SlideShare a Scribd company logo
1 of 25
Innovative Security Solutions KOBIL  - the technology   company KOBIL  Systems GmbH  •   Marketing Department,  19. Mai 2011
Potential of  Online B anking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Customer Concerns on e-Banking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Daily Frauds on  e- B anking „ Thieves Hack French Presidents Bank Account“ „ 400 Million Credit Card  Numbers Hacked“ „ Investigators Replicate Nokia 1100 Online Banking Hack“ „ Cyber crime attacks increase as malware trends plateaued in the last 12 month“ „ 300+ Bank homepages hacked and redirected!“
Hacking Techniques are Advancing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Today’s  e-Banking Digital IDs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Positioning Our Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],Maximum  Security Maximum  Convenience Challenge  Response One Time Password OTP Certificate Technology Static   Password SMS OTP KOBIL  Innovations
Secure  o nline banking    anywhere and anytime
KOBIL m ID entity technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Application Areas
Key facts Hardened  web b rowser No  c hance for phishing Remote & secure updates Smart  S ecurtiy  M anagement S mart  c ard  & certificate Login and/or  transaction signing
The most secure browser URL protection T wo factor  authentication Anti hacking  mechanism s Trusted  SSL  certificates More than 5 years of research & development   More than 1   million online users
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Smart Security Management
[object Object],Low TCO & High ROI Time Technology IT infrastructure KOBIL m ID entity
KOBIL SecOPTIC Technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key facts Verification and management Smart  S ecurtiy  M anagement Removable battery Long life and  environment protection Optical sensors  Easy data transfer for true transaction signing
More Key Facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Smart Security Management
KOBIL Optical Reader Technology
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key facts Removable battery Long life and  environment protection Credit  or debit c ard International  s tandards and online shopping Easy data transfer for true transaction signing Optical sensors
More Key Facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Millions of users
any question … ? Oemer Izci Marketing Manager E-Mail: marketing@kobil.com Phone: +49 6241 3004-0

More Related Content

What's hot

Sedicii Introduction
Sedicii   IntroductionSedicii   Introduction
Sedicii IntroductionRob Leslie
 
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxMeetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxDigipolis Antwerpen
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart CityPriyanka Aash
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Priyanka Aash
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
R2SQ Inc iDeck Presentation
R2SQ Inc iDeck PresentationR2SQ Inc iDeck Presentation
R2SQ Inc iDeck Presentationumitdsami
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketAlexander WEIR
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & BrandingNiels Mulder
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
Next Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureNext Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureCardtek
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT TrackNFC Forum
 
How Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionHow Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionBelatrix Software
 
MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015Philipp Lam
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover SolutionsNoah Dillard
 

What's hot (20)

Sedicii Introduction
Sedicii   IntroductionSedicii   Introduction
Sedicii Introduction
 
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFoxMeetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
Meetup 27/10/2016: Antwerpen als IoT-lab: experimenteer mee met SigFox
 
Gemalto NFC
Gemalto NFCGemalto NFC
Gemalto NFC
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart City
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
R2SQ Inc iDeck Presentation
R2SQ Inc iDeck PresentationR2SQ Inc iDeck Presentation
R2SQ Inc iDeck Presentation
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution Market
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & Branding
 
SS Digilock Nov15
SS Digilock Nov15SS Digilock Nov15
SS Digilock Nov15
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Tolga Yurteri, NKBM
Tolga Yurteri, NKBMTolga Yurteri, NKBM
Tolga Yurteri, NKBM
 
Next Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless InfrastructureNext Generation NFC Solutions and Contactless Infrastructure
Next Generation NFC Solutions and Contactless Infrastructure
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT Track
 
How Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT RevolutionHow Open Source Will Drive The IoT Revolution
How Open Source Will Drive The IoT Revolution
 
MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015MK Smart PresentationEN_Feb 2015
MK Smart PresentationEN_Feb 2015
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover Solutions
 

Similar to Secure E-Banking with KOBIL technologies

Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - PhonecardGuy Romanus
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.pptGoDown3
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).pptSujalraj13
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 

