform
Service Delivery
Channels
Bank Data Center
Priority Internet/Mobile
Banking
Smart Phone/Tablet
Application
Relationship Manager
Customer accesses
service
Relationship
Mgr Initiated
auth Request
Priority Banking
Internet/Mobile Banking
Application Servers
Certificate
Authority
MNO
Customer Interacts with
Relationship Manager
Authentication
request
Authentication
Request
Create
Signature
Request
Signature RequestSignature Request
Cancel OK
Please key in
Signing PIN
******
Cancel OK
Signature Sent
Signature Signature Attach
Certificate
Verify
Signature and
Decide on
Transaction
Return
Confirmation
Return Confirmation
Priority Banking
Customer
Signature
with
Certificate
Implementation for High Net Worth Individual Banking
11 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Licensed CA
MSSP
Mobile Signature
Service Platform
Certificate
Authority
Priority Banking
Customer
Relationship
Manager
Please proceed
with my transfer of
RM 500,000 from
my current account
to a fixed deposit
Sure Mr. Lee,
please confirm the
transaction with
your digital
signature
Priority
Banking
CRM System
Bank Data Center
CRM Application
servers
MNO
Phone interaction
Key in
transaction and
initiate auth
request
Auth Request
AuthRequest
Create
signature
request
Signature RequestSignature Request
Cancel OK
Transfer of
RM500,000 from
current acct to
fixed deposit
Cancel OK
Please confirm
with digital
signature
PIN: ******
Cancel OK
Signature Sent
Signature Signature
Attach
digital
certificate
Signatureand
Certificate
Verify
signature and
confirm
transaction
Return confirmation
Thanks Mr. Lee.
We’ve received
your signature and
your transfer is
confirmed
Wow, that was fast.
Thanks very much
Cancel OK
Transaction
confirmed
Customer and Money Transfer Transaction Flow
12 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved
Thank you…
Chew Chee Seng
cheseng@mpsb.net
+60122188433

Mais conteúdo relacionado

Mais procurados

MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internetevidos
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access ControlAdrian Young
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCloudIDSummit
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesUbisecure
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key InfrastructureChin Wan Lim
 
e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance ExecutiveseSignLive by VASCO
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 

Mais procurados (20)

MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
13_2
13_213_2
13_2
 
AY - Adaptive Access Control
AY - Adaptive Access ControlAY - Adaptive Access Control
AY - Adaptive Access Control
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for Microservices
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 
Loqr
LoqrLoqr
Loqr
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key Infrastructure
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executives
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 

Destaque

Incorporating Gate Variability in Airline Block Planning
Incorporating Gate Variability in Airline Block PlanningIncorporating Gate Variability in Airline Block Planning
Incorporating Gate Variability in Airline Block PlanningJoshua Marks
 
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...Amazon Web Services
 
Business intelligence and airline operational improvement
Business intelligence and airline operational improvementBusiness intelligence and airline operational improvement
Business intelligence and airline operational improvementJoshua Marks
 
Lost Airlines of the USA - The major air carriers no longer flying
Lost Airlines of the USA - The major air carriers no longer flyingLost Airlines of the USA - The major air carriers no longer flying
Lost Airlines of the USA - The major air carriers no longer flyingdestinworld
 
US Air and America West Merger
US Air and America West MergerUS Air and America West Merger
US Air and America West MergerRelly242
 
Empowering smes with mobile payment
Empowering smes with mobile paymentEmpowering smes with mobile payment
Empowering smes with mobile paymentChunJia Sio
 
Airline and Airport Big Data: Impact and Efficiencies
Airline and Airport Big Data: Impact and EfficienciesAirline and Airport Big Data: Impact and Efficiencies
Airline and Airport Big Data: Impact and EfficienciesJoshua Marks
 

Destaque (7)

Incorporating Gate Variability in Airline Block Planning
Incorporating Gate Variability in Airline Block PlanningIncorporating Gate Variability in Airline Block Planning
Incorporating Gate Variability in Airline Block Planning
 
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
 
Business intelligence and airline operational improvement
Business intelligence and airline operational improvementBusiness intelligence and airline operational improvement
Business intelligence and airline operational improvement
 
