Top Banner
Cathy Tilton Trust Elevation Using Risk-Based Multifactor Authentication 1
28

Trust Elevation Using Risk-Based Multifactor Authentication

Mar 01, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Trust Elevation Using Risk-Based Multifactor Authentication

Cathy Tilton

Trust Elevation Using

Risk-Based Multifactor

Authentication

1

Page 2: Trust Elevation Using Risk-Based Multifactor Authentication

2

Intent is to present an approach for risk-based multifactor

authentication and how it might be used in a trust-

elevation environment

To this end, I will be using Daon‟s IdentityX product as an

example only to demonstrate these ideas.

Caveat

Page 3: Trust Elevation Using Risk-Based Multifactor Authentication

3

The technology

The methods

Use cases

Example

Agenda

Page 4: Trust Elevation Using Risk-Based Multifactor Authentication

Identity is …

4

A unique risk-based, multi-factor authentication capability

that leverages latest generation smart phones (e.g., iPhone,

Blackberry, Android), smart tablets (e.g., iPhone/Playbook)

and traditional mobile devices

Identity technology combines multiple authentication

techniques for greatest identity confidence:

• Device (What you have)

• PKI Certificate (What you have)

• PIN/PW (What you know)

• OOB OTP (What you have)

Placing multiple levels of identity assurance in the hands of

consumers

Designed to run both as an in-app framework and out-of-

band authentication product

• Face (Who you are)

• Voice (Who you are)

• Palm (Who you are)

• GPS (Where you are - context)

• (other as devices enabled)

Page 5: Trust Elevation Using Risk-Based Multifactor Authentication

Multifactor fusion for greatest

identity accuracy/fidelity

5

Voice Palm Face GPS PIN/Passphrase

Page 6: Trust Elevation Using Risk-Based Multifactor Authentication

How is „risk aware‟ identity

assurance achieved?

6

Page 7: Trust Elevation Using Risk-Based Multifactor Authentication

Identity Architecture

7

Relying Party

SMS Provider

iPhone Component

Device Framework

Android Component

Device Framework

Blackberry Component

Device Framework

Symbian Component

Device Framework

Windows Component

Device Framework

IdentityX Service Provider Gateway (IXSPG)

IdentityX Administration Gateway (IXAG)

IdentityX Configuration Manager (IXCM) Web Portal

IdentityX SMS Broker (IXSB)

IdentityX Device Gateway (IXDG)

IdentityX Key Manager (IXKM)

Secure Storage

IdentityX SRP

Page 8: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Policies

8

RP Transaction ID

Abc1

Xyz2

. . .

Policy Selections Method: PIN, Duress PIN Face, Face Liveness Voice, Voice Liveness Palm Context: Location limits Time limits Number of retry attempts . . .

Mapped to

Page 9: Trust Elevation Using Risk-Based Multifactor Authentication

Simple flow

9

RP Application Authentication Server

Request Transaction

Request Authentication

Authentication Challenge(s)

Authentication Response

Authentication Results

Page 10: Trust Elevation Using Risk-Based Multifactor Authentication

Assurance Levels

10

Request Authentication

Authentication Results

Alternatives:

• Request specific set of methods or request based on an assurance level (assumes equivalence established) • Report results as pass/fail or assurance level achieved

• Allow users choice as to preferences, additional methods/levels of assurance beyond minimum

• When trust is elevated, require only delta to current level or full set of challenges for new level

Page 11: Trust Elevation Using Risk-Based Multifactor Authentication

Bridging the gap between

Security and Convenience

11

Trust, Security, Customer Service

Goal

Page 12: Trust Elevation Using Risk-Based Multifactor Authentication

Why include biometrics?

12

• Biometrics is the most preferred additional form of authentication for US online banking users

Page 13: Trust Elevation Using Risk-Based Multifactor Authentication

Use Case – Financial

Transactions

13

User logs into the bank website using simple

username/password.

User initiates low value transaction and is challenged

to authenticate on their mobile device. Proof of

possession (cert based mutual authentication and

user action to approve) is sufficient for this risk level.

Subsequently, the user chooses to perform a higher

value or more fraud-prone transaction. They are then

asked to again authenticate using their mobile device;

however, this time in addition to the cert check, they

are asked to enter a PIN and speak a passphrase,

after which they are provided a one-time password

which they enter on their screen.

