2018. 3
Today’s security threat
ID theft
Credit card fraud
Cyber security
ASTO smart card
ASTO smart card
Card holder
Cryptography
Cold wallet for cryptocurrency
Remote sever login
Access control
Strength of ASTO smart card
ASTO smart card ecosystem
Lion Security
Lion Security
contents
3
ID Theft
▪ ID theft is the starting point for fraudster
▪ 16.7 million ID thefts in 2017 and incurred damage is $16.8 Billion
▪ Most of ID thefts are led to tax or wage related fraud and credit card fraud
▪ Social security No. and credit No. are the most common damages of data
breaches
신분도용 방지를 위한
미국정부의 권고사항
US government
recommendation
Create complex passwords that
identity thieves cannot guess easily.
Change your passwords if a
company that you do business with
has a breach of its databases
4
Credit Card Fraud
Card Not Present transaction
In Person transaction
EMV credit card
Migrated to Online fraud
▪ 0.07 per 100usd is fraud with in
person card transaction
▪ Data breaches are rampant. We
can even by credit card
information in the internet
▪ Tighter security of EMV card has
fraudster migrate to less secure
Card Not Present transaction
▪ No tool for merchant to verify
CNP transaction
▪ Click and Collect scheme in on
line shopping
▪ Incurred amount of CNP in 2020
could be as high as $7.2 Billion
5
Cyber Security
▪ Unauthorized access by insider
Need to manage identification and
access authority by individual
▪ Network security
Need to control access authority
▪ Endpoint security
Hardware security key is the best
way to impose restriction to the
access of network and removal of
potential attack path
6
Storage On Chip
• Encrypted
• Up to 5 fingerprint templates
Match On Chip
• Algorithm Certified by KISA
• FRR : 0.01%
• FAR : 0.001%
• Less than 1sec to authenticate
No battery
• Power harvesting
▪ NFC
▪ Compatible with mobile phone
▪ RFID
▪ ISO7816 & 14443
ASTO smart card
Applet
• Cryptography
• Transaction
• Development on demand
7
▪ USB
▪ Fingerprint enrollment
▪ Compatible with desktop
▪ Blue Tooth
▪ Authentication in distance
Card Holder
8
▪ 2nd factor login
▪ Single login with user biometric
▪ Hacking free for Service site
▪ Simple and secure login for user
User Side 서비스 사이트
Web Application
Authentication
Library
Public Key
Key Handler
Attestation Certification
Client/Browser
API
USB(HID)
NFC
API Code
BLE
Device
ASTO smart card
Cryptography on the card
Unlock Authenticator with
fingerprint
Sign back to challenges
Private Key
Public Key
USB(HID)
NFC
Transport
BLE
Cryptography
9
ASTO smart card
Private key encrypted & stored on
the card
Place your finger on the card
Open your mobile wallet
Sign off transaction with your
fingerprint
▪ NFC communication with mobile phone
▪ Extract private key with your fingerprint
Cold Wallet for cryptocurrency
10
console 1
console n
console 2
User pool
ID/PW
Fingerprint
ASTO smart card & Holder
Linux
Kernel 2.6
ASTO
Authentication
agent
Data Center
Management
▪ Eliminate phishing
▪ Prevent Man in the
Middle attack
Secure
▪ Free from ID/PW
Simple
▪ Use the same card for
difference services
Scalable
Remote server login
11
Access control
Card terminal
Tap ASTO
card
Match on Chip
Storage on Chip
ID/PW/fingerprint
Match?Input Fingerprint
Access
Granted
Yes
No
Unlock applet
Door
Membership
Network
Banking
12
Strength of ASTO smart card
Design to your
needs
Scalable
Cost
Competitive
Reliable
Develop applet to meet
your specific needs
Just one card but
various services
Compatible with
already existing
credit card infra
Integrate with your
security system
Most commonly
used biometric
User friendly
13
ASTO smart card
Encoder
UV Printer
Card Terminal
Enrollment
Card Management System
Personalization
Card issuer credential, Card holder info.
Graphical Design
Unique graphical expression of the card
Interact with Card
Applicable with general card terminal
Fingerprint Enrollment
On the spot or remote enrollment
Issuance, Activation, EOL, etc.
Smart card life cycle management
ASTO smart card ecosystem
14
Lion Security
PhysicalSecurity
CyberSecurityFintechSecurity
We develop technology, integrate and
create ecosystem of physical, cyber
and fintech security evolving around
ASTO smart card with fingerprint
matching algorithm on the card
ASTO smart card intro ASTO smart card demo
Video library

