SlideShare ist ein Scribd-Unternehmen logo
1 von 34
All Rights Reserved | FIDO Alliance | 2016 1
THE VALUE OF MEMBERSHIP
Brett McDowell, Executive Director
brett@fidoalliance.org
All Rights Reserved | FIDO Alliance | 2016 2
WHY FIDO ALLIANCE?
All Rights Reserved | FIDO Alliance | 2016 3
Solving the Password Problem
63% of data breaches
in 2015 involved
weak, default, or
stolen passwords
-Verizon Data Breach
Report
Data breaches
expected to reach
1,000 in 2016
up 22% from 2015
-Identity Theft Resource
Center
Each data breach
costs $3.8 million
on average
up 23% from 2013
-Ponemon Institute
All Rights Reserved | FIDO Alliance | 2016 4
WHO IS FIDO ALLIANCE?
All Rights Reserved | FIDO Alliance | 2016 5
The FIDO Alliance is an open industry
association of over 250 organizations
with a focused mission:
authentication standards
Board Members
All Rights Reserved | FIDO Alliance | 2016 6
All Rights Reserved | FIDO Alliance | 2016 7
WHAT IS FIDO AUTHENTICATION?
All Rights Reserved | FIDO Alliance | 2016 8
HOW “Shared Secrets” WORK
ONLINE
The user authenticates
themselves online by presenting a
human-readable “shared secret”
All Rights Reserved | FIDO Alliance | 2016 9
HOW FIDO WORKS
AUTHENTICATOR
LOCAL ONLINE
The user authenticates
“locally” to their device
(by various means)
The device authenticates
the user online using
public key cryptography
All Rights Reserved | FIDO Alliance | 2016 10
Support for Two Authentication Experiences
ENABLES MANY AUTHENTICATION OPTIONS | EACH SERVICE PROVIDER REGISTERS UNIQUE FIDO CREDENTIALS
All Rights Reserved | FIDO Alliance | 2016 11
USABILITY, SECURITY, R.O.I.
and
PRIVACY
All Rights Reserved | FIDO Alliance | 2016 12
No 3rd Party in the Protocol
No Secrets on the Server Side
Biometric Data (if used) Never Leaves Device
No (*new*) Link-ability Between Services
No (*new*) Link-ability Between Accounts
All Rights Reserved | FIDO Alliance | 2016 13
MARKET ADOPTION
All Rights Reserved | FIDO Alliance | 2016 14
FIDO Development History
FIDO 1.0
FINALFirst
Deployments
UAF & U2FSpecification
Review Draft
FIDO Ready
Program
Alliance
Announced
FEB
2013
DEC
2013
FEB
2014
FEB-OCT
2014
DEC 9
2014
MAY
2015
FEB
2016
Formal
Standardization
JUNE
2015
Certification
Program
New U2F
Transports
DEC
2016
FIDO 1.1
Sample FIDO Adoption/Announcements
All Rights Reserved | FIDO Alliance | 2016 15
Certification Growth
All Rights Reserved | FIDO Alliance | 2016 16
 An open competitive market
 Ensures interoperability
 Sign of mature FIDO ecosystem
250+
FIDOÂź Certified
products available
today
152
64
32
62
74
108
162
216
253
Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16
TOTAL
Leading OEMs Shipping FIDO Certified Devices
S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor
Aquos Zeta Xperia Z5 Xperia Z5
Compact
Xperia Z5
Premium
Mate 8
V10 G5
Phab2
Pro
Phab2
Plus
Z2, Z2 ProArrows
NX
Arrows
Fit
Arrows
Tab
All Rights Reserved | FIDO Alliance | 2016 17
All Rights Reserved | FIDO Alliance | 2016 18
FIDO in Windows & Web Ecosystems
Windows Platforms
Yoga 910
Web
All Rights Reserved | FIDO Alliance | 2016 19
Summary: FIDO Authentication Delivers
Better security
for online services
Reduced cost
for the enterprise
Simpler and safer
for users
All Rights Reserved | FIDO Alliance | 2016 20
GETTING ENGAGED
All Rights Reserved | FIDO Alliance | 2016 21
How FIDO Works
Membership
