SlideShare une entreprise Scribd logo
1  sur  10
Mobile Authentication on the Internet


    Presented by Paul Lahaije
    “OpenID Event”, Haarlem, 12 May 2009




1   Extended roles for the SIM   C1   14 May 2009
    Group R&D
Increasing demand for secure authentication on the
Internet

• Secure remote access to Corporate
  IT systems                                                      Online
    –Market value of $608Mn in 2008                            governmental
                                                                 services
     (IDC).
• Online banking
    –A survey of European retail banks
     identified ID theft as the highest
     financial crime priority to address
                                                          User authentication
• Online identity                                             “Are you really the
    –challenge of securely managing                           person you claim to
                                                                     be?”
     multiple passwords and online
     identities

• E-government
    –Filing online tax returns (e.g. DIGID in
     the Netherlands)



2    Extended roles for the SIM   C1            14 May 2009
     Group R&D
The added value of Mobile Authentication

•   Adding security to online services
    (Second channel for authentication)
•   Improved user convenience
    (Single Sign On)
•   Availability: User’s always carry their
    mobile phone with them                                  Picture to be
                                                               added
•   Mobile phone penetration is close to
    100% in many markets
•   Real-time communication interface to
    the user
•   Effective fraud control - customers on
    average report a stolen mobile phone in
    28 minutes and application can be
    stopped immediately over the mobile
    network.



3      Extended roles for the SIM   C1        14 May 2009
       Group R&D
The core value of the SIM

•       Secure authentication for more than 4 Billion users
•       As secure as banking cards
•       Standardized
    – Global Platform, ETSI-SCP
    – SIM Toolkit applications / Java clients

•       Multi application platform
    –    The SIM can host service provider trusted applications (e.g. banking application,
         NFC ticketing) in separate security domains
    – Service providers can “rent” their own space in the SIM

•       Remote Management over the air
    – Payment providers can remotely manage their own applications via a trusted third
      party

•       Portable, terminal independent


4         Extended roles for the SIM   C1               14 May 2009
          Group R&D
SIM technology evolution

• Smart Card Web Server (OMA); an embedded
  web server on the SIM
• USB High Speed Interface, TCP/IP supported
• Secure domains on smartcards to support
  multiple applications
• Towards an open internet compatible smart
  card execution environment: Javacard, .NET,
  Java Servlet, SCWS



     The SIM is becoming a secure IP
            network element




5    Extended roles for the SIM   C1            14 May 2009
     Group R&D
The SIM as the Identity Token for the Internet

Enabling the Mobile Operator to become an
   Internet Security Provider


•   Adding Security to the Internet
    (e.g. PKI based user authentication)
•   Improving user convenience                                  more
                                                  more
                                                            convenience
                                               security
    (no need to remember multiple
    usernames/passwords)                                        less
                                                   less

•   Digital Identity Management
    (private information stored on the SIM)




6     Extended roles for the SIM   C1         14 May 2009
      Group R&D
SIM-Based Authentication Architecture

                                             Identity Provider:
     Web Service:
                                             -OpenID
     -Online Banking
                                             -Liberty Alliance
     -E-Government service
                                             -Microsoft CardSpace
     -Social network service
                                             - ...
     -OpenID Consumer


                                                          Authentication Services:
                                      IP/Device           -One-Time-Password
                                                          -Wireless PKI
                                     Convergence          -....
    User Interface:
    -(Mobile) Web Browser
    -(Mobile) Widget
    -SIM Intelligent Client
    - ...




7      Extended roles for the SIM   C1             14 May 2009
       Group R&D
Demonstration


• Introducing SIM based authentication to OpenID
• Supporting different authentication methods
    – One-Time-Password
    – WPKI

• Could be applied to various online services
    – Online social network services
    – Online banking
    – E-government services


• Demonstration movie




8       Extended roles for the SIM   C1         14 May 2009
        Group R&D
Summary and Conclusions




• The SIM can enable Mobile Operators to become Internet Security
  Providers, offering Security and Identity for online services




    Let’s join forces to exploit the SIM strength’s to become
                        “The Identity Token” for the Internet.


9     Extended roles for the SIM   C1               14 May 2009
      Group R&D
Thank you




10   Extended roles for the SIM   C1   14 May 2009
     Group R&D

Contenu connexe

Tendances

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Isabelle Berner
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...IJNSA Journal
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013Alix Murphy
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bankSteve Sidner
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingInfosys Finacle
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Tarang Shah
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointAJAVON Samuel
 
Mobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMark Sherman
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuE-Government Center Moldova
 

Tendances (18)

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Mobile Payments
Mobile PaymentsMobile Payments
Mobile Payments
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce TrendsPrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
PrestaShop Barcamp 5 - Authorize.net : Five Notable E-commerce Trends
 
Mobile Payments Framework
Mobile Payments FrameworkMobile Payments Framework
Mobile Payments Framework
 
Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?Mobile Money: Banks & Telcos, who’s the Boss?
Mobile Money: Banks & Telcos, who’s the Boss?
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013
 
Is714 visa
Is714 visaIs714 visa
Is714 visa
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpoint
 
Mobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of View
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
 