Lost Airlines of the USA - The major air carriers no longer flying
Lost Airlines of the USA - The major air carriers no longer flyingLost Airlines of the USA - The major air carriers no longer flying
Lost Airlines of the USA - The major air carriers no longer flying
 
US Air and America West Merger
US Air and America West MergerUS Air and America West Merger
US Air and America West Merger
 
Empowering smes with mobile payment
Empowering smes with mobile paymentEmpowering smes with mobile payment
Empowering smes with mobile payment
 
Airline and Airport Big Data: Impact and Efficiencies
Airline and Airport Big Data: Impact and EfficienciesAirline and Airport Big Data: Impact and Efficiencies
Airline and Airport Big Data: Impact and Efficiencies
 

Semelhante a Managing & Securing the Online and Mobile banking - Chew Chee Seng

All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet securitySuraj Pratap
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)Thinksoft Global
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...IJNSA Journal
 
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...IJNSA Journal
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptxElbekXolmatov
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 

Semelhante a Managing & Securing the Online and Mobile banking - Chew Chee Seng (20)

Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet security
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptx
 
Computer's project
Computer's projectComputer's project
Computer's project
 
120 i143
120 i143120 i143
120 i143
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 

Mais de Knowledge Group

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Knowledge Group
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Knowledge Group
 
Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Knowledge Group
 
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for BanksLeonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for BanksKnowledge Group
 
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...Knowledge Group
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudKnowledge Group
 
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...Knowledge Group
 
Steven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingSteven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingKnowledge Group
 
David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!Knowledge Group
 
Andrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyAndrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyKnowledge Group
 
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...Knowledge Group
 

Mais de Knowledge Group (16)

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
 
Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream)
 
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for BanksLeonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
 
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
 
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
 
Steven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingSteven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed Banking
 
David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!
 
Andrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyAndrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New Technology
 
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Managing & Securing the Online and Mobile banking - Chew Chee Seng

