SlideShare a Scribd company logo
INTRODUCTION TO FIDO
AUTHENTICATION
Brett McDowell, Executive Director, FIDO Alliance
brett@fidoalliance.org
All Rights Reserved | FIDO Alliance | Copyright 2016
The Problem
The Solution
The Alliance
The Market
All Rights Reserved | FIDO Alliance | Copyright 2016 2
781 data breaches in 2015
Data Breaches…
170 million records in 2015 (up 50%)
$3.8 million cost/breach (up 23% f/2013)
All Rights Reserved | FIDO Alliance | Copyright 2016 3
“95% of these incidents
involve harvesting
credentials stolen from
customer devices, then
logging into web
applications with them.”
2015 Data Breach Investigations Report
All Rights Reserved | FIDO Alliance | Copyright 2016 4
“A look through the details of these
incidents shows a common sequence of
phish customer ≥
get credentials ≥
abuse web application ≥
empty bank/bitcoin account.”
2015 Data Breach Investigations Report
All Rights Reserved | FIDO Alliance | Copyright 2016 5
The world has a PASSWORD PROBLEM
5Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 6
IDM has a “Shared Secrets” PROBLEM
5Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 7
ONE-TIME PASSCODES
Improve security but aren’t easy enough to use
Still
Phishable
User
Confusion
Token
Necklace
SMS
Reliability
6Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 8
WE NEED A
NEW MODEL
All Rights Reserved | FIDO Alliance | Copyright 2016 9
The Problem
The Solution
The Alliance
The Market
All Rights Reserved | FIDO Alliance | Copyright 2016 10
THE NEW MODEL
Fast IDentity Online
online authentication using
public key cryptography
All Rights Reserved | FIDO Alliance | Copyright 2016 11
THE OLD
PARADIGM
USABILITYSECURITY
All Rights Reserved | FIDO Alliance | Copyright 2016 12
THE FIDO
PARADIGM
Poor Easy
WeakStrong USABILITY
SECURITY
All Rights Reserved | FIDO Alliance | Copyright 2016 13
HOW “Shared Secrets” WORK
ONLINE
The user authenticates
themselves online by presenting a
human-readable “shared secret”
All Rights Reserved | FIDO Alliance | Copyright 2016 14
HOW FIDO AUTHN WORKS
AUTHENTICATOR
LOCAL ONLINE
The user authenticates
“locally” to their device
(by various means)
The device authenticates
the user online using
public key cryptography
All Rights Reserved | FIDO Alliance | Copyright 2016 15
OPEN STANDARDS R.O.I.
FIDO-ENABLE ONCE
GAIN EVERY DEVICE YOU TRUST
NO MORE ONE-OFF INTEGRATIONS
All Rights Reserved | FIDO Alliance | Copyright 2016 16
USABILITY, SECURITY, R.O.I.
and
PRIVACY
All Rights Reserved | FIDO Alliance | Copyright 2016 17
No 3rd Party in the Protocol
No Secrets on the Server Side
Biometric Data (if used) Never Leaves Device
No Link-ability Between Services
No Link-ability Between Accounts
All Rights Reserved | FIDO Alliance | Copyright 2016 18
Better security for online services
Reduced cost for the enterprise
Simpler and safer for consumers
All Rights Reserved | FIDO Alliance | Copyright 2016 19
The Problem
The Solution
The Alliance
The Market
All Rights Reserved | FIDO Alliance | Copyright 2016
The FIDO Alliance is an open industry
association with a focused mission:
authentication standards
All Rights Reserved | FIDO Alliance | Copyright 2016 21
Physical-to-digital identity
User Management
Authentication
Federation
Single
Sign-On
Passwords Risk-BasedStrong
MODERN
AUTHENTICATION
FIDO SCOPE
All Rights Reserved | FIDO Alliance | Copyright 2016 22
FIDO Alliance Mission
Develop
Specifications
Operate
Adoption Programs
Pursue Formal
Standardization
1 2 3
All Rights Reserved | FIDO Alliance | Copyright 2016 23
Board Members
24 All Rights Reserved | FIDO Alliance | Copyright 2016 24
Government & Research
“The fact that FIDO has now welcomed government
participation is a logical and exciting step toward
further advancement of the Identity Ecosystem;
we look forward to continued progress.”
-- Mike Garcia, NSTIC NPO
25
2525All Rights Reserved | FIDO Alliance | Copyright 2016
Liaison Program
Our mission is highly
complementary to
many other
associations around
the world. We
welcome the
opportunity to
collaborate with this
growing list of
industry partner
organizations.
26
26All Rights Reserved | FIDO Alliance | Copyright 2016 26
The Problem
The Solution
The Alliance
The Market
All Rights Reserved | FIDO Alliance | Copyright 2016
EARLY FIDO ADOPTION
20152014
All Rights Reserved | FIDO Alliance | Copyright 2016 28
“NTT DOCOMO is now
offering FIDO-enabled
biometric authentication for
customers using Apple iOS
devices”
Mar 7, 2016
RECENT FIDO ADOPTION
“FIDO Universal 2nd Factor
(U2F) authentication is now
being used to allow all UK
citizens to easily and
securely access GOV.UK
Verify digital public
services.
Mar 23, 2016
“BC Card provides Token
and FIDO services to
strengthen security and
safety of Samsung Pay”
March 1, 2016
“KEB Hana’s new solution
is notably FIDO Certified.”
February 3, 2016
“Baidu Wallet is now offering FIDO-
enabled biometric authentication for
customers using Android devices”
April, 2016
Q1
2016
Q2
2016
All Rights Reserved | FIDO Alliance | Copyright 2016 29
Deployments are enabled by over 150
FIDO® Certified products
www.fidoalliance.org/certification/fido-certified/
All Rights Reserved | FIDO Alliance | Copyright 2016 30
 Available to anyone
 Ensures interoperability
 Promotes the FIDO
ecosystem
Steps to certification:
1. Conformance Self-Validation
2. Interoperability Testing
3. Certification Request
4. Trademark License (optional)
fidoalliance.org/certification
All Rights Reserved | FIDO Alliance | Copyright 2016 31
32All Rights Reserved | FIDO Alliance | Copyright 2016 32
Leading OEMs Shipping FIDO Certified Devices
Tab S, Tab S2S5, Mini Note 4, 5Alpha Note Edge S6/S7, S6/S7 Edge
Sharp
Aquos Zeta
Sony
Experia Z5
Fujitsu
Arrows
(Iris Biometrics)
Samsung
LG
V10 & G5
Huawei
Mate 8
Lenovo
P1
Lenovo
K52
All Rights Reserved | FIDO Alliance | Copyright 2016 33
iPhone 5s iPhone 6, 6+
iPad Air 2, Mini 3
iPhone 6s, 6s+
iPad Mini 4 iPad Pro
FIDO Applications Now Run on iOS 9
Supported iOS Fingerprint Devices
All Rights Reserved | FIDO Alliance | Copyright 2016 34
JOIN THE
FIDO ECOSYSTEM
All Rights Reserved | FIDO Alliance | Copyright 2016 35
JOIN THE
FIDO ALLIANCE
All Rights Reserved | FIDO Alliance | Copyright 2016 36
Visit Our Member Companies at the FIDO
Pavilion on the Trade Show Floor
37All Rights Reserved | FIDO Alliance | Copyright 2016
THANK YOU
slideshare.net/FIDOAlliance
info@fidoalliance.org
All Rights Reserved | FIDO Alliance | Copyright 2016

