SlideShare uma empresa Scribd logo
1 de 15
WiKID Systems, Inc. Nick Owen [email_address] 1375 Peachtree St Suite 600 Atlanta, GA.  30309 404-962-8983
WiKID Authentication System ,[object Object],[object Object],[object Object],[object Object],[object Object],Lower cost Ease of Use Secure Extensible
WiKID Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WiKID Architecture
Public key Public Key  ,[object Object],1. 2. WiKID server sends configuration file and its Public Key 2. 3. Simple Initial Validation of Users 3. User creates PIN 4. Server sends registration code awaits validation Completed in less than 15 seconds 4. 5.  User logs in using trusted credentials User enters registration code 6. Registration code sent to server and associated with key pair exchange 5. 6. If the Registration code is received from a trusted Network Client and matches the expected value, the device is automatically validated.
Secret key Public Key  Certificates ,[object Object],2. WiKID server decrypts PIN with Public Key and verifies.  Returns Passcode. Internet Internet 3. User enters Username and Passcode. Typical Usage  4. Application requests verification. 5. WiKID Server  Verifies Code. 6. User granted access. Average connection time of 4 seconds
Secret key Public Key  Certificates ,[object Object],2. WiKID server decrypts PIN with Public Key and verifies.  Returns Passcode. 5. User enters Username and Passcode. Mutual Authentication  6. Banking Application requests verification. 7. WiKID Server  Verifies Code. 8. User granted access. Average connection time of 4 seconds 3. Token client fetches and hashes SSL cert and compares 4. OTP and validated URL presented to user.  Default browser launched to site.
Your Enterprise Vendor Your Employees Application You control user enrollment & provisioning Vendors use WiKID SSL objects for web-enabled apps If an employee leaves, disable their account If you switch vendors, invalidate their certificate Each vendor has their own Domain and Certificate from your server No hardware to distribute to non-employees Vendors/Contractor employees Application Simple Cross Enterprise Strong Authentication
Network Clients ,[object Object],[object Object],[object Object],[object Object]
Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Administration Features ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secret key Public Key  Certificates 1. User selects reset domain & enters PIN. 2. WiKID server decrypts PIN with public key and verifies.  Returns Passcode. Internet Internet 3. WiKID Server pushes passcode to PDC as new password, flags for reset. LAN Password Reset  4.  User logs in with username and passcode . 5. User granted access, prompted to change password.
Layered Authentication User/Session Authentication Host/Mutual Authentication Transaction Authentication/Signing A Cryptographically Secure Approach Layered Authentication
Thanks! Nick Owen http://www.wikidsystems.com [email_address] 404-879-5227 For additional information, please contact:

Mais conteúdo relacionado

Mais procurados

802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
Sithideth Banavong
 

Mais procurados (20)

How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with Zos
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
 
CIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST APICIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST API
 
802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
 
Handlink Wi-Fi Kiosk
Handlink Wi-Fi Kiosk Handlink Wi-Fi Kiosk
Handlink Wi-Fi Kiosk
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native Era
 
Wireless Hotspot built into a printer
Wireless Hotspot built into a printerWireless Hotspot built into a printer
Wireless Hotspot built into a printer
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
Gravitee.io
Gravitee.ioGravitee.io
Gravitee.io
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Kerberos
KerberosKerberos
Kerberos
 

Destaque

Ness Software Product Labs Overview
Ness Software Product Labs OverviewNess Software Product Labs Overview
Ness Software Product Labs Overview
Puneet Mathur
 
Copia de clase lesiones hepaticas malignas 2
Copia de clase lesiones hepaticas malignas 2Copia de clase lesiones hepaticas malignas 2
Copia de clase lesiones hepaticas malignas 2
Jose Marin
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 

Destaque (17)

Sec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online BankingSec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online Banking
 
Management Innovation - Lecture
Management Innovation - LectureManagement Innovation - Lecture
Management Innovation - Lecture
 
Social Media Strategy V1 0
Social Media Strategy V1 0Social Media Strategy V1 0
Social Media Strategy V1 0
 
Mat narración documentada ppp esteban paco_ quintín
Mat narración documentada ppp esteban paco_ quintínMat narración documentada ppp esteban paco_ quintín
Mat narración documentada ppp esteban paco_ quintín
 
Noteringar kreativitet
Noteringar kreativitetNoteringar kreativitet
Noteringar kreativitet
 
Jag AB
Jag ABJag AB
Jag AB
 
Art Of Hip Hop
Art Of Hip HopArt Of Hip Hop
Art Of Hip Hop
 
Estilos de aprendizaje (1)
Estilos de aprendizaje (1)Estilos de aprendizaje (1)
Estilos de aprendizaje (1)
 
Cursillocole
CursillocoleCursillocole
Cursillocole
 
Du som varumärke_2009
Du som varumärke_2009Du som varumärke_2009
Du som varumärke_2009
 
Movable Type Presentation CMS Osaka Fes 2016
Movable Type Presentation CMS Osaka Fes 2016Movable Type Presentation CMS Osaka Fes 2016
Movable Type Presentation CMS Osaka Fes 2016
 
Proaktivt skapande av jobb
Proaktivt skapande av jobbProaktivt skapande av jobb
Proaktivt skapande av jobb
 
Finance for hackers
Finance for hackersFinance for hackers
Finance for hackers
 
Ness Software Product Labs Overview
Ness Software Product Labs OverviewNess Software Product Labs Overview
Ness Software Product Labs Overview
 
YES! I AM A REACTIONARY! MIHAI EMINESCU
YES! I AM A REACTIONARY! MIHAI EMINESCUYES! I AM A REACTIONARY! MIHAI EMINESCU
YES! I AM A REACTIONARY! MIHAI EMINESCU
 
Copia de clase lesiones hepaticas malignas 2
Copia de clase lesiones hepaticas malignas 2Copia de clase lesiones hepaticas malignas 2
Copia de clase lesiones hepaticas malignas 2
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 

Semelhante a The WiKID Strong Authentication Systems Overview

Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
Hai Nguyen
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...
Nordic Infrastructure Conference
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 

Semelhante a The WiKID Strong Authentication Systems Overview (20)

Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David JohanssonInfoSecurity Europe 2015 - Identities Exposed by David Johansson
InfoSecurity Europe 2015 - Identities Exposed by David Johansson
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainMGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
 
Application Security in ASP.NET Core
Application Security in ASP.NET CoreApplication Security in ASP.NET Core
Application Security in ASP.NET Core
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

The WiKID Strong Authentication Systems Overview

  • 1. WiKID Systems, Inc. Nick Owen [email_address] 1375 Peachtree St Suite 600 Atlanta, GA. 30309 404-962-8983
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. Your Enterprise Vendor Your Employees Application You control user enrollment & provisioning Vendors use WiKID SSL objects for web-enabled apps If an employee leaves, disable their account If you switch vendors, invalidate their certificate Each vendor has their own Domain and Certificate from your server No hardware to distribute to non-employees Vendors/Contractor employees Application Simple Cross Enterprise Strong Authentication
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Secret key Public Key Certificates 1. User selects reset domain & enters PIN. 2. WiKID server decrypts PIN with public key and verifies. Returns Passcode. Internet Internet 3. WiKID Server pushes passcode to PDC as new password, flags for reset. LAN Password Reset 4. User logs in with username and passcode . 5. User granted access, prompted to change password.
  • 14. Layered Authentication User/Session Authentication Host/Mutual Authentication Transaction Authentication/Signing A Cryptographically Secure Approach Layered Authentication
  • 15. Thanks! Nick Owen http://www.wikidsystems.com [email_address] 404-879-5227 For additional information, please contact: