SlideShare a Scribd company logo
IdentityNORTH
Mobile ID Demonstration
Mobile ID is not
an image of an
ID Card or
Driver’s License
Photoshop, Screenshots, Barcode generators, Image
sharing, & the lack of Trusted Screen Environment make
this an expensive mistake someone will make.
2
INTEROPERABILITY THROUGH STANDARDIZATION
Interoperability is critical for the success of any Mobile Identity program and the foundation
upon which country and state issued DLs/IDs are accepted across jurisdictional (national and
international) boundaries
GET is an active member and participates
• ISO SC17 Working Group 10 & Task Force 14 Mobile Driver’s License + mID
• ISO18013 – Part 5 - Standard to be published Q1 2020 (and Committee
Drafts Available now)
• AAMVA mDL Working Group- Standards for North America
• ICAO Compliance (Partial 9303)
• Brings Passport interoperability to the driver license world
3
All of this will make it possible to present and authenticate a Mobile
ID across jurisdictional (national and international) boundaries
Service Providers (Web)
MOBILE IDENTITY ECOSYSTEM
4
www.getgroupna.com
© Copyright by GET Group 2018
Provision DL/ID
Validate mDL/mID
18013-5
Obtain & Trust Data
OpenID Connect
GET Identity Provider
Issuing Authority
•GET Mobile
Administrator
In-Person Verifier
•GET Mobile Verify
• GET Verifier Toolkit
Citizen Mobile
•GET Mobile ID
• GET mID Toolkit
• GET ePassport Toolkit

Recommended for you

The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News

The FIDO Alliance invites you to learn how simplify strong authentication for web services. This presentation was part of our FIDO Alliance Seminar in Tokyo, Japan, in November, 2015.

information technologyauthenticationfido alliance
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016

Last year was a year of great progress for the FIDO Alliance and standards-based strong authentication. Tens of millions of FIDO-enabled devices are now in use worldwide. There are over 100 FIDO Certified™ products available, and nearly 250 organizations are now taking part in the Alliance, including more than a dozen trade association partners. The market is clearly showing that now is the time to deploy FIDO authentication to modernize failing password systems. These slides address: – The uptake in global momentum – Details on FIDO’s recent submission to the World Wide Web Consortium – The Alliance’s plans and strategy for 2016 and what this means to you and your organization in the upcoming year We encourage you and your colleagues to view these slides to catch up on what happened in 2015 and to learn how FIDO’s explosive growth can benefit your organization in 2016. You can listen to the webinar audio here: https://fidoalliance.org/events/fido-alliance-year-in-review-webinar/

technologystandardspayment
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English

The Fast Identity Online (FIDO) framework aims to support a variety of authentication technologies to replace passwords, including biometrics, security tokens, and smart cards. It uses public-key cryptography where the user's device generates a key pair during registration and then signs a challenge from the server for login. There are two main protocols - Universal Authentication Framework (UAF) which allows authentication through local actions like fingerprints, and U2F which provides a second factor for login through a security key. FIDO has advantages like reducing password complexity and recovery procedures, but also has disadvantages like requiring compatible hardware and potential to forget authentication devices.

HOW TRUST IS CREATED IN ISO 18013-5
• Data is signed by the Issuer private key, relayed to the device with Mobile Security Objects
• If the data is tampered with, the signature will not verify (Passive Authentication)
• Active Authentication protocol confirms that mDL is still on the device to which it was originally issued
• All transmissions are Encrypted with session keys unique to those two devices for that transmit event
• A Signer Certificate (CSCA) is made public by the Issuer
• Lists of CSCAs from well-known Issuers can be assembled
• A Trust List is a list of trusted CSCAs signed by the aggregator
5
Issuer Mobile
ID (mDL)
Verifiers
Trust ListsSigner Certs
ISO 18013-5
Any Questions?
Scott Vien
Director of Business Development
svien@getgroupna.com
1-617-902-8577
6

More Related Content

What's hot

Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
FIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
Tatyana Arnaudova
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
FIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
FIDO Alliance
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
FIDO Alliance
 
FIDO: The Value of Certification
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
FIDO Alliance
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
FIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
FIDO Alliance
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_final
Mary McEvoy Carroll
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
FIDO Alliance
 

What's hot (20)

Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
FIDO: The Value of Certification
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_final
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 

Similar to The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott Vien

Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
Andreas Leicher
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA Presentation
FIDO Alliance
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGOverview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Bjorn Hjelm
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
Jason Kong
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
KMSSolutionsMarketin
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
Brian Spector
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
Symantec Website Security
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
Alan Quayle
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
FIDO Alliance
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
Belgian Mobile ID - itsme
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
FIDO Alliance
 

Similar to The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott Vien (20)

Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA Presentation
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGOverview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
 
Assurity seminar 24 jan
Assurity seminar 24 janAssurity seminar 24 jan
Assurity seminar 24 jan
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
 