  • 1. 0 Managing & Securing the Online and Mobile Banking Transaction 18th March 2015 Chew Chee Seng ManagePay Group Malaysia ManagePay Group Business Presentation
  • 2. 1 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Mobile device is the new normal for computing “Global mobile devices and connections in 2013 grew to 7 billion, up from 6.5 billion in 2012. Smartphones accounted for 77 percent of that growth, with 406 million net additions in 2013.” - Cisco 2014 – “80% of Smartphones Used in the Workplace are Employee Owned” - McKinsey 2012 - “Smart phones and tablets are giving people new levels of mobile connectivity, and we expect to be able to use them for work and leisure.” Whether in private or in workplace, the demand for security has arisen to protect business critical information, communication and IT processes against threats like unauthorized access, data leakage, espionage, identity theft and fraud, and denial of service.
  • 3. 2 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved OTP: Security Past its Expiration Date • For more than 25 years, the financial services industry has relied on one-time passwords for online banking security. • The advent of Internet and mobile technology and an explosion in digital crime have rendered these single- use strings of digits obsolete, both in terms of security and convenience.
  • 4. 3 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved All OTP systems share the same inherent flaws • OTP-based authentication systems, – The OTPs are generated as either time-synchronized or counter-synchronized codes and it requires the user to carry a small hardware device, i.e. a “Token”, which may look like a small calculator or a keychain charm with an LCD display. – Some banks generate and dispatch OTPs to the customer’s mobile phone via SMS which is referred to as Transaction Authorization Code (TAC) • OTP systems share the same flaws and vulnerabilities. – First, they are all symmetric because the bank has access to the same secrets as its customer (and the mobile carrier does too, in the case of SMS transmission). – Secondly, OTP systems all remain reliant on browser-based communications back to the bank & Anything that goes through a browser can be compromised by a Trojan!! – Trojan-enabled “man-in-the-middle” or “man-in-the-browser” attacks circumvent the security promised by sophisticated-looking OTP generators, chip cards and biometric technology. – According to Kasperksy Labs, 2013 saw an almost twenty-fold increase in the number of recorded banking trojans, many of them targeting SMS OTPs
  • 5. 4 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved if OTPs are the past, what’s the future? • For financial institutions intent on providing a secure and convenient method for customers to transact online, there are new solutions available today that can virtually eliminate all types of man-in-the-middle attacks. • Deploying industry-standard X.509 digital certificates to mobile phones and tablets allows them to be uniquely identified, transforming them into second factors of authentication.
  • 6. 5 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved What is two-factor authentication There are three (3) types/factors of human authentication : • Something you know – a password or PIN • Something you have – a smart card, USB key, PKI (Public Key Infrastructure) certificate or mobile phone • Something you are – a biometric characteristic, e.g. fingerprint or voice pattern two-factor authentication means that you authenticate a user with two or more factors. Ideally, different authentication factors should be used in combination. Mobile PKI is a technology which allows users to place PKI certificates (electronic signatures) with their mobile phone, and the mobile phone will ask the user for his or her PIN before he/she places his/her electronic signature onto transactions that requires multiple authentication.
  • 7. 6 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Why Mobile PKI Security? • The mobile phone is everywhere and available to almost everyone. By 2015, the number of mobile phones should exceed world population. • Today, more people own and use a mobile phone than a personal computer. Mobile penetration in Malaysia is way above 100%. • So is mobile PKI (Public Key Infrastructure) security: – Every mobile phone and every other device (Internet of Things) i.e. smart watch, CCTV, wearables) that works with a SIM card supports mobile PKI. • Legally bind: – All transactions are digitally signed with non-repudiation as provisioned by the Digital Signature Act. – Avoid disputes and provide better customer service and experience.
  • 8. 7 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Single ID for Multiple Applications
  • 9. 8 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Mobile ID or Mobile Signature for Banks Mobile PKI on SIM’s SE Certificate Authority
  • 10. 9 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Licensed CA Banks Government Agencies Corporate Entities Merchants Service Provider Aggregator MSSP MSSP Mobile Operators WAP SMS USSD App Service Request Auth Request Generate Signature Request SignatureRequest Signature Request Cancel OK Pay RMXXX from your Acc 123456789 to Mr. Aan Smith. Please confirm with signature Signature (Transaction encrypted at SIM) CA Signature(Transaction encrypted) Signature attached with CertSignature & Cert Decrypt Trans & Verify Signature Proceed with Service Service Fulfillment Cancel OK Key in PIN to sign PIN: ****** Mobile Signature Service Platform How it works? RCA
  • 11. 10 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Licensed CA MSSP Mobile Signature Service Platform Service Delivery Channels Bank Data Center Priority Internet/Mobile Banking Smart Phone/Tablet Application Relationship Manager Customer accesses service Relationship Mgr Initiated auth Request Priority Banking Internet/Mobile Banking Application Servers Certificate Authority MNO Customer Interacts with Relationship Manager Authentication request Authentication Request Create Signature Request Signature RequestSignature Request Cancel OK Please key in Signing PIN ****** Cancel OK Signature Sent Signature Signature Attach Certificate Verify Signature and Decide on Transaction Return Confirmation Return Confirmation Priority Banking Customer Signature with Certificate Implementation for High Net Worth Individual Banking
  • 12. 11 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Licensed CA MSSP Mobile Signature Service Platform Certificate Authority Priority Banking Customer Relationship Manager Please proceed with my transfer of RM 500,000 from my current account to a fixed deposit Sure Mr. Lee, please confirm the transaction with your digital signature Priority Banking CRM System Bank Data Center CRM Application servers MNO Phone interaction Key in transaction and initiate auth request Auth Request AuthRequest Create signature request Signature RequestSignature Request Cancel OK Transfer of RM500,000 from current acct to fixed deposit Cancel OK Please confirm with digital signature PIN: ****** Cancel OK Signature Sent Signature Signature Attach digital certificate Signatureand Certificate Verify signature and confirm transaction Return confirmation Thanks Mr. Lee. We’ve received your signature and your transfer is confirmed Wow, that was fast. Thanks very much Cancel OK Transaction confirmed Customer and Money Transfer Transaction Flow
  • 13. 12 Strictly Private & Confidential – Property of ManagePay Group All Rights Reserved Thank you… Chew Chee Seng cheseng@mpsb.net +60122188433