Similar to Secure E-Banking with KOBIL technologies (20)

Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
E banking security
E banking securityE banking security
E banking security
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
Computer's project
Computer's projectComputer's project
Computer's project
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Commerce 0.ppt
E-Commerce 0.pptE-Commerce 0.ppt
E-Commerce 0.ppt
 
eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.ppt
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).ppt
 
Building E-Commerce.ppt
Building E-Commerce.pptBuilding E-Commerce.ppt
Building E-Commerce.ppt
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
LTTC Presentation April 2014
LTTC Presentation April 2014LTTC Presentation April 2014
LTTC Presentation April 2014
 
02 lttc
02 lttc02 lttc
02 lttc
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 

Recently uploaded

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Secure E-Banking with KOBIL technologies

  • 1. Innovative Security Solutions KOBIL - the technology company KOBIL Systems GmbH • Marketing Department, 19. Mai 2011
  • 2.
  • 3.
  • 4. Daily Frauds on e- B anking „ Thieves Hack French Presidents Bank Account“ „ 400 Million Credit Card Numbers Hacked“ „ Investigators Replicate Nokia 1100 Online Banking Hack“ „ Cyber crime attacks increase as malware trends plateaued in the last 12 month“ „ 300+ Bank homepages hacked and redirected!“
  • 5.
  • 6.
  • 7.
  • 8. Secure o nline banking anywhere and anytime
  • 9. KOBIL m ID entity technology
  • 10.
  • 11.
  • 12. Key facts Hardened web b rowser No c hance for phishing Remote & secure updates Smart S ecurtiy M anagement S mart c ard & certificate Login and/or transaction signing
  • 13. The most secure browser URL protection T wo factor authentication Anti hacking mechanism s Trusted SSL certificates More than 5 years of research & development More than 1 million online users
  • 14.
  • 15.
  • 17.
  • 18. Key facts Verification and management Smart S ecurtiy M anagement Removable battery Long life and environment protection Optical sensors Easy data transfer for true transaction signing
  • 19.
  • 20.
  • 21. KOBIL Optical Reader Technology
  • 22.
  • 23. Key facts Removable battery Long life and environment protection Credit or debit c ard International s tandards and online shopping Easy data transfer for true transaction signing Optical sensors
  • 24.
  • 25. any question … ? Oemer Izci Marketing Manager E-Mail: marketing@kobil.com Phone: +49 6241 3004-0

