carlos moreira

2
T heft of bank data, misappropriation of identities on social networks, phishing, account piracy, black- mailing, counterfeiting, etc.: the problems of identity and authenti- city have never been as virulent and wide- spread as they are today. However, digital identification combined with biometrics already has a good head start on the Falcianis and the other Arsène Lupins of the Web, technologically and conceptually. Whereas traditional approaches to IT secu- rity concentrate their efforts on the reinfor- cement of infrastructures (physical access to servers and networks), digital certifica- tion makes a point of protecting the actual data, the nerve center of this war, and, by extension, protecting its integrity. “Of course, absolute security does not exist, nor does zero risk, but it can be greatly reduced with these technologies. Securing data and electronic transactions is at the top of the list of risk management measures. Confidentiality is a sine qua non condition for the establishment of fruitful partner- ships, especially in the banking sector,” stated WISeKey CEO & founder, Carlos Moreira. Every individual is a risk The digital identification and electronic transactions specialist, WISeKey, is not a traditional IT security firm. Its business model does not consist of setting up infra- structure fortresses to protect their clients merely from outside attacks. “WISeKey’s mission is to digitally secure the individual and his or her transactions, and not to build firewalls!” said Jérôme Darbellay, Chief Research/ Strategy Officer at WISeKey. As many studies have already revealed, the risk of theft, falsification or manipulation of data is mainly the result of internal actions, and is more often than not due to ignorance. The gap in security occurs precisely between the physical person and the digital identity, or “virtual avatar”, that has access to information such as online accounts or emails. This has to be filled by high-grade authentication, for the individual as well as for the virtual alter ego. Digital certification, known as PKI (Public Key Infrastructure), is the only way to do this. Put simply, it allows data to be secured independently from the infrastructures in place, through the use of electronic signatures, which guarantee the origin (source) of the data, and also through encoding or encryption, which regulates who can have access to what (the destina- tion). The principle of a digital identity is compa- rable to that which governs your bank card and its pin code. If you have lost your wallet and you kept your pin code in it, the bank will not reimburse you if your account is debited. Personal responsibility is handled in the same way within the framework of PKI. Each exchange of information consti- tutes a formal contract, on the behalf of the sender as well as the receiver. “Other tech- nologies that compete with PKI have neither the legal framework nor the guarantee of identifying the person (or the object) to whom the digital identity is delivered,” added Jérôme Darbellay. Authenticating confirmed identities The renewed interest of banks and govern- ments in identity management has pushed PKI technologies to the front of the stage, as it is not an identification system but a system for the authentication of confirmed identities. This means that attributes such as surname, name, year of birth, place of birth, profession, registration in the com- mercial register, serial number, etc. have been previously confirmed and legally certi- fied beforehand in the real world by a trusted third party (administrations or governments). “It is the ultimate barrier against leaks or improper usage of data. This process allows the hierarchical organi- sation of access to the data, and the imme- diate withdrawal of access should there be any doubt (for example in the case of theft or manipulation of data). Also, only the members of the management of a business have access to all the information,” added Carlos Moreira. IT SECURITY B&F BANKING SOLUTIONS 38 B&F DIGITAL IDENTIFICATION The ultimate barrier against data leaks For digital identity specialist WISeKey, only PKI technologies combined with biometric data provide the legal framework necessary for the identification of people and objects. Carlos MOREIRA* Carlos MOREIRA, Founder & CEO, WISeKey

Upload: carlos-moreira

Post on 28-Mar-2016

214 views

Category:

Documents


2 download

DESCRIPTION

B&F BANKING SOLUTIONS WISekey article this month

TRANSCRIPT

Page 1: Carlos Moreira

Theft of bank data, misappropriationof identities on social networks,phishing, account piracy, black -mailing, counterfeiting, etc.: theproblems of identity and authenti-

city have never been as virulent and wide -spread as they are today. However, digitalidentification combined with biometricsalready has a good head start on theFalcianis and the other Arsène Lupins of theWeb, technologically and conceptually.Whereas traditional approaches to IT secu-rity concentrate their efforts on the reinfor-cement of infrastructures (physical accessto servers and networks), digital certifica-tion makes a point of protecting the actualdata, the nerve center of this war, and, byextension, protecting its integrity. “Ofcourse, absolute security does not exist,nor does zero risk, but it can be greatlyreduced with these technologies. Securingdata and electronic transactions is at thetop of the list of risk management measures.Confidentiality is a sine qua non conditionfor the establishment of fruitful partner-ships, especially in the banking sector,”stated WISeKey CEO & founder, CarlosMoreira.