More Related Content

PPTX
Introduction to FIDO Alliance
PPTX
Fido Technical Overview
PDF
Google FIDO Authentication Case Study
PDF
LINEのFIDO導入と将来展望
PDF
Web Authentication API
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
PDF
Getting Started with FIDO2
PDF
FIDO2 Specifications Overview
Introduction to FIDO Alliance
Fido Technical Overview
Google FIDO Authentication Case Study
LINEのFIDO導入と将来展望
Web Authentication API
IBM: Hey FIDO, Meet Passkey!.pptx
Getting Started with FIDO2
FIDO2 Specifications Overview

What's hot (20)

PPTX
U2F/FIDO2 implementation of YubiKey
PDF
FIDO Specifications Overview: UAF & U2F
PDF
Securing a Web App with Passwordless Web Authentication
PDF
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
PDF
Secure Your Encryption with HSM
PPTX
Introduction to Public Key Infrastructure
PDF
FIDO and the Future of User Authentication
PDF
Integrating FIDO Authentication & Federation Protocols
PDF
security-reference-architecture.pdf
PDF
Seamless 3-D Secure e-commerce experience
PPTX
Getting Started With WebAuthn
PDF
Google & FIDO Authentication
PPTX
Introduction to FIDO: A New Model for Authentication
PDF
WebAuthn and Security Keys
PDF
IBM Datapower Security Scenario with JWS & JWE
PDF
Blockchain Security and Privacy
PDF
Public key Infrastructure (PKI)
PDF
Secure coding presentation Oct 3 2020
PDF
安全なID連携のハウツー
PPTX
Cybersecurity Awareness Session by Adam
U2F/FIDO2 implementation of YubiKey
FIDO Specifications Overview: UAF & U2F
Securing a Web App with Passwordless Web Authentication
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Secure Your Encryption with HSM
Introduction to Public Key Infrastructure
FIDO and the Future of User Authentication
Integrating FIDO Authentication & Federation Protocols
security-reference-architecture.pdf
Seamless 3-D Secure e-commerce experience
Getting Started With WebAuthn
Google & FIDO Authentication
Introduction to FIDO: A New Model for Authentication
WebAuthn and Security Keys
IBM Datapower Security Scenario with JWS & JWE
Blockchain Security and Privacy
Public key Infrastructure (PKI)
Secure coding presentation Oct 3 2020
安全なID連携のハウツー
Cybersecurity Awareness Session by Adam
Ad

Viewers also liked (20)

PDF
FIDO in Government
PDF
FIDO Specifications Tutorial
PPTX
Google Case Study: Becoming Unphishable
PDF
Introducing SAML 2.0 Protocol: Security and Performance
PDF
Dataporten intro (workshop with Difi)
PDF
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
PDF
CIS14: Working with OAuth and OpenID Connect
PDF
OpenID Connect - Nat Sakimura at OpenID TechNight #7
PDF
OAuth 2.0 & OpenID Connect #MA7
PDF
DeviceConnect連携
PDF
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
PDF
[LDAPCon 2015] The OpenID Connect Protocol
PDF
エンタープライズの視点からFIDOとFederationのビジネスを考える
PDF
FIDO U2F Specifications: Overview & Tutorial
PDF
Google Case Study: Strong Authentication for Employees and Consumers
PDF
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
PPTX
OpenID Connect: An Overview
PDF
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
PPTX
Fido U2F Protocol by Ather Ali
PPTX
Fido and Touch ID
FIDO in Government
FIDO Specifications Tutorial
Google Case Study: Becoming Unphishable
Introducing SAML 2.0 Protocol: Security and Performance
Dataporten intro (workshop with Difi)
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: Working with OAuth and OpenID Connect
OpenID Connect - Nat Sakimura at OpenID TechNight #7
OAuth 2.0 & OpenID Connect #MA7
DeviceConnect連携
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
[LDAPCon 2015] The OpenID Connect Protocol
エンタープライズの視点からFIDOとFederationのビジネスを考える
FIDO U2F Specifications: Overview & Tutorial
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
OpenID Connect: An Overview
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Fido U2F Protocol by Ather Ali
Fido and Touch ID
Ad

Similar to Introduction to FIDO Authentication (20)