Editor's Notes

  1. Online banking is more than e-banking : - Customers require inovative services instead of standardized products and services - Increase sales efficiency - Increase competitiveness Meet customer requirements Banking is no more a local service, online banking makes it global
  2. - Latest statics shows the following result. - The arguments against online banking is listed from the most important
  3. - Online b anking is the worldwide target for numerous attacks N ew types of attacks emerges everyday Protection is a challange against o rganized cyber crime C onventional tools are not enough anymore
  4. Software solutions : Virtual smart cards Soft certificates Soft OTP generators (on PC or on mobile phones) Software-only hardening techniques Basic OTPs, C&R OTPs : Scratch list s Basic OTP tokens (single button, time-based, etc.) Grid cards SMS OTP : It can be bounded to transaction data on banks side, but bank can not be sure who prepared the received transaction data in the first place EMV-CAP : - Unconnected readers (without OPTIC sensors) PKI Solutions : Smart card readers USB tokens
  5. Zero foot print : No installation, no configuration, no admin rights is needed. No trace left on PC Enables (simplifies) digital signatures via PKI smart card for end users Seamless security : Hardening mechanisms running in the back stage Secure user transaction without user involvement Always up-to-date : Changes happen in standards, trends, security needs, advanced attack techniques, IT-infrastructure Changes can always be managed in the field 5-years functional waranty : Your investment is secure by flexible technology (replaceable smart card, remote update technology) Future proof
  6. Plug mIdentity into any PC : - any PC, your PC, foreign PC, public PC - no installation is needed - no configuration is needed - no admin right is needed - only requirement ; open USB port and Internet connectivity Check for latest updates : - Device connects to update server which typically hosted by the bank - Both firmware (hardware) & application (software) updates are possible Smart card is used for strong authentication : for only user login for only transaction signing or both Remove mIDentity : - Automatic disconnection process erases any traces on PC
  7. Corporate and SME c ustomer s : - O nline transactions - T rade finance (LC, Accreditives etc) - O nline credit approval and credit management O nline stock exchange Retail c ustomer s : - Convenience and high-end security Other s ervices for third parties : - Bank is a „trustworthy“ place where merchants can place special offers for the Bank‘s customers e.g. i nsurance Multi b ank s upport : Electronic Banking Internet Communication Standard ( EBICS ) is a transmission protocol for banking information for usage by banking clients. Single Euro Payments Area (SEPA) concentrates on standardisation of clearing protocols in the interbank networks. Secure communication : - Web a pplications - Strong user authentication - Transaction signing by s mart card Secure d ocument exchange : - Sign PDF documents by s mart card - Bank sends electronic documents - Customer sends signed orders/forms back 4-eye principle : - Multiple s ignatures are possible - Accountant creates transaction His /her manager approves it by his /her signature Top managers approves all by additional signature
  8. Smart card & certificate : A SIM-sized smart card is inserted in the device Smart card is PIN protected Digital certificates can be stored on smart card Smart card and certificate can be used for web login Smart card and certificate can be used to digitally sign user transactions Hardened web browser : Installed (default) web browser on PC is not used A protected & customized on board web browser is used for secure online banking Implemented security mechanisms stops phishing attacks Smart Security Management : All devices in the field can be updated remotely & securely Both firmware (hardware) and application (software) updates are possible
  9. URL protection : Whitelist of URL is used User can not surf or be directed in malicious web sites Web browser URL address bar can be disabled Trusted SSL certificates : Only preconfigured web certificates are trusted User can not import additional trusted certificates Two factor authentication : Smart card and PIN is used for login and/or transaction signing Additional mechanisms are implemented to secure smart card usage Anti hacking mechanisms : Many security mechansims are implemented against well known attack types All these mechanisms are implemented for the last 5 years and this is a continuous (never ending) research & development
  10. Easy infrastructure i ntegration and modular design for future needs : Integration of the solution into existing systems is easy Modular design allows you to start with simple functionality and then add more in the future without any fundamental changes in the infrastructure (start with login-only, then later add transaction signing or add OTP management– SecOPTIC – in the future) Central and anonymous smart card personalization and distiribution : KOBIL developed an anonymous card production system which is widely accepted by banks This solutions allows low cost card production and roll-out Easy a ctivation m ethods for end users : Random distribution of anonym devices and cards are possible With the first time usage, user can define smart card PIN and register his card and device remotely Central device and application management : Infrastructure allows full control of rolled-out devices in the field Remote & secure updates for firmware and applications : - No need to collect back devices for future needs
  11. - IT standards and technologies continuous ly change - m ID entity technolog y is always up-to-date for IT infrastructure change ( b ackend system) IT extension New requirements - No restrictions for security and usage Cost Introduction of new technologies have a linear cost development KOBIL m ID entity has constant costs – despite adaptable technology The longer KOBIL m ID entity technology is in usage the more it become cost-saving
