SlideShare a Scribd company logo
Intel Labs
Bringing the User Back into
User Centric Identity
Conor P Cahill
Principal Engineer
Intel Labs
Intel Labs
Legal Disclaimer
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN
INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL
DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR
WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT,
COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death.
SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND
HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF
EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF,
DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH
MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN,
MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or
characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no
responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without
notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling
1-800-548-4725, or go to: http://www.intel.com/design/literature.htm
CBAT and other code names featured are used internally within Intel to identify projects and/or products that are in development and not yet
publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising,
promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user
Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
*Other names and brands may be claimed as the property of others.
Copyright ©2013 Intel Corporation.
Intel Labs
Existing Authentication
Weak
Repetitive
Painful
Intel Labs
Research Question
How does the existing authentication
model change if we can trust an
authentication agent on the client?
Intel Labs
Vision
Hi Jane!
Knows that it is
talking to Jane and
she is still there
Auto-login
Intel Labs
Protected
Client Based Authentication Technology
(CBAT)
App/Web
Server
Service Provider
TIM
Single Sign On (SSO)
Protect
Much More Secure, Much More Usable
User’s Identity Server
(not 3rd Party)
Trusted Execution
Environment (TEE)
Direct User Auth
Malware Resistant
Maintains Authn
while user present
Lock computer
if user leaves
Assertion of User ID
from Trusted Client
Eliminates Phishing
Used Together, SP
knows user is involved
in transaction
Intel Labs
•  Local, strong, multi-factor authentication of the user
•  Presence Monitoring & Session protection
–  Extends User Authentication Session
–  Protect user’s auth session even if they walk away
•  Secure attestation of user identity
–  Local and remote service providers
•  Service Provider knows who/what they are interacting with
–  CBAT is a trusted endpoint
•  Gets rid of Conor’s Pet Peeve…
–  No more “timeouts for my protection” when I’ve been sitting
at the computer the entire time.
CBAT Richness
Intel Labs
Prototype
•  Desktop, Laptop & Tablet
•  Core Engine functionality
–  Authentication, Presence, SAML SSO Provider,
seamless login to demo web sites
•  Auth Factors:
–  Facial Recognition, Voice Recognition, Finger Vein,
Palm Vein, Password
•  Presence Factors
–  Accelerometer, Facial recognition, proximity, Voice
recognition
Intel Labs
CBAT and Standards
•  Base Steady-State SSO fits into existing models
–  OpenID Connect, SAML, etc.
–  Client is IdP
•  Use of Presence not anticipated
–  Seems to require some level of extension
•  Attestation of CBAT client
–  Typically during provisioning
–  Closely related to TEE technologies
–  Standardization would be good
Intel Labs
Ongoing Research
•  Device Constellation
–  How do devices work together?
•  Provisioning
–  CBAT to SP Pairing (initial and multiple device)
•  Authentication & Presence aggregation
–  Multiple factor fusion
•  Trusted Path to Authentication & Presence Sensors
–  Data injection resistance on sensor input
•  Authentication & Presence factors
–  Better sensors/capabilities
Intel Labs
Q&A

More Related Content

PDF
Intel atom processor_z2420_product_brief
PDF
ALKU Government Company Information
DOCX
oracle Apss technical consultant
PDF
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
PDF
CIS13: Identity is the New Currency
PDF
CIS14: How I Came to Share Signals and Learned to Love my Identity System
PDF
CIS14: Implementing MITREid
PDF
CIS14: Creating a Federated Identity Service for Better SSO
Intel atom processor_z2420_product_brief
ALKU Government Company Information
oracle Apss technical consultant
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Identity is the New Currency
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: Implementing MITREid
CIS14: Creating a Federated Identity Service for Better SSO

Viewers also liked (14)

PDF
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
PDF
CIS13: NSTIC Update and Reports from Pilots
PDF
CIS14: Mobilize Your Workforce with Secure Identity Services
PDF
CIS13: FCCX and IDESG: An Industry Perspectives
PDF
CIS13: Federation Protocol Cross-Section
PDF
CIS13: The Power of the Cloud and Transformation in the Enterprise
PDF
CIS14: Network-Aware IAM
PDF
Open stand overview_072014
PDF
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
PDF
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
PDF
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
PDF
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
PDF
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
PDF
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: NSTIC Update and Reports from Pilots
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: Federation Protocol Cross-Section
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS14: Network-Aware IAM
Open stand overview_072014
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
Ad

Similar to CIS13: Bringing the User Back into User-Centric Identity (20)

