Welcome to Mindshare 2016! - Crypto Vision · PDF fileNSA Crypto Symposium. Wipa Aktuell....

108
cv cryptovision GmbH | T: +49 (0) 209.167-24 50 | F: +49 (0) 209.167-24 61 | info(at)cryptovision.com Welcome to Mindshare 2016! Markus Hoffmeister, cryptovision Marco Smeja, cryptovision

Transcript of Welcome to Mindshare 2016! - Crypto Vision · PDF fileNSA Crypto Symposium. Wipa Aktuell....

1Welcome to Mindshare 2016cv cryptovision GmbH | T: +49 (0) 209.167-24 50 | F: +49 (0) 209.167-24 61 | info(at)cryptovision.com

Welcome to Mindshare 2016!

Markus Hoffmeister, cryptovisionMarco Smeja, cryptovision

2Welcome to Mindshare 2016

Dress Code

3Welcome to Mindshare 2016

How it all began

Andreas HoffmeisterMarkus Hoffmeister

4Welcome to Mindshare 2016

5Welcome to Mindshare 2016

cryptovision Mensware

The beginnings of cryptovision

6Welcome to Mindshare 2016

We had to stop when this photo was published ...

The beginnings of cryptovision

7Welcome to Mindshare 2016

CodecrackerChallenge

8Welcome to Mindshare 2016

What do you recognize here?

3 4

3 4

9

20Welcome to Mindshare 2016

What did you recognize here?

0

1

2

1 2 3 4 5 6 7 8 91999

cryptovision

0

1

2

1 2 3 4 5 6 7 8 91999

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92000

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92000

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92001 cryptovisioncryptovision

cryptovision

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92002

cryptovision

cryptovisioncryptovision

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92006

cryptovision

cryptovision

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92010

cryptovision

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92014

cryptovision

cryptovision

cryptovision

0

1

2

1 2 3 4 5 6 7 8 92015

cryptovision

cryptovision

cryptovision cryptovision

0

1

2

1 2 3 4 5 6 7 8 92016

cryptovision

cryptovision

cryptovision

cryptovision

32Welcome to Mindshare 2016

Strategy Consultants

Weihnachtsman

Superman

Hellman

36Welcome to Mindshare 2016

Products

37Welcome to Mindshare 2016

Terminal Clients ServerDocuments

CardApplications Middleware

SecurityApplications

SecurityInfrastructure

Technology Chain

38Welcome to Mindshare 2016CAmelot

Terminal Clients ServerDocuments

ePasslet s/mailsc/interface

SCalibur

CAmelot

PKIntegrated

Technology Chain

39Welcome to Mindshare 2016

GOVERNMENT ID ENTERPRISE IT

Technology Chain

40Welcome to Mindshare 2016sc/interface

41Welcome to Mindshare 2016sc/interface

What is Security Token Middleware?

Interface between any token form factor and any PKI‐enabled software

SoftwareHardware

Middleware

42Welcome to Mindshare 2016

sc/interface Environment

crypto interface

Host

applicationsc/interface

smart cardreader

card interface

43Welcome to Mindshare 2016sc/interface

Why choose cryptovision PKI middleware?

• Universal sc/interface supports all major Operating Systems like Windows, Linux and OS X and over 50 different card types and readers. Can be used to support old and new documents and the transition period

• Independent sc/interface offers vendor independent ISO-MoC support• Versatile sc/interface offers the complete range of Digital Signature,

Authentication and PKI use-cases• Proven Hundreds of thousands of customers use and trust sc/interface every

day to easily support their daily work• Secure All base libraries of sc/interface have been developed by cryptovision

and are therefore under complete control by us. That means that the middleware does not depend on third-party algorithm implementations. In times of the ‘NSA-scandal’ where the security of algorithms is questioned, this is a significant advantage.