More from IdentityNorthEvents

IdentityNORTH Annual Summit 2020 - Summit Summary
IdentityNORTH Annual Summit 2020 - Summit SummaryIdentityNORTH Annual Summit 2020 - Summit Summary
IdentityNORTH Annual Summit 2020 - Summit Summary
IdentityNorthEvents
 
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
IdentityNorthEvents
 
Update from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene WilliamsUpdate from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene Williams
IdentityNorthEvents
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
IdentityNorthEvents
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
IdentityNorthEvents
 
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned  - Brenan IsabelleDigitizing Healthcare Identity - Lessons Learned  - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
IdentityNorthEvents
 
Modernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
Modernizing Identity Access Management Platforms - Dale Kinney & Damian FlanneryModernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
Modernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
IdentityNorthEvents
 
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations  - Gene DiMiraReviewing the Updated Canadian Money Laundering Regulations  - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
IdentityNorthEvents
 
The Evolution of Canada’s Digital Trust Framework - Joni Brennan
The Evolution of Canada’s Digital Trust Framework - Joni BrennanThe Evolution of Canada’s Digital Trust Framework - Joni Brennan
The Evolution of Canada’s Digital Trust Framework - Joni Brennan
IdentityNorthEvents
 
Advertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh DindayalAdvertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh Dindayal
IdentityNorthEvents
 
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
IdentityNorthEvents
 

More from IdentityNorthEvents (11)

IdentityNORTH Annual Summit 2020 - Summit Summary
IdentityNORTH Annual Summit 2020 - Summit SummaryIdentityNORTH Annual Summit 2020 - Summit Summary
IdentityNORTH Annual Summit 2020 - Summit Summary
 
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
 
Update from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene WilliamsUpdate from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene Williams
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
 
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned  - Brenan IsabelleDigitizing Healthcare Identity - Lessons Learned  - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
 
Modernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
Modernizing Identity Access Management Platforms - Dale Kinney & Damian FlanneryModernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
Modernizing Identity Access Management Platforms - Dale Kinney & Damian Flannery
 
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations  - Gene DiMiraReviewing the Updated Canadian Money Laundering Regulations  - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
 
The Evolution of Canada’s Digital Trust Framework - Joni Brennan
The Evolution of Canada’s Digital Trust Framework - Joni BrennanThe Evolution of Canada’s Digital Trust Framework - Joni Brennan
The Evolution of Canada’s Digital Trust Framework - Joni Brennan
 
Advertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh DindayalAdvertising in The Age of Digital Identity - Azadeh Dindayal
Advertising in The Age of Digital Identity - Azadeh Dindayal
 
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
Role of the Standards Council of Canada in Emerging Tech like Digital Identit...
 

Recently uploaded

WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 

Recently uploaded (20)

WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 

The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott Vien

  • 2. Mobile ID is not an image of an ID Card or Driver’s License Photoshop, Screenshots, Barcode generators, Image sharing, & the lack of Trusted Screen Environment make this an expensive mistake someone will make. 2
  • 3. INTEROPERABILITY THROUGH STANDARDIZATION Interoperability is critical for the success of any Mobile Identity program and the foundation upon which country and state issued DLs/IDs are accepted across jurisdictional (national and international) boundaries GET is an active member and participates • ISO SC17 Working Group 10 & Task Force 14 Mobile Driver’s License + mID • ISO18013 – Part 5 - Standard to be published Q1 2020 (and Committee Drafts Available now) • AAMVA mDL Working Group- Standards for North America • ICAO Compliance (Partial 9303) • Brings Passport interoperability to the driver license world 3 All of this will make it possible to present and authenticate a Mobile ID across jurisdictional (national and international) boundaries
  • 4. Service Providers (Web) MOBILE IDENTITY ECOSYSTEM 4 www.getgroupna.com © Copyright by GET Group 2018 Provision DL/ID Validate mDL/mID 18013-5 Obtain & Trust Data OpenID Connect GET Identity Provider Issuing Authority •GET Mobile Administrator In-Person Verifier •GET Mobile Verify • GET Verifier Toolkit Citizen Mobile •GET Mobile ID • GET mID Toolkit • GET ePassport Toolkit
  • 5. HOW TRUST IS CREATED IN ISO 18013-5 • Data is signed by the Issuer private key, relayed to the device with Mobile Security Objects • If the data is tampered with, the signature will not verify (Passive Authentication) • Active Authentication protocol confirms that mDL is still on the device to which it was originally issued • All transmissions are Encrypted with session keys unique to those two devices for that transmit event • A Signer Certificate (CSCA) is made public by the Issuer • Lists of CSCAs from well-known Issuers can be assembled • A Trust List is a list of trusted CSCAs signed by the aggregator 5 Issuer Mobile ID (mDL) Verifiers Trust ListsSigner Certs ISO 18013-5
  • 6. Any Questions? Scott Vien Director of Business Development svien@getgroupna.com 1-617-902-8577 6