1 / 25

Protecting the Future of Mobile Payments

We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.

jcleblanc
Download Presentation

Protecting the Future of Mobile Payments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting the Future of Mobile Payments? Jonathan LeBlanc ? Twitter: @jcleblanc ? Book: http://bit.ly/iddatasecurity?

  2. Trust Zones & Account Security?

  3. Building Shortcuts?

  4. Browser Fingerprinting? https://panopticlick.eff.org/?

  5. Using Location Data?

  6. Phone Identification??

  7. Device Fingerprinting?

  8. Retrieving Build Information for Android Device ? //-------------? //Build Info: http://developer.android.com/reference/android/os/Build.html? //-------------? ? System.getProperty("os.version"); //os version? android.os.Build.DEVICE //device? android.os.Build.MODEL //model? android.os.Build.VERSION.SDK_INT //sdk version of the framework? android.os.Build.SERIAL //hardware serial number, if available?

  9. Getting Paired Devices??

  10. Get all Bluetooth Paired Devices: Android? //fetch all bonded bluetooth devices? Set<BluetoothDevice> pairedDevices = mBluetoothAdapter.getBondedDevices();? ? //if devices found, fetch name and MAC address for each? if (pairedDevices.size() > 0){? for (BluetoothDevice device : pairedDevices){? //Device Name - device.getName()? //Device MAC address - device.getAddress()? }? }?

  11. Hardware Prototyping?

  12. Asynchronous Cryptography: Securing an Insecure Channel?

  13. Multi-User Environment?

  14. Generating Public / Private Keys? //create private key in private.key? openssl genrsa -out private.key 2048? ? //create public key in public.pem? openssl rsa -in private.key -outform PEM -pubout -out public.pem?

  15. Package Instantiation and Directory Creation? var fs = require('fs');? var path = require('path');? var ursa = require('ursa');? var mkdirp = require('mkdirp');? ? //make direction and generate private / public keys for sender / receiver? var rootpath = './keys';? makekeys(rootpath, 'sender');? makekeys(rootpath, 'receiver');?

  16. Key and Directory Creation? function makekeys(rootpath, subpath){? try {? mkdirp.sync(path.join(rootpath, subpath));? } catch (err) {? console.error(err);? }? ? var key = ursa.generatePrivateKey(); ? var privatepem = key.toPrivatePem();? var publicpem = key.toPublicPem()? ? try {? fs.writeFileSync(path.join(rootpath, subpath, 'private.pem'), privatepem, 'ascii');? fs.writeFileSync(path.join(rootpath, subpath, 'public.pem'), publicpem, 'ascii');? } catch (err) {? console.error(err);? }? }?

  17. Preparing Message, Encrypting, and Signing? //generate required keys? var senderprivkey = ursa.createPrivateKey(? fs.readFileSync(path.join(rootpath, 'sender', 'private.pem')));? var recipientpubkey = ursa.createPublicKey(? fs.readFileSync(path.join(rootpath, 'receiver', 'public.pem')));? ? //prepare JSON message to send? var msg = { 'user':'Nikola Tesla',? 'address':'W 40th St, New York, NY 10018',? 'state':'active' };? ? msg = JSON.stringify(msg);? ? //encrypt with recipient public key, and sign with sender private key? var encrypted = recipientpubkey.encrypt(msg, 'utf8', 'base64');? var signed = senderprivkey.hashAndSign('sha256', encrypted, 'utf8', 'base64');?

  18. Decrypting, and Verifying Message? //generate required keys? var senderpubkey = ursa.createPublicKey(? fs.readFileSync(path.join(rootpath, 'sender', 'public.pem')));? var recipientprivkey = ursa.createPrivateKey(? fs.readFileSync(path.join(rootpath, 'receiver', 'private.pem')));? ? //verify message with sender private key? bufferedmsg = new Buffer(encrypted);? if (!senderpubkey.hashAndVerify('sha256', bufferedmsg, signed, 'base64')){? throw new Error("invalid signature");? } else {? //decrypt message with recipient private key? var decryptedmsg = recipientprivkey.decrypt(encrypted, 'base64', 'utf8');? ? //--------? //message verified and decrypted ? //--------? }? ?

  19. Card Tokenization?

  20. Credit Card Tokenization? Credit Card Information? 7e29c5c48f44755598dec3549155 ad66f1af4671091353be4c4d7694 d71dc866   Address Information? Card Holder Name? ...?

  21. Mobile Payments Landscape?

  22. Thank You!? ? Slides: http://slideshare.net/jcleblanc? Jonathan LeBlanc ? Twitter: @jcleblanc ? Book: http://bit.ly/iddatasecurity?

More Related