More Related Content

PDF
How To Catch A Fraudster Live Webinar
PDF
Blockchain Account Aggregation oct 2019 rev nci
PPTX
rajat_ppt
PPTX
Webinar: Roll Out the VIP Path to Play
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PPTX
The Road to Intelligent Authentication Journeys
PPTX
Digital certificate
PDF
Detecting Frauds and Identifying Security Challenge | by Money2Conf
How To Catch A Fraudster Live Webinar
Blockchain Account Aggregation oct 2019 rev nci
rajat_ppt
Webinar: Roll Out the VIP Path to Play
Customer Safeguarding, Fraud and GDPR: Manah Khalil
The Road to Intelligent Authentication Journeys
Digital certificate
Detecting Frauds and Identifying Security Challenge | by Money2Conf

What's hot (20)

PPT
ISS SA le presenta IdentityGuard Mobile de Entrust
PPT
Internet Banking Attacks (Karel Miko)
PDF
Secure Online Banking
DOCX
Preventing Internet Fraud By Preventing Identity Theft
PPTX
E banking security
PDF
ForgeRock Open banking - Meetup 28/06/2018
PPTX
ADB Hack 2018 - National Identity Gateway
PPT
E-Banking Web Security
PDF
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
PPTX
Chapter 17 a fraud in e commerce Jen
PPTX
Cyber fraud a threat to E commerce
PPTX
Callcredit's Fraud Summit 2016 - Identity verification stream
PDF
Cyber fraud in banks
PDF
【HITCON FreeTalk 2021 - From fakespy to Guerilla: Understanding Android malw...
PDF
BTKO.in - PNP Fintech May 2015
PDF
Malta Economic Update 06 2008 - isec interview
PPTX
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
PPTX
Callcredit's Fraud Summit 2016 - Plenary session
PDF
figo at FinTech Startups MeetUp in Hamburg
PPTX
Callcredit's Fraud Summit - Customer experience stream
ISS SA le presenta IdentityGuard Mobile de Entrust
Internet Banking Attacks (Karel Miko)
Secure Online Banking
Preventing Internet Fraud By Preventing Identity Theft
E banking security
ForgeRock Open banking - Meetup 28/06/2018
ADB Hack 2018 - National Identity Gateway
E-Banking Web Security
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
Chapter 17 a fraud in e commerce Jen
Cyber fraud a threat to E commerce
Callcredit's Fraud Summit 2016 - Identity verification stream
Cyber fraud in banks
【HITCON FreeTalk 2021 - From fakespy to Guerilla: Understanding Android malw...
BTKO.in - PNP Fintech May 2015
Malta Economic Update 06 2008 - isec interview
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Callcredit's Fraud Summit 2016 - Plenary session
figo at FinTech Startups MeetUp in Hamburg
Callcredit's Fraud Summit - Customer experience stream
Ad

Similar to Asto card into (20)

PDF
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
PPTX
Practical advice for cloud data protection ulf mattsson - jun 2014
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Security in the News
PDF
PPTX
Webinar: Securing IoT with FIDO Authentication
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
Cracking Chip & PIN
PDF
System and Enterprise Security Project - Penetration Testing
PPTX
1ID2-KeyBank-CapitalOne.pptx
PDF
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
PDF
The Path to Payment Security
PPTX
Computer Security in Banking and bookkeeping
PDF
PDF
2 cyber security challenges in io t
PDF
FIDO in Government
PDF
Cybersecurity for Banking & Payments Systems
PPTX
Security Testing for IoT Systems
PDF
Introduction to FIDO Biometric Authentication
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Practical advice for cloud data protection ulf mattsson - jun 2014
Track 5 session 1 - st dev con 2016 - need for security for iot
Security in the News
Webinar: Securing IoT with FIDO Authentication
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Cracking Chip & PIN
System and Enterprise Security Project - Penetration Testing
1ID2-KeyBank-CapitalOne.pptx
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
The Path to Payment Security
Computer Security in Banking and bookkeeping
2 cyber security challenges in io t
FIDO in Government
Cybersecurity for Banking & Payments Systems
Security Testing for IoT Systems
Introduction to FIDO Biometric Authentication
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
Ad

Recently uploaded (20)

DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PPTX
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
PPTX
IMM.pptx marketing communication givguhfh thfyu
PDF
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
PPTX
Market and Demand Analysis.pptx for Management students
PDF
Comments on Clouds that Assimilate Parts I&II.pdf
PDF
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
income tax laws notes important pakistan
PPTX
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PPTX
df0ee68f89e1a869be4bff9b80a7 business 79f0.pptx
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
Middle East's Most Impactful Business Leaders to Follow in 2025
PPTX
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
533158074-Saudi-Arabia-Companies-List-Contact.pdf
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
IMM.pptx marketing communication givguhfh thfyu
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
Market and Demand Analysis.pptx for Management students
Comments on Clouds that Assimilate Parts I&II.pdf
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
income tax laws notes important pakistan
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
df0ee68f89e1a869be4bff9b80a7 business 79f0.pptx
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Middle East's Most Impactful Business Leaders to Follow in 2025
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd

