1 / 30

Account Authority Digital Signature AADS

Account Authority Digital Signature AADS. Lynn Wheeler First Data Corporation lynn@garlic.com http://www.garlic.com/~lynn. AADS Infrastructure. Adaptable, long life (tens of years) infrastructure Adaptable payment infrastructure Adaptable authentication infrastructure

tirza
Download Presentation

Account Authority Digital Signature AADS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation lynn@garlic.com http://www.garlic.com/~lynn

  2. AADS Infrastructure • Adaptable, long life (tens of years) infrastructure • Adaptable payment infrastructure • Adaptable authentication infrastructure • Adaptable authorization infrastructure • Adaptable risk management

  3. AADS Infrastructure • Small granularity of pieces that are parameterized • Support wide range of cost/value applications • Allow coexistence of different cost/value implementations • Allow, incremental upgrades of individual pieces of infrastructure

  4. AADS Infrastructure • Parameterized assurance levels • cryptography • hardware • Incrementally reflect assurance level changes • Incrementally upgrade individual components

  5. AADS Infrastructure • Parameterized Risk Management • certified audit trail establishing component assurance levels • adaptable, parameterized • assurance levels • authentication levels • authorization levels • cost • value

  6. AADS Infrastructure • Establish best-of-breed components • Establish optimal implementations at multiple cost points • Establish business process for component assurance level certified audit trail

  7. AADS Infrastructure • Adapt card personalization process • On chip public/private key generation • Certified audit trail binding public key to hardware and cryptography assurance levels • Certified assurance level binding made available to parameterized risk management business processes • Assurance levels change over time

  8. AADS Infrastructure account CFI public key registration Personalization certified audit trail consumer consumer hardware token

  9. AADS Infrastructure • Card personalization infrastructure optimal business process for enabling consumer AADS • Certified Audit Trail Binding • public key • hardware token assurance • cryptography assurance • consumer delivery • activation process • Trusted Infrastructure for delivery of certified information

  10. Account Authority Digital Signature AADS • Business-centric strong authentication • Integrated into existing business processes • Leverages existing investment in high-integrity, account based operations • Basic building block for all electronic business operations • Fast, efficient, compact ECC

  11. Compared to Certificate Authority model • leverages existing infrastructure investment • maintains existing business and customer relationships • does not disintermediate with additional business operations • introduces no new liability problems • introduces no new privacy problems • introduces no systemic risks

  12. X9.59 Payment account ISO8583 CFI MFI X9.15 public key registration Consumer Merchant X9.59

  13. AADSStrong Authentication • single ECC digital signature card • single function, secure card • multiple online applications supported ISPs AADS chip financial applications Web servers

  14. Certificate Authority Model • Creates new expensive infrastructure • Requires new trust and risk models • Changes existing business relationships • Creates privacy concerns • Disintermediates existing account holders • Designed for electronic but offline operation • No real time information

  15. AADS • Businesses have long used accounts for identity and attribute binding. • Current financial infrastructure use information binding in accounts to authenticate non-face-to-face transactions • mother's maiden name • PIN - Personal Identification Number • SSN - social security number • ECC short key lengths represent low impact on account records

  16. AADS • Current financial infrastructure can extend existing business processes to support higher integrity electronic commerce by adding public key binding and digital signature verification to existing account infrastructures

  17. AADS Based Authentication • compute secure hash of document or transaction • use private key to encrypt the hash (forming digital signature) • push document/transaction and digital signature to recipient

  18. AADS Based Authentication • recipient (account authority) • uses public key in account to authenticate digital signature • used identity/attribute information in the account to validate/authorize document or transaction

  19. AADSCost Sharing • majority of Certificate Authority operation is account management • digital signature capability can be added to financial accounts for 1%-5% • existing non-digital signature applications cover 95%-99% of account costs • financial digital signature applications cover 90%-95% of digital signature costs • non-financial digital signature applications need to cover 1/200th to 1/2000th of account infrastructure

  20. AADSCost Sharing Existing Financial applications continue to fund majority of infrastructure AADS fraction Account Infrastructure Costs

  21. AADS • leverages existing account infrastructures • operates within existing business processes • adds public key registration to existing process • doesn't spray identity certificates all over the world raising privacy concerns • doesn't rely on third parties and/or create additional liability problems • no new identity databases • privacy neutral

  22. AADS • digital signature (only) appended on transactions • easily fits into existing legacy financial networks • doesn't create new business dependencies • doesn't create systemic risks • no new failure modes • especially critical to triple redundant, high integrity financial infrastructure

  23. AADS - Account Operation • debit-card account: | accnt# | balance | name | addr | MM name | pin | ssn | • Mother's maiden name, PIN, and SSN have drawback that they can be used to both originate a non-face-to-face transaction as well as verify a transaction (can generate fraudulent transaction by knowing value)

  24. AADS | account# | balance | limit | name | address | public key| • existing business process can be used for public key registration • in existing PKI terms, the account record represents the binding of attributes to the public key; however the actual orientation is core business operation (not an external operation) • can’t originate fraudulent transaction by knowing the public key

  25. X9.59 • Finance Industry standard for all account-based payment methods • based on AADS • public key is registered in account record • all transactions are digital signed • privacy neutral • no identity information needed, even at POS

  26. X9.59 • consumer's financial institution both authenticates and authorizes the transactions • doesn't separate authentication & authorization ... security 101 • merchant not involved in authentication or identification • no certificates spewing identity information all over the world

  27. X9.59 Payment account ISO8583 CFI MFI X9.15 public key registration Consumer Merchant X9.59

  28. AADS Chip-card • Business Centric • no “cryptography is the answer, now what is the question” • no “smartcard is the answer, now what is the question” • Strong Authentication is the business requirement • create fundamental business building block • optimal cost/benefit

  29. AADS Strawman • Tempested • Immune to all known smartcard attacks • Simple function in support of AADS • generate public/private key • export public key • private key never known • EC-DSS signing • Less than $1.50

  30. AADS Strawman • Additional Chip Functions • support for on-card biometrics sensor • contactless • Compelling business case for strong authentication only • EC-DSS digital signature only • additional functions as business requirements are justified • strong authentication is fundamental business building block

More Related