SlideShare a Scribd company logo
1 of 5
Mobile Device and Attribute
Validation (MDAV)
 R&D Topic Area
 Access control at the
point of need
PI: Steve Wilson
Lockstep Technologies, Sydney, Australia
swilson@lockstep.com.au
+61 414 488851
http://lockstep.com.au/technologies
1
MDAV: Customer Need
Field
Manager
First
Responder I’m here to help!
Great!
But what are you?
 First responders working across jurisdictions need to convince field
personnel of their credentials.
 “Provenance” is critical. How was the credential issued? How has it been
conveyed?
E.g. Concealed firearms permit, hazmat ticket, security clearance etc.
2
MDAV: Approach
Anon/pseudonymous certificates holding authoritative attributes
convey provenance of issuer and of the device used to present it.
Individual
3
Concealed Carry XYZ
Credentialing Agency
Smart phone Model M
1. Smart device controlled
by Individual
2. An authority issues an
attribute and seals it in
a digital certificate.
3. Cert bound to
device via key pair
Device
with private key store
Certificate
MOBILE DEVICE AND
ATTRIBUTE VALIDATION
 Strong proof of credentials with no need for
extraneous personal details; privacy enhancing
 Provenance: Certificates convey the (1) authority that
issued the credential, and (2) what device carried it
 Credentials are verifiable in offline and occasionally-
connected environments
 Strong audit trails
 Fast, de-centralized, light-weight processing
 Standards-based; leverages native cryptography in
smart phones, smartcards, future IoT devices
 Will value-add ID smart cards and phone apps; invert
the traditional privacy concerns with chips.
MDAV: Benefits
4
MDAV: Potential Transition Activities
First Responder Field Manager
Digital wallet of attributes
on capable device
Relying Party App.
1. Do you have a permit?
Concealed Carry XYZ
Credentialing Agency
Smart phone Model M
2. Yes:
 Prototype in M2M manual access control); transition to mobile-to
system or card-to-system with PACs/LACs partners.
 Productize credential certificate mgt with commercial PKI CSPs.
 Standard crypto APIs, so solution can diffuse into many form
factors and enterprise systems, eg smart license initiatives and
IoT. 5

More Related Content

Viewers also liked

Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовРИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовТарасов Константин
 
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...Тарасов Константин
 
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramРИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramТарасов Константин
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήριαKostas Tampakis
 
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALPRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALNSTDA THAILAND
 
πλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσπλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσKostas Tampakis
 
Trademarks and-brands-seminar
Trademarks and-brands-seminarTrademarks and-brands-seminar
Trademarks and-brands-seminarNSTDA THAILAND
 

Viewers also liked (20)

Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Fish Report
Fish ReportFish Report
Fish Report
 
Mountaingoat
MountaingoatMountaingoat
Mountaingoat
 
Folksonomy
FolksonomyFolksonomy
Folksonomy
 
Jessica cox greek
Jessica cox greekJessica cox greek
Jessica cox greek
 
Pig Banner
Pig BannerPig Banner
Pig Banner
 
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментовРИФ 2016, Яндекс.Директ. Больше форматов и инструментов
РИФ 2016, Яндекс.Директ. Больше форматов и инструментов
 
Animal Sentience Worksheets 2
Animal Sentience Worksheets 2Animal Sentience Worksheets 2
Animal Sentience Worksheets 2
 
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
РИФ 2016, АНАЛИТИКА // Дорогие ошибки брендов: говорим не с теми, не там и не...
 
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и InstagramРИФ 2016, Новые возможности рекламы в Facebook и Instagram
РИФ 2016, Новые возможности рекламы в Facebook и Instagram
 
Amazingphotosofpeople
AmazingphotosofpeopleAmazingphotosofpeople
Amazingphotosofpeople
 
Chinaς μοναστήρια
Chinaς μοναστήριαChinaς μοναστήρια
Chinaς μοναστήρια
 
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONALPRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
PRARAM 9 GRILLED CHICKEN GOES INTERNATIONAL
 
Food & Social Justice
Food & Social JusticeFood & Social Justice
Food & Social Justice
 
Vegan Catering For All
Vegan Catering For AllVegan Catering For All
Vegan Catering For All
 
