Mobilepki
Mobilepki
Practical Experiences of PKI-enabled Applications and Implications for Mass Deployment of e-IDs
Conference on
Cryptology and digital Content Security An activity of MATHESS, a NEST coordination activity of the EC CRM, Bellaterra, 15 de mayo 2007
Agenda
The World Internet Security Company
On Wisekey PKI today: - challenges - PKI & PKO - DNI-e Mass deployments tools: - Wisekey CertfyID Blackbox Wisekey references Conclusions
Wisekeys development
The World Internet Security Company
1999
Developing Countries
Deploying infrastructures with the ITU
Technology Platform
Unicert Gold CA Platform (HP)
2001
e-Voting
first ever binding Internet Vote Biometric enabled PKI evoting for Blind
eVoting Solutions
2003
Intelligent cities
DestiNY USA
2005
Device & Content Protection Object eIDs
Securing objects (silicon, luxury goods, materials)
NIS partnership
Microsoft, HP, WISeKey ID cards, drivers permits, passports...
2007
Wisekey SA
The World Internet Security Company
Geneva, Switzerland, 1999 e-ID specialization Our vision is to enable the volume deployment of eIDs in a way that is cost effective and easy to integrate with existing IT backbones From supplier of digital certificates to supplier of certificate-enabled solutions and services On site, hosted, managed and/or ASP models Signs a strategic e-ID partnership with Microsoft (Brussels, June 2006) M.DeSmedt ex SrVP MSFT EMEA becomes an investor and Board Member in 2007
Wisekey ELA
The World Internet Security Company
Joint venture of Wisekey SA and Veliba-Sectec for the development of the business model in Spain and LatinAmerica Initiates operations as of 2007 in Madrid, Barcelona, Bilbao Secure facility under construction in Bilbao 2008 Initiates operations in LatinAmerica for local joint ventures
Agenda
The World Internet Security Company
On Wisekey PKI today: - challenges - PKI & PKO - DNI-e Mass deployments tools: - Wisekey CertfyID Blackbox Wisekey references Conclusions
Internet has scaled over four decades - showing exponential growth - and becoming mission critical Internet continues to augment its bandwidth - Internet2 - IPv6 But Internet suffers from architecture constraints related to some of its founding assumptions: - principle of trust - computers always in fixed locations and always connected
An old problem
The World Internet Security Company
No. of e-IDs
Business Partners Automation (B2B)
Company (B2E)
Customers (B2C)
Mobility
Time
2000s
Customers
Suppliers
Collaboration Outsourcing Faster business cycles; process automation Value chain
Employees
M&A Mobile/global workforce Flexible/temp workforce
Remote employees
Partners
Demand vectors
The World Internet Security Company
Yes, PKI but we must not forget* that security (1) is a chain; its only as secure as its weakest link (2) is a process, not a product
* Bruce Schneier
Applicability
The World Internet Security Company
Usage
Access Control
User management
Digital Identity
but
In fact they now exist (DNI-e et al.) The above refers to authenticating individuals in the meantime there is an explosion of authentication requirements for servers, devices, digital content, etc And, in fact, PKI-enabled solutions for addressing individuals are now becoming economically attractive The first issue to recognize is that we are dealing with an infrastructure element, and its attractiveness is a function of the ROI for the first solution it supports (einvoicing, email encryption, SSO, etc)
PKIs ROI - Tangible & intangible - Current and future (perceptions) - Comparative to alternatives (incl. do-nothing) - Direct economic returns - Legislative drivers related to traceability McKinsey-Gartners new technology acceptance curve: - PKI is emerging embedded in many apps
Open PKI (Public Key Infrastructure) Integrated use of certificates to authenticate individuals across disparate public- and privatesector applications Closed PKI (Public Key Infrastructure) Use of broader PKI services but limited to use by one enterprise or a closed community of business partners, users or devices
