SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Safelayer Secure Communications
Actividades en el proyecto Segur@
     Segur@ Project Research
             June 2011
Safelayer: research in the Segur@ Project

•    Safelayer’s research in the Segur@ Project focused on:
       ‒    The electronic passport
       ‒    User-centric identity management
       ‒    Innovative authentication mechanisms
       ‒    Semantic technologies for enhancing trust
       ‒    Electronic evidence management

•    Most important results:
       ‒ Prototype implementation of innovative applications, available at
         sandbox.safelayer.com.
       ‒ Integration of diverse technologies.
       ‒ Direct contribution to international standards, including interoperability tests with
         other developers.

•    The Universitat Politècnica de Catalunya (Technical University of Catalonia)
     collaborated in the research.




I+D / June 2011                            WWW.SAFELAYER.COM                                     2
Electronic Passport

•    Safelayer actively participated in the definition of the PKI architecture that
     will support the deployment of the second generation electronic passport
     in the following tasks:
       ‒ Specification of the communication protocol that allows the key exchange
         among member states.
       ‒ Implementation and testing of the PKI for the card verifiable certificates
         contained in the passport.
       ‒ Study of the implications of the deploying of national public key directories that
         are managed by the governments and handle the material required to validate
         the passport certification chains.
       ‒ Design of an inspection system prototype.
       ‒ Implementation of a centralized directory prototype for the distribution of
         cryptographic material to the inspection systems.

•    This work was undertaken at an international level as an extension of the
     Brussels Interoperability Group’s efforts.




I+D / June 2011                            WWW.SAFELAYER.COM                                  3
User-centric identity management

•    Safelayer developed an experimental identity provider that integrates
     several user-centric identity management technologies:
       ‒ Authentication with managed information cards.
       ‒ Identity data import from digital certificates (national ID card), RDF documents
         and OpenID providers with source verification: the information that comes
         from trusted sources is recognized and evaluated.
       ‒ Dynamic identity attributes.


•    A FOAF document editor was also designed and implemented. It can
     intelligently merge identity profiles stored on different social networks.

•    To simplify the handling of FOAF documents and minimize the need to
     use specific RDF tools, Safelayer published foaf4j API under GPL
     license.

•    All the experimental applications are available at sandbox.safelayer.com.



I+D / June 2011                           WWW.SAFELAYER.COM                                 4
Innovative authentication mechanisms

•    In order to improve authentication processes, innovative mechanisms
     were designed that, while still being user-friendly, provide a level of
     security that is proportional to the risk.
       ‒ One time passwords, which are more secure.
       ‒ Graphical passwords, which are easier to remember.
       ‒ Mutual authentication of client and server.

•    Two innovative and ergonomic strong multifactor authentication
     experimental systems were designed and validated:
       ‒ gOTP generator for iPhone, available at App Store.
       ‒ QR-Scan OTP for Android, available at Android Market.
       ‒ Both applications can be used as authentication mechanisms for
         sandbox.safelayer.com.

•    Safelayer applied this knowledge in its contributions to the ISO/IEC
     standards on identity, authentication and access control management.




I+D / June 2011                         WWW.SAFELAYER.COM                      5
Semantic technologies for enhancing trust

•    Safelayer worked with semantic languages and tools to:
       ‒ Integrate identity and security information.
       ‒ Infer new information that is not explicitly stored in knowledge bases.
       ‒ Facilitate application interoperability and service discovery.


•    Ontologies and solutions that improve security and trust applications were
     proposed, focusing on and validating the following use cases:
       ‒ Digital Rights Management: Prototype of the semantic authorizer to protect
         resources.
       ‒ Semantic digital signature: Provides integrity and authenticity to fragments of
         information that are endorsed by different trust sources without compromising the
         whole document as current standard signature formats do.
       ‒ Authentication mechanisms: Dynamic assessment of their level of assurance.
       ‒ Trust: Assessment of the factors that influence the PKI keys life-cycle and usage
         environment.
       ‒ Access control: XACML policy validation and proposal of a semantic schema for
         better exploiting information on resources.



I+D / June 2011                           WWW.SAFELAYER.COM                                  6
Electronic evidence management

•    To enhance the security information management systems, Safelayer
     worked on the creation and management of electronic evidences.

•    A system that provides technical and legal validity to the security
     information that is gathered and processed by the cooperative information
     management system was proposed and tested.
       ‒ The system supports creating, storing and accessing electronic evidences
         associated to events that need to be stored over the long-term.

•    A service that endorses the participation in electronic transactions was
     designed and validated to enhance the cooperative information
     management system security with electronic evidences of all information
     exchanges.

•    With regard to the management of information that might be required in
     the long term:
       ‒ The implications of long-term information storage was studied in terms of
         access, interpretation and trustworthiness.
       ‒ The feasibility of using ontologies to structure security information events was
         studied.