Levels
Technical
Workstreams
Marketing & Adoption
Workstreams
All Rights Reserved | FIDO Alliance | 2016 22
Membership Levels
Board
Sets strategy and overall direction for Alliance
Sponsor
Leads development through FIDO working groups & in marketplace
Associate
Annual networking opportunity, participate in broader ecosystem
All Rights Reserved | FIDO Alliance | 2016 23
Technical Working Groups
Security
Requirements
“FIDO 2.0”
Technology
Universal
Authentication
Framework
Technology
Universal 2nd
Factor
Technology
All Rights Reserved | FIDO Alliance | 2016 24
Membership Value: Technology
‱ Influence FIDO’s specifications and technical
output
‱ Gain early visibility into specs to help guide your
product development and/or deployments
‱ Benefit from the “IPR Promise”
‱ Network with technical peers across industry
segments
All Rights Reserved | FIDO Alliance | 2016 25
“The IPR Promise” Process - 6.2.1.1
“For each Working Group in which one or more Bound Entities
participates, Signatory, on behalf of itself, all its Related Entities and its
and their successors in interest and assigns, promises not to assert its or
its Related Entity’s Granted Claims against any Participant in such
Working Group for its Public Permitted Uses or Working Group Permitted
Uses, subject to the terms and conditions of this Agreement. [...]”
‱ A reciprocal promise to not assert patents against the
normative requirements in FIDO specification
‱ Enables unencumbered growth of FIDO ecosystem
http://fidoalliance.org/membership/details
All Rights Reserved | FIDO Alliance | 2016 26
Technical Working Groups
Security
Requirements
FIDO 2.0
Technology
Universal
Authentication
Framework
Technology
Universal 2nd
Factor
Technology
Influence
Early
Visibility
Peer-based
Networking
All Rights Reserved | FIDO Alliance | 2016 27
Adoption Working Groups
Certification Marketing
Deployment-
at-Scale
Regional
(China,
India, etc.)
Privacy &
Public Policy
All Rights Reserved | FIDO Alliance | 2016 28
Membership Value: Marketing & Adoption
‱ Tap into FIDO’s ecosystem marketing activities
‱ Reduced fees for certification testing & logo usage
‱ Take part in FIDO Pavilions at leading industry events
(turnkey, discounted presence)
‱ Gain insights from Market Research programs
‱ Engage with experts to drive regional adoption
‱ Understand and establish deployment best
practices (benefit from early adopter experience)
‱ Influence, understand and engage on emerging
policy issues
All Rights Reserved | FIDO Alliance | 2016 29
The Road Ahead
Web Authentication
Specification Brings
FIDO to the
Platform
Standards Effort
with EMVCo
Client-to-
Authenticator
Protocol (CTAP)
FIDO Gold Server +
New Certification
Programs
All Rights Reserved | FIDO Alliance | 2016 30
What Our Members Say
All Rights Reserved | FIDO Alliance | 2016 31
NEXT STEPS
All Rights Reserved | FIDO Alliance | 2016 32
Membership Application Procedures
‱ Ready to join?
‱ Visit https://fidoalliance.org/membership/
‱ Have more questions (even after our Q&A)?
‱ Email info@fidoalliance.org
‱ Follow us @fidoalliance
‱ Meet us at upcoming Industry events
‱ https://fidoalliance.org/upcoming-events/
All Rights Reserved | FIDO Alliance | 2016 33
JOIN THE
FIDO ALLIANCE
All Rights Reserved | FIDO Alliance | 2016 34
THANK YOU!
QUESTIONS?
brett@fidoalliance.org | info@fidoalliance.org