  12. Zero adherence : Transaction data goes out of PC There is no dependency to used PC No PC resource is used for data protection No security concerns for PC, operating system, web browser Protection even against man-in-the-machine attacks Sign what you see : Transaction data is verified on secure offline device display If PC or OS or web browser is hacked and transaction data is modified by hackers, then user can detect the data manipulation on device display Multi-channel capability : - Besided Transaction Data Signing (TDS) OTP via flickering bar code, Basic OTP generator is included for telephone banking, ATM, e-banking login etc.
  13. Login into your web account : User can login into his bank account with only a user name and static password (classic method) or can use SecOPTIC device to generate a basic OTP (no transaction signing) to use at login time In the confirmation page, a flickering bar code will be shown : Flickering bar code is generated on bank web server based on user transaction data (send at step-2) Additionally a bank server challenge (which is valid for a certain time) can be included in flickering bar code Place the optical sensor on PC monitor : There are 5 optical sensors behind the device These sensors should look at the flickering bar code on PC monitor User transaction data will be transfered from PC monitor to SecOPTIC device Verify the transaction data on device display : Now user can see the transaction data on device display If transaction data (which is entered at step-2) is modified by hackers or if flickering code is modified, then user will see a different transaction data (recepient account no and/or amount) If transaction data is modified, then user can stop at this step and transaction is not completed Enter the generated signature code into confirmation page to complete the transaction : - User transaction is digitally signed by user private key in SecOPTIC device
  14. Optical sensors : There is no need to manually enter the transaction data into device User can see and sign the data on device Removable battery : User can change and keep using device for a long period Removal of battery before device disposal Smart Security Management : Device management, lock/unlock, resyncronization Transaction data signature verification
  15. Large d isplay and easy menu navigation : Ease of use for end users Cost effective alternative to smart card readers : A complete solution, no need for additional smart card Security for advanced attacks : Protection even against man-in-the-machine attacks Time limit for generated OTP : Typical time-based OTP devices has a clock inside and cause many syncronization problems SecOPTIC has no clock in hardware, but server can set a time limit for received user transaction data to be signed by device DSA t echnolog y : KOBIL developed advanced algorithm to improve optical reading capability of SecOPTIC Less error rate while reading transaction data from a PC monitor
  16. Easy infrastructure i ntegration and modular design for future needs : Integration of the solution into existing systems is easy Modular design allows you to start with simple functionality and then add more in the future without any fundamental changes in the infrastructure (start with login-only, then later add transaction signing or add digital certificate management– mIDentity – in the future) Already personalized for anonymous deployment : Devices are delivered to bank in bulk, all of them are personalized The bank loads device data into management system Devices can be distributed randomly to end users Easy a ctivation m ethods for end users : User can activate (assign) anonymous device to his/her account with the first time usage Central device management : - Devices can be locked, unlocked or removed from the system Remote and self service resyncronization : Users can start re-syncronization procedure by themselves Device shows the necessary data for re-syncronization
  17. Zero adherence : Transaction data goes out of PC There is no dependency to used PC No PC resource is used for data protection No security concerns for PC, operating system, web browser Protection even against man-in-the-machine attacks Sign what you see : Transaction data is verified on secure offline device display If PC or OS or web browser is hacked and transaction data is modified by hackers, then user can detect the data manipulation on device display Multi application : - Since a credit or debit card is used, the same technology can be used for different applications, like online shopping, 3D-secure applications, etc.
  18. Login into your web account : User can login into his bank account with only a user name and static password (classic method) or can use bank smart card and offline reader to generate a basic OTP (no transaction signing) to use at login time In the confirmation page, a flickering bar code will be shown : Flickering bar code is generated on bank web server based on user transaction data (send at step-2) Place the optical sensor on PC monitor : There are 5 optical sensors behind the reader These sensors should look at the flickering bar code on PC monitor User transaction data will be transfered from PC monitor to smart card reader Verify the transaction data on device display : Now user can see the transaction data on smart card reader display If transaction data (which is entered at step-2) is modified by hackers or if flickering code is modified, then user will see a different transaction data (recepient account no and/or amount) If transaction data is modified, then user can stop at this step and transaction is not completed Enter the generated signature code into confirmation page to complete the transaction : - User transaction is digitally signed by user private key in smart card (credit or debit)
  19. Optical sensors : There is no need to manually enter the transaction data into device User can see and sign the data on device Removable battery : User can change and keep using device for a long period Removal of battery before device disposal Credit or debit card : - Use of bank card allows secure payment for online shops
  20. Large d isplay , big keypad and easy menu navigation : Ease of use for end users Security for advanced attacks : Protection even against man-in-the-machine attacks LEGO Design : - Design based on market research on real customers. DSA t echnolog y : KOBIL developed advanced algorithm to improve optical reading capability of SecOPTIC Less error rate while reading transaction data from a PC monitor