PPTX
Introduction to FIDO Alliance
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
PPTX
FIDO - The Value of Membership
PDF
Introduction to FIDO Alliance
PPTX
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
PPTX
Introduction to the FIDO Alliance: Vision and Status
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
PDF
2018 12-07 tokyo-seminar Brett McDowell
PPTX
FIDO Alliance Vision and Updates
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PDF
FIDO And the Future of User Authentication
PDF
Introduction to the FIDO Alliance
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
PDF
Introduction to FIDO Biometric Authentication
PDF
Javelin Research's State of Strong Authentication 2019 Report Webinar
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
PPTX
Introduction to the FIDO Alliance: Vision & Status
PDF
FIDO Alliance Vision and Status
PDF
The Value of FIDO Alliance Membership
PDF
Beyond Passwords: FIDO and the Future of User Authentication
Introduction to FIDO Alliance
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
FIDO - The Value of Membership
Introduction to FIDO Alliance
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
Introduction to the FIDO Alliance: Vision and Status
Beyond Passwords: FIDO & the Future of Consumer Authentication
2018 12-07 tokyo-seminar Brett McDowell
FIDO Alliance Vision and Updates
Beyond Passwords: FIDO and the Future of User Authentication
FIDO And the Future of User Authentication
Introduction to the FIDO Alliance
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
Introduction to FIDO Biometric Authentication
Javelin Research's State of Strong Authentication 2019 Report Webinar
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
Introduction to the FIDO Alliance: Vision & Status
FIDO Alliance Vision and Status
The Value of FIDO Alliance Membership
Beyond Passwords: FIDO and the Future of User Authentication

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PPTX
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology

Introduction to FIDO Authentication

  • 1. INTRODUCTION TO FIDO AUTHENTICATION Brett McDowell, Executive Director, FIDO Alliance brett@fidoalliance.org All Rights Reserved | FIDO Alliance | Copyright 2016
  • 2. The Problem The Solution The Alliance The Market All Rights Reserved | FIDO Alliance | Copyright 2016 2
  • 3. 781 data breaches in 2015 Data Breaches… 170 million records in 2015 (up 50%) $3.8 million cost/breach (up 23% f/2013) All Rights Reserved | FIDO Alliance | Copyright 2016 3
  • 4. “95% of these incidents involve harvesting credentials stolen from customer devices, then logging into web applications with them.” 2015 Data Breach Investigations Report All Rights Reserved | FIDO Alliance | Copyright 2016 4
  • 5. “A look through the details of these incidents shows a common sequence of phish customer ≥ get credentials ≥ abuse web application ≥ empty bank/bitcoin account.” 2015 Data Breach Investigations Report All Rights Reserved | FIDO Alliance | Copyright 2016 5
  • 6. The world has a PASSWORD PROBLEM 5Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 6
  • 7. IDM has a “Shared Secrets” PROBLEM 5Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 7
  • 8. ONE-TIME PASSCODES Improve security but aren’t easy enough to use Still Phishable User Confusion Token Necklace SMS Reliability 6Confidential All Rights Reserved | FIDO Alliance | Copyright 2016 8
  • 9. WE NEED A NEW MODEL All Rights Reserved | FIDO Alliance | Copyright 2016 9
  • 10. The Problem The Solution The Alliance The Market All Rights Reserved | FIDO Alliance | Copyright 2016 10
  • 11. THE NEW MODEL Fast IDentity Online online authentication using public key cryptography All Rights Reserved | FIDO Alliance | Copyright 2016 11
  • 12. THE OLD PARADIGM USABILITYSECURITY All Rights Reserved | FIDO Alliance | Copyright 2016 12
  • 13. THE FIDO PARADIGM Poor Easy WeakStrong USABILITY SECURITY All Rights Reserved | FIDO Alliance | Copyright 2016 13
  • 14. HOW “Shared Secrets” WORK ONLINE The user authenticates themselves online by presenting a human-readable “shared secret” All Rights Reserved | FIDO Alliance | Copyright 2016 14
  • 15. HOW FIDO AUTHN WORKS AUTHENTICATOR LOCAL ONLINE The user authenticates “locally” to their device (by various means) The device authenticates the user online using public key cryptography All Rights Reserved | FIDO Alliance | Copyright 2016 15
  • 16. OPEN STANDARDS R.O.I. FIDO-ENABLE ONCE GAIN EVERY DEVICE YOU TRUST NO MORE ONE-OFF INTEGRATIONS All Rights Reserved | FIDO Alliance | Copyright 2016 16
  • 17. USABILITY, SECURITY, R.O.I. and PRIVACY All Rights Reserved | FIDO Alliance | Copyright 2016 17
  • 18. No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No Link-ability Between Services No Link-ability Between Accounts All Rights Reserved | FIDO Alliance | Copyright 2016 18
  • 19. Better security for online services Reduced cost for the enterprise Simpler and safer for consumers All Rights Reserved | FIDO Alliance | Copyright 2016 19
  • 20. The Problem The Solution The Alliance The Market All Rights Reserved | FIDO Alliance | Copyright 2016
  • 21. The FIDO Alliance is an open industry association with a focused mission: authentication standards All Rights Reserved | FIDO Alliance | Copyright 2016 21
  • 22. Physical-to-digital identity User Management Authentication Federation Single Sign-On Passwords Risk-BasedStrong MODERN AUTHENTICATION FIDO SCOPE All Rights Reserved | FIDO Alliance | Copyright 2016 22
  • 23. FIDO Alliance Mission Develop Specifications Operate Adoption Programs Pursue Formal Standardization 1 2 3 All Rights Reserved | FIDO Alliance | Copyright 2016 23
  • 24. Board Members 24 All Rights Reserved | FIDO Alliance | Copyright 2016 24
  • 25. Government & Research “The fact that FIDO has now welcomed government participation is a logical and exciting step toward further advancement of the Identity Ecosystem; we look forward to continued progress.” -- Mike Garcia, NSTIC NPO 25 2525All Rights Reserved | FIDO Alliance | Copyright 2016
  • 26. Liaison Program Our mission is highly complementary to many other associations around the world. We welcome the opportunity to collaborate with this growing list of industry partner organizations. 26 26All Rights Reserved | FIDO Alliance | Copyright 2016 26
  • 27. The Problem The Solution The Alliance The Market All Rights Reserved | FIDO Alliance | Copyright 2016
  • 28. EARLY FIDO ADOPTION 20152014 All Rights Reserved | FIDO Alliance | Copyright 2016 28
  • 29. “NTT DOCOMO is now offering FIDO-enabled biometric authentication for customers using Apple iOS devices” Mar 7, 2016 RECENT FIDO ADOPTION “FIDO Universal 2nd Factor (U2F) authentication is now being used to allow all UK citizens to easily and securely access GOV.UK Verify digital public services. Mar 23, 2016 “BC Card provides Token and FIDO services to strengthen security and safety of Samsung Pay” March 1, 2016 “KEB Hana’s new solution is notably FIDO Certified.” February 3, 2016 “Baidu Wallet is now offering FIDO- enabled biometric authentication for customers using Android devices” April, 2016 Q1 2016 Q2 2016 All Rights Reserved | FIDO Alliance | Copyright 2016 29
  • 30. Deployments are enabled by over 150 FIDO® Certified products www.fidoalliance.org/certification/fido-certified/ All Rights Reserved | FIDO Alliance | Copyright 2016 30
  • 31.  Available to anyone  Ensures interoperability  Promotes the FIDO ecosystem Steps to certification: 1. Conformance Self-Validation 2. Interoperability Testing 3. Certification Request 4. Trademark License (optional) fidoalliance.org/certification All Rights Reserved | FIDO Alliance | Copyright 2016 31
  • 32. 32All Rights Reserved | FIDO Alliance | Copyright 2016 32
  • 33. Leading OEMs Shipping FIDO Certified Devices Tab S, Tab S2S5, Mini Note 4, 5Alpha Note Edge S6/S7, S6/S7 Edge Sharp Aquos Zeta Sony Experia Z5 Fujitsu Arrows (Iris Biometrics) Samsung LG V10 & G5 Huawei Mate 8 Lenovo P1 Lenovo K52 All Rights Reserved | FIDO Alliance | Copyright 2016 33
  • 34. iPhone 5s iPhone 6, 6+ iPad Air 2, Mini 3 iPhone 6s, 6s+ iPad Mini 4 iPad Pro FIDO Applications Now Run on iOS 9 Supported iOS Fingerprint Devices All Rights Reserved | FIDO Alliance | Copyright 2016 34
  • 35. JOIN THE FIDO ECOSYSTEM All Rights Reserved | FIDO Alliance | Copyright 2016 35
  • 36. JOIN THE FIDO ALLIANCE All Rights Reserved | FIDO Alliance | Copyright 2016 36
  • 37. Visit Our Member Companies at the FIDO Pavilion on the Trade Show Floor 37All Rights Reserved | FIDO Alliance | Copyright 2016