Weitere Àhnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and Future
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
GDPRïŒˆäž€èˆŹăƒ‡ăƒŒă‚żäżè­·èŠć‰‡ïŒ‰ăšFIDOæš™æș–に぀いお
GDPRïŒˆäž€èˆŹăƒ‡ăƒŒă‚żäżè­·èŠć‰‡ïŒ‰ăšFIDOæš™æș–に぀いおGDPRïŒˆäž€èˆŹăƒ‡ăƒŒă‚żäżè­·èŠć‰‡ïŒ‰ăšFIDOæš™æș–に぀いお
GDPRïŒˆäž€èˆŹăƒ‡ăƒŒă‚żäżè­·èŠć‰‡ïŒ‰ăšFIDOæš™æș–に぀いお
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in Korea
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 

Andere mochten auch

Andere mochten auch (11)

FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 

Ähnlich wie FIDO - The Value of Membership

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

Ähnlich wie FIDO - The Value of Membership (20)

Introduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and StatusIntroduction to the FIDO Alliance: Vision and Status
Introduction to the FIDO Alliance: Vision and Status
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
FIDO Certification
FIDO CertificationFIDO Certification
FIDO Certification
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
FIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social LoginFIDO, Federation & Facebook Social Login
FIDO, Federation & Facebook Social Login
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 

Mehr von FIDO Alliance

Mehr von FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
æ–°ă—ă„èȘèšŒæŠ€èĄ“FIDOăźæœ€æ–°ć‹•ć‘
æ–°ă—ă„èȘèšŒæŠ€èĄ“FIDOăźæœ€æ–°ć‹•ć‘æ–°ă—ă„èȘèšŒæŠ€èĄ“FIDOăźæœ€æ–°ć‹•ć‘
æ–°ă—ă„èȘèšŒæŠ€èĄ“FIDOăźæœ€æ–°ć‹•ć‘
 
æ—„ç«‹PBIæŠ€èĄ“ă‚’ç”šă„ăŸă€Œăƒ‡ăƒă‚€ă‚čフăƒȘăƒŒăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Żă€æ§‹æƒł
æ—„ç«‹PBIæŠ€èĄ“ă‚’ç”šă„ăŸă€Œăƒ‡ăƒă‚€ă‚čフăƒȘăƒŒăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Żă€æ§‹æƒłæ—„ç«‹PBIæŠ€èĄ“ă‚’ç”šă„ăŸă€Œăƒ‡ăƒă‚€ă‚čフăƒȘăƒŒăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Żă€æ§‹æƒł
æ—„ç«‹PBIæŠ€èĄ“ă‚’ç”šă„ăŸă€Œăƒ‡ăƒă‚€ă‚čフăƒȘăƒŒăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Żă€æ§‹æƒł
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
ćŻŒćŁ«é€šăźç”Ÿäœ“èȘèšŒă‚œăƒȘăƒ„ăƒŒă‚·ăƒ§ăƒłăšææĄˆ
ćŻŒćŁ«é€šăźç”Ÿäœ“èȘèšŒă‚œăƒȘăƒ„ăƒŒă‚·ăƒ§ăƒłăšææĄˆćŻŒćŁ«é€šăźç”Ÿäœ“èȘèšŒă‚œăƒȘăƒ„ăƒŒă‚·ăƒ§ăƒłăšææĄˆ
ćŻŒćŁ«é€šăźç”Ÿäœ“èȘèšŒă‚œăƒȘăƒ„ăƒŒă‚·ăƒ§ăƒłăšææĄˆ
 
ăƒ†ăƒŹăƒŻăƒŒă‚ŻæœŹæ Œć°Žć…„ă«ăŠă‘ă‚‹IDèȘèšŒè€ƒćŻŸ
ăƒ†ăƒŹăƒŻăƒŒă‚ŻæœŹæ Œć°Žć…„ă«ăŠă‘ă‚‹IDèȘèšŒè€ƒćŻŸăƒ†ăƒŹăƒŻăƒŒă‚ŻæœŹæ Œć°Žć…„におけるIDèȘèšŒè€ƒćŻŸ
ăƒ†ăƒŹăƒŻăƒŒă‚ŻæœŹæ Œć°Žć…„ă«ăŠă‘ă‚‹IDèȘèšŒè€ƒćŻŸ
 
