PAGE 1
Open Source Open Possibilities
Open Source Open Possibilities
Multifactor Authentication based on User Contextual Data and the Mobile Web
September 11, 2014 W3C Web Crypto Workshop
Multifactor Authentication based on User Contextual Data and the - - PowerPoint PPT Presentation
Open Source Open Possibilities Multifactor Authentication based on User Contextual Data and the Mobile Web September 11, 2014 W3C Web Crypto Workshop Open Source Open Possibilities PAGE 1 Introduction The web ecosystem is trying to move
PAGE 1
Open Source Open Possibilities
Open Source Open Possibilities
September 11, 2014 W3C Web Crypto Workshop
PAGE 2
Open Source Open Possibilities
For example, FIDO Alliance recently released specifications targeted towards additional factors based on
Framework, i.e. UAF)
Examples
» Local capture through microphone/camera of device environment » Audio fingerprinting, scene recognition, etc.
» Geofencing or proximity to a given location Contextual data can be used as to augment authentication factors
PAGE 3
Open Source Open Possibilities
Example: WebRTC API for browser-originated emergency call
sending location data to PSAP
Web service provider also needs a secure means of reconfiguring an authenticator
Examples
» A virtual geofence is defined by a centroid (usually a lat/lon pair) and radius
PAGE 4
Open Source Open Possibilities
PAGE 5
Open Source Open Possibilities
Customer automatically billed
Geofencing application
PAGE 6
Open Source Open Possibilities
PAGE 7
Open Source Open Possibilities
Ensure that delivery person’s device is near target location Dispatcher leverages this information for verification of delivery
Time of geofence breach occurrence could also be tracked
Ideally would be communicated securely to dispatcher
PAGE 8
Open Source Open Possibilities
Currently being defined by re-chartered W3C Geolocation Working Group
CPU/GPU/Modem partitioning Running geofencing processes on modem is significantly less power consuming then at the app level (e.g. JS)
PAGE 9
Open Source Open Possibilities
Native Geofencing Modem-based Geofencing
Near Geofence Boundary Far from Geofence Boundary
Power Consumption
PAGE 10
Open Source Open Possibilities
Service providers should also be able to reconfigure authenticators
Power consumption can be an issue
Can they take the place of secured HW-based authenticators? Can they be efficiently implemented when compared to HW-optimized solutions?
PAGE 11
Open Source Open Possibilities