Page 14: Trust Elevation Using Risk-Based Multifactor Authentication

Use Case – Leveraging

Geopositon

14

Authentication policy which is location sensitive

Financial transaction: funds transfer

Authentication request –

• if in US, use policy A (methods a + b)

• if outside US, use policy B (a + b + c)

Example –

• a = PIN

• b = face

• c = OOB OTP

[Note – cert check done on every transaction]

Dynamic policy (level/method used)

for a given transaction could use various criteria (e.g., TOD, threat level) and is selected by the RP.

Page 15: Trust Elevation Using Risk-Based Multifactor Authentication

Use Case – User Choice

15

For each transaction type, the bank has set a

minimum set of authentication methods

Users desiring additional protection are given

the ability to add methods

Example – Transfer of $5000

• Default setting: Cert + PIN + OOB OTP

• User adds: voice

Page 16: Trust Elevation Using Risk-Based Multifactor Authentication

Transaction Steps

16

Page 17: Trust Elevation Using Risk-Based Multifactor Authentication

Initiate Transaction

17

Page 18: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Instruction

18

Page 19: Trust Elevation Using Risk-Based Multifactor Authentication

Select App

App is pre-loaded as part of phone

registration process

• Or can be downloaded directly from

app store

App may be standalone (as

shown) or integrated into a service

provider‟s app

19

Page 20: Trust Elevation Using Risk-Based Multifactor Authentication

Select Transaction

20

Transactions may be generated from

multiple service providers and multiple

transactions can be queued for approval.

Familiar Service provider icons can be

used to help to differentiate transactions.

Additional transaction information such as

transaction type, transaction value,

transaction items or title helps the user

easily identify acceptable and non-

fraudulent transactions.

Page 21: Trust Elevation Using Risk-Based Multifactor Authentication

Make Decision

21

Transactions in the system require a user

action in order to be completed.

On a per transaction basis, the user has

the option to approve, decline, or mark a

transaction as fraud.

Page 22: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Option A - PIN

22

A number of actions can be set by the

service provider and/or the consumer –

including face, voice, palm, PIN etc.

IdentityX™ supports a wide variety of

verification methods.

Verification methods are matched to

transaction risk as defined by the

business rules of the Service Provider.

Some transactions may require the use of

a PIN.

Page 23: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Option B - Face

23

Facial verification provides an additional

method of verification appropriate for

certain transactions.

The user simply takes a picture of their

face which is matched against a reference

image.

Facial “Liveness” detection ensures the

user is present and not an imposter (e.g.,

taking a photo of a photo).

Page 24: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Option C - Palm

24

Palm verification provides an additional

method of verification appropriate for

certain transactions.

The user simply takes a picture of their

palm which is matched against a

reference image.

Palm is a very innovative (unique)

authentication solution that is extremely

convenient for users and highly resistant

to fraud.

Page 25: Trust Elevation Using Risk-Based Multifactor Authentication

Authentication Option D - Voice

25

Depending on risk level defined by

Service Provider, user may be asked to

speak a phrase to conduct voice

verification.

As with other types of verification, the

user‟s unique voice can be matched to a

previously captured reference sample.

Voice liveness detection can be

implemented to eliminate “playback

attacks” (e.g., playing a pre-recorded

voice sample).

Page 26: Trust Elevation Using Risk-Based Multifactor Authentication

Verification

26

More than one verification method may be

used. Once all methods have been

submitted, they are evaluated and “fused”

using proven mathematical algorithms.

The Service Provider defines the

transaction risk which maps to a minimum

assurance score to accept the

transaction.

If the transaction is accepted, the Service

Provider may utilize a One Time

Password, show a virtual card, or simply

complete the transaction and move the

user to the next step in their digital

interaction.

Page 27: Trust Elevation Using Risk-Based Multifactor Authentication

Completion

27

Page 28: Trust Elevation Using Risk-Based Multifactor Authentication

28

More Information

Catherine J. Tilton, CBP

VP, Standards & Technology, Daon

11955 Freedom Drive, Suite 16000

Reston, VA 20190

703-984-4080

[email protected]