PKO (Public Key Operations) Integrated use of certificates within one application or service for limited key management uses
DRIVERS
SCOPE
SIZE
NO. IN EU Tens
EXAMPLES
OPEN PKI
e-GOVERMENT G2C
RECOGNIZED
Millions
DNI-e
CLOSED PKI
B2B, B2C
ADVANCED
Thousands Thousands
SSO
PKO OPERATIONS
INTERNAL
STANDARD
Tens
Millions
em encryption
Political agenda - EC Lisbon 2010 - e-government goals - EC Digital Signature Directive - Application to Spanish law - DNI-e project (across different party majorities) Volume deployment of certificates - 500k since March 2006 - Authentication and signature certs - New law in Parliament for Electronic Administration 2007 forces all public transactions via internet 2010
DNI-e impact
The World Internet Security Company
Infrastructures (keyboards et al.), public transactions and both individual and private sector awareness DNI-e as the registration facilitator for the obtention of other credentials Immediate complementary needs to surface: - other CAs - signature platforms - identity management across systems
Solutions to emit and manage certificate lifecycles - in an economic manner - and easily integrateable (SOA) Value added services - time stamping - OCSP - secure vault - etc International interoperability schemes
Agenda
The World Internet Security Company
On Wisekey PKI today: - challenges - PKI & PKO - DNI-e Mass deployments tools: - Wisekey CertfyID Blackbox Wisekey references Conclusions
WISeKey : - Trust model international, neutral, commercially Microsoft Platform provides: acceptable, policy and governance structure - Commercially widespread platform - Full technology stack with tested and certified - Globally available support andDelivery through: training components - Certifications and accreditationsLocalEAL4) - (CC partners - Widespread knowledgeable &-technical resources - Secure infrastructure hosting, and operations Affiliates - Affiliate and partner network support - Strong security program & update/patch cycle - Certificate support in base engineering specs - Common interface and usage across product families
CertifyID Platform
The World Internet Security Company
Exchange SPS
.Net Framework
Active Dicrectory
Microsoft Platform provides: MSMQ RAS - CC EAL4 certification - Industrial class millions of certificates Windows Media Services Transaction Service - Strong security program & update/patch cycle - Common interface andFile Service Distributed usage across product families IIS - Long term platform base
RMS APS .NET
Windows Kernel
Common Mgmt Infra Consistent Interfaces Single Sign-On
Windows Server
Office 2003
Guardian
Timestamp ARM
MMS, ISA, AD
BizTalk CS2002
Trust Service :
WISeKey verifies and certifies your organisations identity so that your users and devices electronic identities can be trusted and recognised globally.
- Self or 3rd party audit depending on Trust Class .Net Framework Active Dicrectory - Global multilateral and commercial acceptability of eIDs MSMQ RAS - Microsoft Root Certificate Progam - Apple Leopard OS X 10.5 Windows Media Services Transaction Service - Mozilla, Nokia, etc. pending
Distributed File Service RMS IIS APS .NET
Windows Kernel
Common Mgmt Infra Consistent Interfaces Single Sign-On
Windows Server
MMS, ISA
Server
WMI Kerberos SmartCard PKI VPN
Windows Media Services Other Apps Transaction Service Distributed File Service IIS APS .NET
Windows Kernel
CA
Consistent Interfaces
Guardian (C++) :
.Net Framework
Active Dicrectory
- Certificate Service Exit Module MSMQ RAS - Saves all certificates, status, history to MS SQL DB - Disaster recovery from MS SQL DB to MS SQL DB
Windows Media Services Distributed File Service RMS IIS APS .NET
Transaction Service
Recovery console
Windows Kernel
CA
Consistent Interfaces
MS SQL DB
Single Sign-On
Guardian XM provides professional grade database redundancy and data persistency services for Certification Authorities on the Microsoft Windows Windows Server Server platform.