Aqua
AquaAqua
Aqua
 
πλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσπλουσιοσ η φτωχοσ
πλουσιοσ η φτωχοσ
 
15112010 fireworks
15112010 fireworks15112010 fireworks
15112010 fireworks
 
Fantastic Sailing
Fantastic SailingFantastic Sailing
Fantastic Sailing
 
Trademarks and-brands-seminar
Trademarks and-brands-seminarTrademarks and-brands-seminar
Trademarks and-brands-seminar
 

Similar to Mobile Device and Attribute Validation (MDAV)

The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0Adam Lewis
 
iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks thesecureid
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2Warren Sanders
 
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffapi-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffDucAnhLe56
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsEvernym
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune Systemcentralohioissa
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
WISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureWISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureEileen Weinberg
 
Security human
Security humanSecurity human
Security humanJisc
 

Similar to Mobile Device and Attribute Validation (MDAV) (20)

The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 
Security
SecuritySecurity
Security
 
iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks iPad-style mobility in the age of Wikileaks
iPad-style mobility in the age of Wikileaks
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2SAAEA 2016_Secure Personalisation Solution_S&O_V2
SAAEA 2016_Secure Personalisation Solution_S&O_V2
 
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffffapi-security-Jan23.pptxsdfffffffffffffffffffffffffffff
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Biometrics
BiometricsBiometrics
Biometrics
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
WISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview BrochureWISeAuthentic Product Overview Brochure
WISeAuthentic Product Overview Brochure
 
Security human
Security humanSecurity human
Security human
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTkantarainitiative
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
The state of uma 2014 11-03
The state of uma 2014 11-03The state of uma 2014 11-03
The state of uma 2014 11-03
 
Laws of relationships v7
Laws of relationships v7Laws of relationships v7
Laws of relationships v7
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
IDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoTIDoT: How to find a thing - Discovery in IoT
IDoT: How to find a thing - Discovery in IoT
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Mobile Device and Attribute Validation (MDAV)

  • 1. Mobile Device and Attribute Validation (MDAV)  R&D Topic Area  Access control at the point of need PI: Steve Wilson Lockstep Technologies, Sydney, Australia swilson@lockstep.com.au +61 414 488851 http://lockstep.com.au/technologies 1
  • 2. MDAV: Customer Need Field Manager First Responder I’m here to help! Great! But what are you?  First responders working across jurisdictions need to convince field personnel of their credentials.  “Provenance” is critical. How was the credential issued? How has it been conveyed? E.g. Concealed firearms permit, hazmat ticket, security clearance etc. 2
  • 3. MDAV: Approach Anon/pseudonymous certificates holding authoritative attributes convey provenance of issuer and of the device used to present it. Individual 3 Concealed Carry XYZ Credentialing Agency Smart phone Model M 1. Smart device controlled by Individual 2. An authority issues an attribute and seals it in a digital certificate. 3. Cert bound to device via key pair Device with private key store Certificate MOBILE DEVICE AND ATTRIBUTE VALIDATION
  • 4.  Strong proof of credentials with no need for extraneous personal details; privacy enhancing  Provenance: Certificates convey the (1) authority that issued the credential, and (2) what device carried it  Credentials are verifiable in offline and occasionally- connected environments  Strong audit trails  Fast, de-centralized, light-weight processing  Standards-based; leverages native cryptography in smart phones, smartcards, future IoT devices  Will value-add ID smart cards and phone apps; invert the traditional privacy concerns with chips. MDAV: Benefits 4
  • 5. MDAV: Potential Transition Activities First Responder Field Manager Digital wallet of attributes on capable device Relying Party App. 1. Do you have a permit? Concealed Carry XYZ Credentialing Agency Smart phone Model M 2. Yes:  Prototype in M2M manual access control); transition to mobile-to system or card-to-system with PACs/LACs partners.  Productize credential certificate mgt with commercial PKI CSPs.  Standard crypto APIs, so solution can diffuse into many form factors and enterprise systems, eg smart license initiatives and IoT. 5

Editor's Notes

  1. Descriptive text for picture: An iterative algorithm for finding a good classifier. Noise is added at each step in order to ensure privacy protection, while maintaining classifier accuracy.