Asto card into

  • 2. Today’s security threat ID theft Credit card fraud Cyber security ASTO smart card ASTO smart card Card holder Cryptography Cold wallet for cryptocurrency Remote sever login Access control Strength of ASTO smart card ASTO smart card ecosystem Lion Security Lion Security contents
  • 3. 3 ID Theft ▪ ID theft is the starting point for fraudster ▪ 16.7 million ID thefts in 2017 and incurred damage is $16.8 Billion ▪ Most of ID thefts are led to tax or wage related fraud and credit card fraud ▪ Social security No. and credit No. are the most common damages of data breaches 신분도용 방지를 위한 미국정부의 권고사항 US government recommendation Create complex passwords that identity thieves cannot guess easily. Change your passwords if a company that you do business with has a breach of its databases
  • 4. 4 Credit Card Fraud Card Not Present transaction In Person transaction EMV credit card Migrated to Online fraud ▪ 0.07 per 100usd is fraud with in person card transaction ▪ Data breaches are rampant. We can even by credit card information in the internet ▪ Tighter security of EMV card has fraudster migrate to less secure Card Not Present transaction ▪ No tool for merchant to verify CNP transaction ▪ Click and Collect scheme in on line shopping ▪ Incurred amount of CNP in 2020 could be as high as $7.2 Billion
  • 5. 5 Cyber Security ▪ Unauthorized access by insider Need to manage identification and access authority by individual ▪ Network security Need to control access authority ▪ Endpoint security Hardware security key is the best way to impose restriction to the access of network and removal of potential attack path
  • 6. 6 Storage On Chip • Encrypted • Up to 5 fingerprint templates Match On Chip • Algorithm Certified by KISA • FRR : 0.01% • FAR : 0.001% • Less than 1sec to authenticate No battery • Power harvesting ▪ NFC ▪ Compatible with mobile phone ▪ RFID ▪ ISO7816 & 14443 ASTO smart card Applet • Cryptography • Transaction • Development on demand
  • 7. 7 ▪ USB ▪ Fingerprint enrollment ▪ Compatible with desktop ▪ Blue Tooth ▪ Authentication in distance Card Holder
  • 8. 8 ▪ 2nd factor login ▪ Single login with user biometric ▪ Hacking free for Service site ▪ Simple and secure login for user User Side 서비스 사이트 Web Application Authentication Library Public Key Key Handler Attestation Certification Client/Browser API USB(HID) NFC API Code BLE Device ASTO smart card Cryptography on the card Unlock Authenticator with fingerprint Sign back to challenges Private Key Public Key USB(HID) NFC Transport BLE Cryptography
  • 9. 9 ASTO smart card Private key encrypted & stored on the card Place your finger on the card Open your mobile wallet Sign off transaction with your fingerprint ▪ NFC communication with mobile phone ▪ Extract private key with your fingerprint Cold Wallet for cryptocurrency
  • 10. 10 console 1 console n console 2 User pool ID/PW Fingerprint ASTO smart card & Holder Linux Kernel 2.6 ASTO Authentication agent Data Center Management ▪ Eliminate phishing ▪ Prevent Man in the Middle attack Secure ▪ Free from ID/PW Simple ▪ Use the same card for difference services Scalable Remote server login
  • 11. 11 Access control Card terminal Tap ASTO card Match on Chip Storage on Chip ID/PW/fingerprint Match?Input Fingerprint Access Granted Yes No Unlock applet Door Membership Network Banking
  • 12. 12 Strength of ASTO smart card Design to your needs Scalable Cost Competitive Reliable Develop applet to meet your specific needs Just one card but various services Compatible with already existing credit card infra Integrate with your security system Most commonly used biometric User friendly
  • 13. 13 ASTO smart card Encoder UV Printer Card Terminal Enrollment Card Management System Personalization Card issuer credential, Card holder info. Graphical Design Unique graphical expression of the card Interact with Card Applicable with general card terminal Fingerprint Enrollment On the spot or remote enrollment Issuance, Activation, EOL, etc. Smart card life cycle management ASTO smart card ecosystem
  • 14. 14 Lion Security PhysicalSecurity CyberSecurityFintechSecurity We develop technology, integrate and create ecosystem of physical, cyber and fintech security evolving around ASTO smart card with fingerprint matching algorithm on the card ASTO smart card intro ASTO smart card demo Video library