ă€Œé–‹ă‘ă‚ŽăƒžïŒă€ă‹ă‚‰YubiKeyぞ
ă€Œé–‹ă‘ă‚ŽăƒžïŒă€ă‹ă‚‰YubiKeyăžă€Œé–‹ă‘ă‚ŽăƒžïŒă€ă‹ă‚‰YubiKeyぞ
ă€Œé–‹ă‘ă‚ŽăƒžïŒă€ă‹ă‚‰YubiKeyぞ
 
YubiOnăŒç›źæŒ‡ă™æœȘ杄
YubiOnăŒç›źæŒ‡ă™æœȘ杄YubiOnăŒç›źæŒ‡ă™æœȘ杄
YubiOnăŒç›źæŒ‡ă™æœȘ杄
 
FIDO2ć°Žć…„ă—ăŠăżăŸă‚’è€ƒăˆăŠăżăŸ
FIDO2ć°Žć…„ă—ăŠăżăŸă‚’è€ƒăˆăŠăżăŸFIDO2ć°Žć…„ă—ăŠăżăŸă‚’è€ƒăˆăŠăżăŸ
FIDO2ć°Žć…„ă—ăŠăżăŸă‚’è€ƒăˆăŠăżăŸ
 
äž­ć°äŒæ„­ă«ă‚ˆă‚‹FIDOć°Žć…„äș‹äŸ‹
äž­ć°äŒæ„­ă«ă‚ˆă‚‹FIDOć°Žć…„äș‹äŸ‹äž­ć°äŒæ„­ă«ă‚ˆă‚‹FIDOć°Žć…„äș‹äŸ‹
äž­ć°äŒæ„­ă«ă‚ˆă‚‹FIDOć°Žć…„äș‹äŸ‹
 
VPNăŻă‚‚ă†ć’æ„­ïŒFIDO2èȘèšŒă§æŹĄäž–代ăƒȘăƒąăƒŒăƒˆă‚ąă‚Żă‚»ă‚č
VPNăŻă‚‚ă†ć’æ„­ïŒFIDO2èȘèšŒă§æŹĄäž–代ăƒȘăƒąăƒŒăƒˆă‚ąă‚Żă‚»ă‚čVPNăŻă‚‚ă†ć’æ„­ïŒFIDO2èȘèšŒă§æŹĄäž–代ăƒȘăƒąăƒŒăƒˆă‚ąă‚Żă‚»ă‚č
VPNăŻă‚‚ă†ć’æ„­ïŒFIDO2èȘèšŒă§æŹĄäž–代ăƒȘăƒąăƒŒăƒˆă‚ąă‚Żă‚»ă‚č
 
CloudGate UNOă§ćź‰ć…šäŸżćˆ©ăȘパă‚čăƒŻăƒŒăƒ‰ăƒŹă‚čăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Ż
CloudGate UNOă§ćź‰ć…šäŸżćˆ©ăȘパă‚čăƒŻăƒŒăƒ‰ăƒŹă‚čăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚ŻCloudGate UNOă§ćź‰ć…šäŸżćˆ©ăȘパă‚čăƒŻăƒŒăƒ‰ăƒŹă‚čăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Ż
CloudGate UNOă§ćź‰ć…šäŸżćˆ©ăȘパă‚čăƒŻăƒŒăƒ‰ăƒŹă‚čăƒȘăƒąăƒŒăƒˆăƒŻăƒŒă‚Ż
 
æ•°ă€…ăźćźŸçžŸïŒšèż…é€ŸăȘFIDOèȘèšŒăźć±•é–‹ă‚’ă‚”ăƒăƒŒăƒˆ
æ•°ă€…ăźćźŸçžŸïŒšèż…é€ŸăȘFIDOèȘèšŒăźć±•é–‹ă‚’ă‚”ăƒăƒŒăƒˆæ•°ă€…ăźćźŸçžŸïŒšèż…é€ŸăȘFIDOèȘèšŒăźć±•é–‹ă‚’ă‚”ăƒăƒŒăƒˆ
æ•°ă€…ăźćźŸçžŸïŒšèż…é€ŸăȘFIDOèȘèšŒăźć±•é–‹ă‚’ă‚”ăƒăƒŒăƒˆ
 

KĂŒrzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

KĂŒrzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

FIDO - The Value of Membership

  • 1. All Rights Reserved | FIDO Alliance | 2016 1 THE VALUE OF MEMBERSHIP Brett McDowell, Executive Director brett@fidoalliance.org
  • 2. All Rights Reserved | FIDO Alliance | 2016 2 WHY FIDO ALLIANCE?
  • 3. All Rights Reserved | FIDO Alliance | 2016 3 Solving the Password Problem 63% of data breaches in 2015 involved weak, default, or stolen passwords -Verizon Data Breach Report Data breaches expected to reach 1,000 in 2016 up 22% from 2015 -Identity Theft Resource Center Each data breach costs $3.8 million on average up 23% from 2013 -Ponemon Institute
  • 4. All Rights Reserved | FIDO Alliance | 2016 4 WHO IS FIDO ALLIANCE?
  • 5. All Rights Reserved | FIDO Alliance | 2016 5 The FIDO Alliance is an open industry association of over 250 organizations with a focused mission: authentication standards
  • 6. Board Members All Rights Reserved | FIDO Alliance | 2016 6
  • 7. All Rights Reserved | FIDO Alliance | 2016 7 WHAT IS FIDO AUTHENTICATION?
  • 8. All Rights Reserved | FIDO Alliance | 2016 8 HOW “Shared Secrets” WORK ONLINE The user authenticates themselves online by presenting a human-readable “shared secret”
  • 9. All Rights Reserved | FIDO Alliance | 2016 9 HOW FIDO WORKS AUTHENTICATOR LOCAL ONLINE The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography
  • 10. All Rights Reserved | FIDO Alliance | 2016 10 Support for Two Authentication Experiences ENABLES MANY AUTHENTICATION OPTIONS | EACH SERVICE PROVIDER REGISTERS UNIQUE FIDO CREDENTIALS
  • 11. All Rights Reserved | FIDO Alliance | 2016 11 USABILITY, SECURITY, R.O.I. and PRIVACY
  • 12. All Rights Reserved | FIDO Alliance | 2016 12 No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No (*new*) Link-ability Between Services No (*new*) Link-ability Between Accounts
  • 13. All Rights Reserved | FIDO Alliance | 2016 13 MARKET ADOPTION
  • 14. All Rights Reserved | FIDO Alliance | 2016 14 FIDO Development History FIDO 1.0 FINALFirst Deployments UAF & U2FSpecification Review Draft FIDO Ready Program Alliance Announced FEB 2013 DEC 2013 FEB 2014 FEB-OCT 2014 DEC 9 2014 MAY 2015 FEB 2016 Formal Standardization JUNE 2015 Certification Program New U2F Transports DEC 2016 FIDO 1.1
  • 15. Sample FIDO Adoption/Announcements All Rights Reserved | FIDO Alliance | 2016 15
  • 16. Certification Growth All Rights Reserved | FIDO Alliance | 2016 16  An open competitive market  Ensures interoperability  Sign of mature FIDO ecosystem 250+ FIDOÂź Certified products available today 152 64 32 62 74 108 162 216 253 Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16 TOTAL
  • 17. Leading OEMs Shipping FIDO Certified Devices S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor Aquos Zeta Xperia Z5 Xperia Z5 Compact Xperia Z5 Premium Mate 8 V10 G5 Phab2 Pro Phab2 Plus Z2, Z2 ProArrows NX Arrows Fit Arrows Tab All Rights Reserved | FIDO Alliance | 2016 17
  • 18. All Rights Reserved | FIDO Alliance | 2016 18 FIDO in Windows & Web Ecosystems Windows Platforms Yoga 910 Web
  • 19. All Rights Reserved | FIDO Alliance | 2016 19 Summary: FIDO Authentication Delivers Better security for online services Reduced cost for the enterprise Simpler and safer for users
  • 20. All Rights Reserved | FIDO Alliance | 2016 20 GETTING ENGAGED