44Welcome to Mindshare 2016SCalibur

45Welcome to Mindshare 2016SCalibur

Comparison: Paper ID versus Electronic ID

eID• content is PIN‐protected

• integrity protection with digital signatures

• physical security mechanisms available

• biometry support

• can be used for encryption, digital signatures and digital authentication

• enables new business processes

Paper ID• piece of paper with a photograph

• hard to forge or copy

46Welcome to Mindshare 2016SCalibur

Distributed middleware allows to store the access credentials on a trusted server

What is a Distributed Middleware?

Distributed Middleware

Card

TrustedServer

Online Service

TerminalKey

47Welcome to Mindshare 2016SCalibur

What else …

Trusted Devicewith Terminal Key

Standalone usage allows to store the access credentials on a trusted device

Card

48Welcome to Mindshare 2016SCalibur

Why choose cryptovision eID middleware SDK?

• Customizable with the SCalibur SDK proposed by cryptovision, partners and agencies will be enabled to offer eGovernment use cases which strengthen their business model

• Simple with a card focused SDK advanced eID functions and security mechanisms can be implemented easily for web services or local applications

• Powerful SDK based applications can be used for a variety of purposes including initial card issuance, biometric matching, or user data management

• Java® Broad cross platform support allows for card applications to be offered on virtually any platform, including mobile.

49Welcome to Mindshare 2016ePasslet Suite

50Welcome to Mindshare 2016ePasslet Suite

Comparison: Native versus Java Card

Java Card• open architecture

• customer can build up expertise

• customization also by customer

• everybody can create new applications

Native• closed architecture

• expertise stays at the supplier

• customization only by supplier

• new applications only by supplier

51Welcome to Mindshare 2016ePasslet Suite

eID Framework

Framework for eIDdocuments

ChipApplications

Framework

52Welcome to Mindshare 2016ePasslet Suite

An eIDframework should not depend on proprietary technology. This is only possible with Java Card

Java

53Welcome to Mindshare 2016ePasslet Suite

ePasslet Suite Environment

Web Service

InspectionSystem

Proof ofAuthorisation

Proof ofEntitlement

Enterprise application

ZOLL

DOUANE

54Welcome to Mindshare 2016CAmelot

55Welcome to Mindshare 2016CAmelot

CAmelot is the solution for digital certificate lifecycle management

Registration Request

Provisioning

PublicationUse

Key Generation

CertificateGeneration

Revocation/EoL

X.509 CertificateLifecycle Management

56Welcome to Mindshare 2016CAmelot

CAmelot is the solution for digital certificate lifecycle management

Registration Request

Provisioning

PublicationDocumentSigning

Key Generation

CertificateGeneration

EoLCard Verifiable Certificate

Lifecycle Management

57Welcome to Mindshare 2016CAmelot

Benefits

CAmelot is for enterprisesCAmelot is for government

58Welcome to Mindshare 2016SCalibur

Why choose cryptovision PKI backend solutions?

• Modular with its unique Engine Module Order (EMO) architecture, CAmelot designed by cryptovision can be individually configured to meet virtually any customer needs and project sizes.

• Efficient integration with existing infrastructure components and processes allows for lower total cost of ownership compared to traditional stand-alone solutions.

• Scalable solution that was proven in various national initiatives from simple ICAO CSCA servers to complex and large-scale multi-application eID PKI backends with 100 million card holders and above.

• Secure configurations possible with support for different HSM vendors with available security levels up to FIPS 140-2 Level 4

• Java® Broad cross platform support enables customers to implement and maintain the cryptovision PKI backend on various server architectures and environments.