Every individual is a riskThe digital identification and electronictransactions specialist, WISeKey, is not atraditional IT security firm. Its businessmodel does not consist of setting up infra-structure fortresses to protect their clientsmerely from outside attacks. “WISeKey’smission is to digitally secure the individualand his or her transactions, and not to build

firewalls!” said Jérôme Darbellay, ChiefResearch/ Strategy Officer at WISeKey. Asmany studies have already revealed, therisk of theft, falsification or manipulation ofdata is mainly the result of internal actions,and is more often than not due to ignorance. The gap in security occurs preciselybetween the physical person and the digitalidentity, or “virtual avatar”, that has accessto information such as online accounts oremails. This has to be filled by high-gradeauthentication, for the individual as well asfor the virtual alter ego. Digital certification,known as PKI (Public Key Infrastructure), isthe only way to do this. Put simply, it allowsdata to be secured independently from theinfrastructures in place, through the use ofelectronic signatures, which guarantee theorigin (source) of the data, and also through

encoding or encryption, which regulateswho can have access to what (the destina-tion). The principle of a digital identity is compa-rable to that which governs your bank cardand its pin code. If you have lost your walletand you kept your pin code in it, the bankwill not reimburse you if your account isdebited. Personal responsibility is handledin the same way within the framework ofPKI. Each exchange of information consti-tutes a formal contract, on the behalf of thesender as well as the receiver. “Other tech-nologies that compete with PKI have neitherthe legal framework nor the guarantee ofidentifying the person (or the object) towhom the digital identity is delivered,”added Jérôme Darbellay.

Authenticating confirmed identitiesThe renewed interest of banks and govern-ments in identity management has pushedPKI technologies to the front of the stage, asit is not an identification system but asystem for the authentication of confirmedidentities. This means that attributes suchas surname, name, year of birth, place ofbirth, profession, registration in the com-mercial register, serial number, etc. havebeen previously confirmed and legally certi-fied beforehand in the real world by atrusted third party (administrations orgovernments). “It is the ultimate barrieragainst leaks or improper usage of data.This process allows the hierarchical organi-sation of access to the data, and the imme-diate withdrawal of access should there beany doubt (for example in the case of theftor manipulation of data). Also, only themembers of the management of a businesshave access to all the information,” addedCarlos Moreira.

IT SECURITY

B&F BANKING SOLUTIONS38 B&F

DIGITAL IDENTIFICATION

The ultimate barrieragainst data leaks For digital identity specialist WISeKey, only PKI technologies combined with biometric dataprovide the legal framework necessary for the identification of people and objects.

Carlos MOREIRA*

Carlos MOREIRA, Founder & CEO, WISeKey

BF_HS10_BF_HS09.qxd 29.09.10 22:39 Page38

Page 2: Carlos Moreira

SPECIALIZATION

These principles of digital identification are adaptable to the protection of dataand/or individuals within almost any pre-existing IT system in any sector in need ofstrong authen tication: health, watch mak -ing, public sector, mobile communications(by integration of certificates in the SIMcards), banking (Norwegian and Americaninstitutes, for example, base their securetransaction system, BankID, on PKI). Thistechnology is also widely used in the frame-work of eGovernment projects: the systemof electronic tax declarations is one of the most important large scale uses of PKI. Credit card issuance companies anddigital passport projects can also be givenas exam ples of those that trust this infra-structure. n C.M.

*Founder & CEO, WISeKey

(Translated from the French article edited bySylvie Gardel)

B&F BANKING SOLUTIONS B&F 39

BF_HS10_BF_HS09.qxd 29.09.10 22:39 Page39