CRL Manager
The World Internet Security Company
Exchange, SPS, BizTalk, MMS, ISA SQL Server Visual Studio .NET
Single Sign-On
Windows Server - Monitor and replicate revocation information - Detect fault conditions and alert operators Dicrectory .Net Framework Active
MSMQ Windows Media Services Distributed File Service RMS RAS Transaction Service IIS APS .NET
Windows Kernel
CA
Common Mgmt Infra
OCSP Server
The World Internet Security Company
OCSP Server (C/C++): Provides real time validation of certificates. Can interface directly with the Certificate Services DB, or via Guardian SQL DB for more efficient performance. Supports pre-built responses and distributed OCSP for large scale scenarios. - IETF RFC 2560 compliant - use CRLs, or provides real time responses - Pre-built responses for distributed OCSP, using SQL 2005 DB replication - Integrated with IIS ISAPI extension
Clients
CA
OCSP
OCSP DB
Exchange, SPS, BizTalk, MMS, Directory Server (ADAM) / Certificate Publisher (C++/C# ) : SQL Server
ISA
.Net Framework
Active Dicrectory
WMI
- Publish to WISeKey Global Directory Service (GDS) for universal accessibility MSMQ RAS Kerberos - Reliably publish certificates to local and/or external Directory instances - Multi-master replication and directory scaling Windows Media Services Transaction Service SmartCard - Optionally remove revoked and/or expired certificates Directory Srv - Schema conformance to ISI-MTT, Federal Govt, Distributed File Service IIS PKI (ADAM) and others on demand
RMS APS .NET VPN
Windows Kernel
Common Mgmt Infra
CA
Consistent Interfaces
Single Sign-On
Provides a highly available and reliable directory service (LDAP), with flexible certificate publishing whose schema can conform to be compliant the ISIS-MTT PKI management specification, and other governmentWindows Server specifications.
URA
The World Internet Security Company
Universal Registration Authority (C++/C# ) : Provides a registration authority interface and certificate lifecycle manager that interfaces with multiple load balanced CAs in the backend, designed for scalability to millions of users and certificates. ASP .Net application that is network load balanced across several servers using MS SQL 2005 as data store. Configuration data, user account, authentication, templates, certificates, requests etc. are stored in SQL 2005 database. Authentication can be done against LDAP. Used in CertifyID Trust Center Managed PKI services, and with Stand-alone CAs at customer sites. Clients
CA
URA Web
URA DB
The CertifyID Blackbox offers a complete and affordable out-of-the-box solution for establishing a Trusted Identity Infrastructure dedicated to your organization.
35
Partners
The World Internet Security Company
Athena SCS Aladdin Gemalto HP IBM idQuantique MCI Microsoft NCP NDS Novell OASIS Omnikey Precise Biometrics SafeNet Secure Video Processor Alliance
Agenda
The World Internet Security Company
On Wisekey PKI today: - challenges - PKI & PKO - DNI-e Mass deployments tools: - Wisekey CertfyID Blackbox Wisekey references Conclusions
References
The World Internet Security Company
Executive Summary
To move to a secure, interoperable web based system that enforces mandatory strong authentication access control and encryption of information and data.
Business Challenge
Customization of CPS and policy sets, lightly to meet client needs. Reviewing the entire certificate lifecycle, system design, auditability, security in conjunction with KPMG as a trusted neutral party. Hosting of a custom portal solution based on the WISeKey Universal Registration Authority.
Finance
Organisation of cooperating Financial Institutions.
Switzerland
References
The World Internet Security Company
Executive Summary
The financial sector of this retail company needed to use digital certificates for their internal financial system and for email exchange.
Business Challenge
Implementation of a dedicated CA for our client, for the usage of certificates within their financial system, defined the type of certificates to be issued.
Retail
Privately-held, international, low-cost home products retailer
Switzerland, Sweden and Belgium
Benefit
Greater data confidentiality No technical knowledge for the client No cost for technical maintenance Low cost
References
The World Internet Security Company
Executive Summary
The Client PKI is designed to ensure secure communications and system access to protect confidential information between departments within the organizations and most importantly from external parties.
Business Challenge
Implementation of the core infrastructure used to protect the Clients systems and data. This core infrastructure is based on WISeKeys CertifyID Solution and Trust Infrastructure. Customization of operational procedures; technical design, implementation; legal documents and agreements; and service operation.
International Organization
IO dedicated to pursuing justice and prosecuting international crimes that fall within their mandate, namely genocide, war crimes, and crimes against humanity.
The Client chose WISeKeys CertifyID Solution as the basis of their PKI, because of its Trust Framework, its tight integration with the Microsoft Windows Platform and the essential enhancing elements that it adds to Windows Certificate Services.
References
The World Internet Security Company
Executive Summary
The DVB Multimedia Home Platform (MHP) is the software interface between interactive digital TV applications and the terminals on which those applications execute. Such terminals are typically set-topboxes or integrated digital TVs, both of which are also known as MHP receivers, platforms, hosts or clients. The DVB Project Office chose WISeKey to design, implement, host and manage the Public Key Infrastructure that is used to secure MHP applications. WISeKey is the designated Certificate Services Provider and Operator for the DVB MHP PKI.