59Welcome to Mindshare 2016

Jul 2016 2017 More

CAmelot• Key‐Server• PKI as Appliance 

CAmelot• New Workflow Engine • New PKI Client Pendragon

CAmelot• Government CA Enhancements (CHAT 

extension, SPOC, National PKD, eIDAS)• IBM, Oracle, … integrationsc/interface

• Virtual Smart Card• PIV Edition

sc/interface• sc/interface 7.0 (Full biometric)

SCalibur• Android Edition

ePasslet Suite• New eIDAS functionality• CC certifiable at EAL5+

s/mail• new refactored version• s/mime file encryption s/mail

• Mobile Client• PGP Support• Pendragon interface

ePasslet Suite• Own EMV offering (Visa VSDC, MastercardM/Chip)

ePasslet Suite• LDS 2.0• FIDO Authentication

Product Highlights and Future Topics

The first Mindshare

Bullet List with Header

Bullet List with Visual

Peer Steinbrück

Marco Smeja

64Welcome to Mindshare 2016

Cryptovision Eventswithin the past 12 months

65Welcome to Mindshare 2016

GelsenkirchenJune 2015cryptovision Mindshare 2015

68Welcome to Mindshare 2016

NurembergOctober 2015it‐sa

cryptovision is an international company, but still we enjoy meeting existing and new customers at a German event like it‐sa.Sascha Wester, cryptovision

70Welcome to Mindshare 2016

WashingtonOctober 2015NSA Crypto Symposium

Wipa Aktuell

72Welcome to Mindshare 2016

ParisNovember 2015Cartes/Trustech 2015

73Welcome to Mindshare 2016

Only three days after the Paris terror attacks 40 booths were cancelled at short notice. But it was encouraging to see so many delegates still attend and carry on in spite of the senseless violence.Adam Ross, cryptovision

74Welcome to Mindshare 2016

Cartes/Trustech Paris 2015

75Welcome to Mindshare 2016

San FranciscoFebruary 2016RSA Conference 2016

76Welcome to Mindshare 2016

78Welcome to Mindshare 2016

Only 17 out of 200 presentation proposals were accepted. Both, Adam and I, were among the lucky ones.Klaus Schmeh, cryptovision

81Welcome to Mindshare 2016

KigaliMay 2016ID4Africa 2016

ID4Africa

ID4Africa

It was a great experience to see two cryptovision customers presenting their eID projects back to back on stage to an interested audience.Adam Ross, cryptovision

84Welcome to Mindshare 2016

LondonMay 2016SDW 2016

SDW 2016

The Security Document World is a must‐go for the worldwide eID industry. I was proud to present cryptovision's world‐class solutions there.Joachim Kessel, cryptovision

86Welcome to Mindshare 2016

RigaJune 2016Secure Identification 2016

Secure Identification Riga

The Eastern European eID market is a very interesting one. But Secure Identification Riga goes far beyondthat region and yet we established valuable global contacts.Benjamin Drisch, cryptovision

88Welcome to Mindshare 2016

GelsenkirchenJune 2016cryptovision Mindshare 2016

90Welcome to Mindshare 2016

Mindshare 2016

91Welcome to Mindshare 2016

Sponsors

Gold Silver

Pre‐Conference Dinner

Coffee Break

92Welcome to Mindshare 2016

Exhibition

1 2 3 4 5 6 7

1

2

3

4

5

6

7

AgendaDay 1 Day 2

94Welcome to Mindshare 2016

Partner Presentations

Securing the Identity of TomorrowJoe Lo, Advanide

Hardware Security for Government ApplicationsAlexandra Guennewig, Utimaco

An eID Card Aiming to Bank the UnbankedRolan Jahn, NXP

Derived Personal Identity: Might Software Be the Answer?Aleksandrs Popovs, X INFOTEC

95Welcome to Mindshare 2016

Agenda Highlights

Do You Care if Johnny can Encrypt?Prof. Dr. Angela Sasse, University College London

96Welcome to Mindshare 2016

Agenda Highlights

You are being Watched!Prof. Dr. Arno Wacker, University Kassel

Meet the Experts

Sorry, this is Meet the Experts

Cryptonite: the legendary Mindshare party

Legendary Hamburgers

Legendary children program

Human Foosball

Saving the Best for Last

Fireworks

Quiz prize in 2004

Fill in feedback form and win 

an iPad

108Welcome to Mindshare 2016cv cryptovision GmbH | T: +49 (0) 209.167-24 50 | F: +49 (0) 209.167-24 61 | info(at)cryptovision.com

END