I+D / June 2011                           WWW.SAFELAYER.COM                                 7
Safelayer Secure Communications
              R&D

      www.safelayer.com
       +34 935 088 090

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Empfohlen

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Empfohlen (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Safelayer's results during the Segur@ project

  • 1. Safelayer Secure Communications Actividades en el proyecto Segur@ Segur@ Project Research June 2011
  • 2. Safelayer: research in the Segur@ Project • Safelayer’s research in the Segur@ Project focused on: ‒ The electronic passport ‒ User-centric identity management ‒ Innovative authentication mechanisms ‒ Semantic technologies for enhancing trust ‒ Electronic evidence management • Most important results: ‒ Prototype implementation of innovative applications, available at sandbox.safelayer.com. ‒ Integration of diverse technologies. ‒ Direct contribution to international standards, including interoperability tests with other developers. • The Universitat Politècnica de Catalunya (Technical University of Catalonia) collaborated in the research. I+D / June 2011 WWW.SAFELAYER.COM 2
  • 3. Electronic Passport • Safelayer actively participated in the definition of the PKI architecture that will support the deployment of the second generation electronic passport in the following tasks: ‒ Specification of the communication protocol that allows the key exchange among member states. ‒ Implementation and testing of the PKI for the card verifiable certificates contained in the passport. ‒ Study of the implications of the deploying of national public key directories that are managed by the governments and handle the material required to validate the passport certification chains. ‒ Design of an inspection system prototype. ‒ Implementation of a centralized directory prototype for the distribution of cryptographic material to the inspection systems. • This work was undertaken at an international level as an extension of the Brussels Interoperability Group’s efforts. I+D / June 2011 WWW.SAFELAYER.COM 3
  • 4. User-centric identity management • Safelayer developed an experimental identity provider that integrates several user-centric identity management technologies: ‒ Authentication with managed information cards. ‒ Identity data import from digital certificates (national ID card), RDF documents and OpenID providers with source verification: the information that comes from trusted sources is recognized and evaluated. ‒ Dynamic identity attributes. • A FOAF document editor was also designed and implemented. It can intelligently merge identity profiles stored on different social networks. • To simplify the handling of FOAF documents and minimize the need to use specific RDF tools, Safelayer published foaf4j API under GPL license. • All the experimental applications are available at sandbox.safelayer.com. I+D / June 2011 WWW.SAFELAYER.COM 4
  • 5. Innovative authentication mechanisms • In order to improve authentication processes, innovative mechanisms were designed that, while still being user-friendly, provide a level of security that is proportional to the risk. ‒ One time passwords, which are more secure. ‒ Graphical passwords, which are easier to remember. ‒ Mutual authentication of client and server. • Two innovative and ergonomic strong multifactor authentication experimental systems were designed and validated: ‒ gOTP generator for iPhone, available at App Store. ‒ QR-Scan OTP for Android, available at Android Market. ‒ Both applications can be used as authentication mechanisms for sandbox.safelayer.com. • Safelayer applied this knowledge in its contributions to the ISO/IEC standards on identity, authentication and access control management. I+D / June 2011 WWW.SAFELAYER.COM 5
  • 6. Semantic technologies for enhancing trust • Safelayer worked with semantic languages and tools to: ‒ Integrate identity and security information. ‒ Infer new information that is not explicitly stored in knowledge bases. ‒ Facilitate application interoperability and service discovery. • Ontologies and solutions that improve security and trust applications were proposed, focusing on and validating the following use cases: ‒ Digital Rights Management: Prototype of the semantic authorizer to protect resources. ‒ Semantic digital signature: Provides integrity and authenticity to fragments of information that are endorsed by different trust sources without compromising the whole document as current standard signature formats do. ‒ Authentication mechanisms: Dynamic assessment of their level of assurance. ‒ Trust: Assessment of the factors that influence the PKI keys life-cycle and usage environment. ‒ Access control: XACML policy validation and proposal of a semantic schema for better exploiting information on resources. I+D / June 2011 WWW.SAFELAYER.COM 6
  • 7. Electronic evidence management • To enhance the security information management systems, Safelayer worked on the creation and management of electronic evidences. • A system that provides technical and legal validity to the security information that is gathered and processed by the cooperative information management system was proposed and tested. ‒ The system supports creating, storing and accessing electronic evidences associated to events that need to be stored over the long-term. • A service that endorses the participation in electronic transactions was designed and validated to enhance the cooperative information management system security with electronic evidences of all information exchanges. • With regard to the management of information that might be required in the long term: ‒ The implications of long-term information storage was studied in terms of access, interpretation and trustworthiness. ‒ The feasibility of using ontologies to structure security information events was studied. I+D / June 2011 WWW.SAFELAYER.COM 7
  • 8. Safelayer Secure Communications R&D www.safelayer.com +34 935 088 090