slides
Transcription
slides
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond JAVARY Bruno Oberthur Technologies – Identity BU 11 September 2014 1 Agenda • 01. INTRODUCTION • 02. EXISTING : WHAT ARE THE DRAWBACKS • 03. USE CASE : PIV • 04. PERSPECTIVE AND PROPOSAL 11 September 2014 2 Agenda • 01. INTRODUCTION • 02. EXISTING : WHAT ARE THE DRAWBACKS • 03. USE CASE : PIV • 04. PERSPECTIVE AND PROPOSAL 11 September 2014 3 History : OT experience • June 20th 2013, London, Workshop on Web Applications and Secure Hardware • July 2013 : for eSE finalist • October 15th 2013, Oberthur Technologies joins FIDO Alliance OT founding member of SIA • November 2013 : Presentation of PIV for eSE on OT booth demonstrating eservices. “my voice is my password” winner in the Trusted internet/ Authentication category • February 24-27th 2013, Barcelona, GSMA Mobile World Congress : 1st worldwide demonstration of a FIDO authentication secured by the SIM • March 2014 : Mobile ID study starts with dedicated workforce with objective : “Smartcard Access from Web Browser” • Summer 2014, w3C call for papers, submission of position paper, result of internal study 4 POSITION SUMMARY • To enable a common access for every single user to trusted services thanks to a secure element, the best candidate is the web browser • By consequence HTML and JavaScript will be the standard to access a secure element • Many examples already exist to access hardware o Video, webcam, geolocation, file system o Thanks to evolutions of standards 11 September 2014 5 POSITION SUMMARY Several topics are to be considered • Authentication : o For Payment / Internet banking / Corporate network access / Social media o FIDO is an answer • Access to cryptographic operations : « Secure Operations Execution » o Web crypto api o Issue : define use cases exhaustively • Low level access to the secure element or hardware token o Access the closest possible to the hardware o Close to sysapp considerations 11 September 2014 6 Agenda • 01. INTRODUCTION • 02. EXISTING : WHAT ARE THE DRAWBACKS • 03. USE CASE : PIV • 04. PERSPECTIVE AND PROPOSAL 11 September 2014 7 EXISTING Middleware • Software application that enhances the capacities of our computer applications by creating an abstraction layer • Implements standard • Good solution for a local use, it provides secure features established on standards in a controlled IT configuration. However it can’t be used as an online solution or in an opened device. Web browser extension • Program integrated into a web browser and which provides new features • Can be : plug-in, java applet, ActiveX • The only solution right now but many drawbacks : o Heterogeneity of methods to access Smart Card o Security 11 September 2014 8 EXISTING Mobility • Most of the apis are proprietary (eg OT Micro SD) • There are some promising technologies o NFC o Open Mobile API • These communications layers remain low level • Middleware and web browser extensions do not fit in a mobile environment 11 September 2014 9 Agenda • 01. INTRODUCTION • 02. EXISTING : WHAT ARE THE DRAWBACKS • 03. USE CASE : PIV • 04. PERSPECTIVE AND PROPOSAL 11 September 2014 10 PIV - PERSONAL IDENTITY VERIFICATION Definition • US federal employee or contractor wears a PIV card defined by the National Institute of Standards and Technology (NIST). • The card is required to enter a governmental building and to log on to computers (Physical and Logical Access Control). • The federal employee can also sign emails or documents and authenticates to remote web sites in HTTPS. Limitations • File decryption or signing must be done locally. In a world of cloud computing and “Software as a Service” it represents a real inconvenience. • The agent must have an already configured PC or be granted with specific rights, which prevents from using devices “on the go” or “away from office” (in a hotel, an airport, at home). • To use a Smartphone or a tablet, specific software and hardware (card reader) have to be set up. 11 September 2014 11 Agenda • 01. INTRODUCTION • 02. EXISTING : WHAT ARE THE DRAWBACKS • 03. USE CASE : PIV • 04. PERSPECTIVE AND PROPOSAL 11 September 2014 12 PROMOTE A STANDARDIZATION Position • As a solution provider, we would like to push the standardization of a JavaScript API which allows web browser to communicate with Smart Card • Objective is to open trusted services with secure element to the mainstream market • In order to be implemented in all browsers and to ensure its liability, the API should be endorsed by W3C. Secure Element API • This api is complete and well documented. It presents in details the technical background and use cases and gives a good visibility of Security, Permissions, Access Control and Conformance • Security is at the heart of OT’s concerns; the proposed solution combines validation of the feature by the user and a specific access control mechanism • The idea beyond is to propose a trusted access to a secure element from a service provider, preventing from unauthorized use. 11 September 2014 13 PERSPECTIVE Action Plan Let’s follow, jointly with all companies and associations sharing the same opinion and interest, action plan below: • Identify a charter to carry the project • Define use cases and for each of them demonstrate the impact and validate the consistency of the current proposal. • Meeting all stakeholders interested in the subject, be aware of each of them interest and create a common basis of communication and strategy • Establish interactions with other standardizations (eg Open Mobile API) • Gather work forces to create a proof of concept and decline it to use cases examples (eg eServices) 11 September 2014 14 Thank you for your attention 11 September 2014 15