  • 21. All Rights Reserved | FIDO Alliance | 2016 21 How FIDO Works Membership Levels Technical Workstreams Marketing & Adoption Workstreams
  • 22. All Rights Reserved | FIDO Alliance | 2016 22 Membership Levels Board Sets strategy and overall direction for Alliance Sponsor Leads development through FIDO working groups & in marketplace Associate Annual networking opportunity, participate in broader ecosystem
  • 23. All Rights Reserved | FIDO Alliance | 2016 23 Technical Working Groups Security Requirements “FIDO 2.0” Technology Universal Authentication Framework Technology Universal 2nd Factor Technology
  • 24. All Rights Reserved | FIDO Alliance | 2016 24 Membership Value: Technology ‱ Influence FIDO’s specifications and technical output ‱ Gain early visibility into specs to help guide your product development and/or deployments ‱ Benefit from the “IPR Promise” ‱ Network with technical peers across industry segments
  • 25. All Rights Reserved | FIDO Alliance | 2016 25 “The IPR Promise” Process - 6.2.1.1 “For each Working Group in which one or more Bound Entities participates, Signatory, on behalf of itself, all its Related Entities and its and their successors in interest and assigns, promises not to assert its or its Related Entity’s Granted Claims against any Participant in such Working Group for its Public Permitted Uses or Working Group Permitted Uses, subject to the terms and conditions of this Agreement. [...]” ‱ A reciprocal promise to not assert patents against the normative requirements in FIDO specification ‱ Enables unencumbered growth of FIDO ecosystem http://fidoalliance.org/membership/details
  • 26. All Rights Reserved | FIDO Alliance | 2016 26 Technical Working Groups Security Requirements FIDO 2.0 Technology Universal Authentication Framework Technology Universal 2nd Factor Technology Influence Early Visibility Peer-based Networking
  • 27. All Rights Reserved | FIDO Alliance | 2016 27 Adoption Working Groups Certification Marketing Deployment- at-Scale Regional (China, India, etc.) Privacy & Public Policy
  • 28. All Rights Reserved | FIDO Alliance | 2016 28 Membership Value: Marketing & Adoption ‱ Tap into FIDO’s ecosystem marketing activities ‱ Reduced fees for certification testing & logo usage ‱ Take part in FIDO Pavilions at leading industry events (turnkey, discounted presence) ‱ Gain insights from Market Research programs ‱ Engage with experts to drive regional adoption ‱ Understand and establish deployment best practices (benefit from early adopter experience) ‱ Influence, understand and engage on emerging policy issues
  • 29. All Rights Reserved | FIDO Alliance | 2016 29 The Road Ahead Web Authentication Specification Brings FIDO to the Platform Standards Effort with EMVCo Client-to- Authenticator Protocol (CTAP) FIDO Gold Server + New Certification Programs
  • 30. All Rights Reserved | FIDO Alliance | 2016 30 What Our Members Say
  • 31. All Rights Reserved | FIDO Alliance | 2016 31 NEXT STEPS
  • 32. All Rights Reserved | FIDO Alliance | 2016 32 Membership Application Procedures ‱ Ready to join? ‱ Visit https://fidoalliance.org/membership/ ‱ Have more questions (even after our Q&A)? ‱ Email info@fidoalliance.org ‱ Follow us @fidoalliance ‱ Meet us at upcoming Industry events ‱ https://fidoalliance.org/upcoming-events/
  • 33. All Rights Reserved | FIDO Alliance | 2016 33 JOIN THE FIDO ALLIANCE
  • 34. All Rights Reserved | FIDO Alliance | 2016 34 THANK YOU! QUESTIONS? brett@fidoalliance.org | info@fidoalliance.org