Business Challenge
Multimedia Home Platform is the open standard platform for interactive TV and multimedia services. MHP is based on Internet and web standards, so it offers compatibility and convergence between TV and the Internet. DVB thus needed to implement a MHP security mechanism that defines the security requirements for the consumer, the service provider and the broadcaster, using a security mechanism that provides confidentiality, integrity, availability, privacy and nonreputability.
DVB
The Digital Video Broadcasting - DVB Industry consortium dedicated to authoring international DTV standards.
Switzerland
Project Management.
Implementation of DVB MHP PKI, legal, technical, security and operational infrastructure. Provide DVB MHP Operator functions and services. Legal consulting including organization structure, production certificate practice statement, certificate policies, and end user agreements. Outsourced service operation.
References
The World Internet Security Company
Executive Summary
SVP is an open technology specification for protecting digital video content. Applying the SVP specification to any standard video processor turns it into an SVP-compliant video processor that can protect digital content end-to-end.
Business Challenge
The SVP Alliance Licensing Authority chose WISeKey securely host Trusted SVP Roots that are at the heart of the SVP Security Infrastructure, based on a WISeKey designed secure SVP Root software and hardware security platform.
SVP
The Secure Video Processor Alliance is a group of media and technology leaders promoting the broad adoption of SVP content protection technology in digital home networks and portable devices.
USA
To move to a secure, interoperable web based system that enforces mandatory strong authentication access control and encryption of information and data.
References
The World Internet Security Company
Executive Summary
The Client wanted to implement an extranet portal communication system, featuring knowledge bases, electronic mail and correspondence tools to provide better service and support to their partners, including their very important dealer community.
Business Challenge
Because of the sensitive nature of the information stored on the portal, the client needed to implement a highly secure access solution, and after extensive analysis decided to use Digital Certificates and secure devices provided by a highly trusted provider. The Client chose WISeKey to provide and host a managed dedicated Public Key Infrastructure to provide digital identity services for their extranet portal, with strict confidentiality and quality of service requirements.
Industry
Leading Swiss Watch Maker.
Switzerland
Exists a Development, Quality and Production environment. WISeKey maintains a Quality MPKI CA for testing and the Production MPKI CA.
Access is controlled via two-factor authentication control; (certificate based SSL client authentication and a password).
References
The World Internet Security Company
Executive Summary
The canton of Geneva was chosen by the Confederation for a pilot experiment of vote by Internet, from the point of view of its introduction at the national level, by way of additional possibility to vote, to current methods, votes by correspondence and polling station. During its official introduction, voting by Internet will have to guarantee a similar safety even higher than these two modes of poll.
Business Challenge
WISeKey has taken part in the concept drafting. WISeKey has taken care of the of the system security, the server side development, the physical architecture, the installation and of the solution presentation and promotion.
State of Geneva
e-VOTING INITIATIVE
Switzerland
References
The World Internet Security Company
Executive Summary
Gemini Observatory needed to increase their network, systems and communication security.
Business Challenge
Assisting the Gemini technical administrator to implement the BB and configuring the PKI infrastructure.
Gemini Observatory
Gemini is an international partnership managed by the Association of Universities for Research in Astronomy under a cooperative agreement with the National Science Foundation.
USA - Hawaii
Agenda
The World Internet Security Company
On Wisekey PKI today: - challenges - PKI & PKO - DNI-e Mass deployments tools: - Wisekey CertfyID Blackbox Wisekey references Conclusions
Conclusions
The World Internet Security Company
Both PKO and classical PKI solutions will become prevalent in our communications and computing infrastructures Tools such as Wisekey CertifyID Blackbox will contribute to this deployment by offering economical and easy-to-integrate PKI based solutions Whats next? Watch out for quantum computing schemes! And very interested in learning from advances at forums such as this Conference!!
WISeKey S.A. WISeKey S.A - World Trade Center II - 29, route de Pr-Bois CP 885 1215 Geneva, Switzerland Tel: +41 22 594 30 00