PDF
How Intel Security Ensures Identity Protection - Infographic
PDF
Intel Public Roadmap for Desktop, Mobile, Data Center
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
PDF
4 dpdk roadmap(1)
PDF
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
PDF
1 intro to_dpdk_and_hw
PDF
2014-vol18-iss-2-intel-technology-journal
PDF
Intel HPC Update
PDF
Droidcon2013 x86phones weggerle_taubert_intel
PDF
Austin Cherian: Big data and HPC technologies - intel
PDF
Intel 6th Gen vPro
PDF
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
PDF
2 new hw_features_cat_cod_etc
PPTX
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year Horizon
PDF
Алексей Слепцов_"Интернет вещей. Что это и для чего"
PDF
Sf14 mobs002 101f
PDF
Delivering Compelling Usages for Imaging with Intel® Architecture Based Platf...
PDF
Intel Mobile Launch Information
PPTX
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
PDF
DUG'20: 03 - Online compression with QAT in DAOS
How Intel Security Ensures Identity Protection - Infographic
Intel Public Roadmap for Desktop, Mobile, Data Center
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
4 dpdk roadmap(1)
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
1 intro to_dpdk_and_hw
2014-vol18-iss-2-intel-technology-journal
Intel HPC Update
Droidcon2013 x86phones weggerle_taubert_intel
Austin Cherian: Big data and HPC technologies - intel
Intel 6th Gen vPro
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
2 new hw_features_cat_cod_etc
Gary Brown (Movidius, Intel): Deep Learning in AR: the 3 Year Horizon
Алексей Слепцов_"Интернет вещей. Что это и для чего"
Sf14 mobs002 101f
Delivering Compelling Usages for Imaging with Intel® Architecture Based Platf...
Intel Mobile Launch Information
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
DUG'20: 03 - Online compression with QAT in DAOS
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Getting Started with Data Integration: FME Form 101
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
project resource management chapter-09.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
Tartificialntelligence_presentation.pptx
What is a Computer? Input Devices /output devices
Getting Started with Data Integration: FME Form 101
Web App vs Mobile App What Should You Build First.pdf
WOOl fibre morphology and structure.pdf for textiles
A contest of sentiment analysis: k-nearest neighbor versus neural network
project resource management chapter-09.pdf
1. Introduction to Computer Programming.pptx
The various Industrial Revolutions .pptx
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DP Operators-handbook-extract for the Mautical Institute
Zenith AI: Advanced Artificial Intelligence
Univ-Connecticut-ChatGPT-Presentaion.pdf
observCloud-Native Containerability and monitoring.pptx
Getting started with AI Agents and Multi-Agent Systems
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Programs and apps: productivity, graphics, security and other tools
Final SEM Unit 1 for mit wpu at pune .pptx

CIS13: Bringing the User Back into User-Centric Identity

  • 1. Intel Labs Bringing the User Back into User Centric Identity Conor P Cahill Principal Engineer Intel Labs
  • 2. Intel Labs Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm CBAT and other code names featured are used internally within Intel to identify projects and/or products that are in development and not yet publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright ©2013 Intel Corporation.
  • 4. Intel Labs Research Question How does the existing authentication model change if we can trust an authentication agent on the client?
  • 5. Intel Labs Vision Hi Jane! Knows that it is talking to Jane and she is still there Auto-login
  • 6. Intel Labs Protected Client Based Authentication Technology (CBAT) App/Web Server Service Provider TIM Single Sign On (SSO) Protect Much More Secure, Much More Usable User’s Identity Server (not 3rd Party) Trusted Execution Environment (TEE) Direct User Auth Malware Resistant Maintains Authn while user present Lock computer if user leaves Assertion of User ID from Trusted Client Eliminates Phishing Used Together, SP knows user is involved in transaction
  • 7. Intel Labs •  Local, strong, multi-factor authentication of the user •  Presence Monitoring & Session protection –  Extends User Authentication Session –  Protect user’s auth session even if they walk away •  Secure attestation of user identity –  Local and remote service providers •  Service Provider knows who/what they are interacting with –  CBAT is a trusted endpoint •  Gets rid of Conor’s Pet Peeve… –  No more “timeouts for my protection” when I’ve been sitting at the computer the entire time. CBAT Richness
  • 8. Intel Labs Prototype •  Desktop, Laptop & Tablet •  Core Engine functionality –  Authentication, Presence, SAML SSO Provider, seamless login to demo web sites •  Auth Factors: –  Facial Recognition, Voice Recognition, Finger Vein, Palm Vein, Password •  Presence Factors –  Accelerometer, Facial recognition, proximity, Voice recognition
  • 9. Intel Labs CBAT and Standards •  Base Steady-State SSO fits into existing models –  OpenID Connect, SAML, etc. –  Client is IdP •  Use of Presence not anticipated –  Seems to require some level of extension •  Attestation of CBAT client –  Typically during provisioning –  Closely related to TEE technologies –  Standardization would be good
  • 10. Intel Labs Ongoing Research •  Device Constellation –  How do devices work together? •  Provisioning –  CBAT to SP Pairing (initial and multiple device) •  Authentication & Presence aggregation –  Multiple factor fusion •  Trusted Path to Authentication & Presence Sensors –  Data injection resistance on sensor input •  Authentication & Presence factors –  Better sensors/capabilities