En vedette

OpenID SWOT analysis 2011
OpenID SWOT analysis 2011OpenID SWOT analysis 2011
OpenID SWOT analysis 2011evidos
 
памятник Алексею Решетову, Пермский край, город Березники
памятник  Алексею Решетову, Пермский край, город Березникипамятник  Алексею Решетову, Пермский край, город Березники
памятник Алексею Решетову, Пермский край, город БерезникиYachmenevaIrene
 
Why Relying Party´s should implement OpenID
Why Relying Party´s should implement OpenIDWhy Relying Party´s should implement OpenID
Why Relying Party´s should implement OpenIDevidos
 
Achievement motivation in imaginative thought
Achievement motivation in imaginative thoughtAchievement motivation in imaginative thought
Achievement motivation in imaginative thoughtkanaidi
 

En vedette (6)

WTT
WTTWTT
WTT
 
OpenID SWOT analysis 2011
OpenID SWOT analysis 2011OpenID SWOT analysis 2011
OpenID SWOT analysis 2011
 
памятник Алексею Решетову, Пермский край, город Березники
памятник  Алексею Решетову, Пермский край, город Березникипамятник  Алексею Решетову, Пермский край, город Березники
памятник Алексею Решетову, Пермский край, город Березники
 
De Rechtsstaat
De RechtsstaatDe Rechtsstaat
De Rechtsstaat
 
Why Relying Party´s should implement OpenID
Why Relying Party´s should implement OpenIDWhy Relying Party´s should implement OpenID
Why Relying Party´s should implement OpenID
 
Achievement motivation in imaginative thought
Achievement motivation in imaginative thoughtAchievement motivation in imaginative thought
Achievement motivation in imaginative thought
 

Similaire à Mobile Authentication on the Internet

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Building multi-services in personal mobile devices based on partially trusted...
Building multi-services in personal mobile devices based on partially trusted...Building multi-services in personal mobile devices based on partially trusted...
Building multi-services in personal mobile devices based on partially trusted...Miguel Pardal
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsEd Pimentel
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO Alliance
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)Andrea Colombetti
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)CM.com
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 

Similaire à Mobile Authentication on the Internet (20)

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Building multi-services in personal mobile devices based on partially trusted...
Building multi-services in personal mobile devices based on partially trusted...Building multi-services in personal mobile devices based on partially trusted...
Building multi-services in personal mobile devices based on partially trusted...
 
Kona SL Profile
Kona SL ProfileKona SL Profile
Kona SL Profile
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 

Plus de evidos

Hoe weet ik wie digitaal getekend heeft?
Hoe weet ik wie digitaal getekend heeft? Hoe weet ik wie digitaal getekend heeft?
Hoe weet ik wie digitaal getekend heeft? evidos
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conferenceevidos
 
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010evidos
 
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010evidos
 
OpenID binnen de Rijksoverheid
OpenID binnen de RijksoverheidOpenID binnen de Rijksoverheid
OpenID binnen de Rijksoverheidevidos
 
Hyves Open Id
Hyves Open IdHyves Open Id
Hyves Open Idevidos
 
Open Id Security ITsec
Open Id Security ITsecOpen Id Security ITsec
Open Id Security ITsecevidos
 
ConsumentenID
ConsumentenIDConsumentenID
ConsumentenIDevidos
 

Plus de evidos (8)

Hoe weet ik wie digitaal getekend heeft?
Hoe weet ik wie digitaal getekend heeft? Hoe weet ik wie digitaal getekend heeft?
Hoe weet ik wie digitaal getekend heeft?
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conference
 
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
 
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010Ontwikkelen open id na 2009 openid_meetup_15sept_2010
Ontwikkelen open id na 2009 openid_meetup_15sept_2010
 
OpenID binnen de Rijksoverheid
OpenID binnen de RijksoverheidOpenID binnen de Rijksoverheid
OpenID binnen de Rijksoverheid
 
Hyves Open Id
Hyves Open IdHyves Open Id
Hyves Open Id
 
Open Id Security ITsec
Open Id Security ITsecOpen Id Security ITsec
Open Id Security ITsec
 
ConsumentenID
ConsumentenIDConsumentenID
ConsumentenID
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Mobile Authentication on the Internet

  • 1. Mobile Authentication on the Internet Presented by Paul Lahaije “OpenID Event”, Haarlem, 12 May 2009 1 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 2. Increasing demand for secure authentication on the Internet • Secure remote access to Corporate IT systems Online –Market value of $608Mn in 2008 governmental services (IDC). • Online banking –A survey of European retail banks identified ID theft as the highest financial crime priority to address User authentication • Online identity “Are you really the –challenge of securely managing person you claim to be?” multiple passwords and online identities • E-government –Filing online tax returns (e.g. DIGID in the Netherlands) 2 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 3. The added value of Mobile Authentication • Adding security to online services (Second channel for authentication) • Improved user convenience (Single Sign On) • Availability: User’s always carry their mobile phone with them Picture to be added • Mobile phone penetration is close to 100% in many markets • Real-time communication interface to the user • Effective fraud control - customers on average report a stolen mobile phone in 28 minutes and application can be stopped immediately over the mobile network. 3 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 4. The core value of the SIM • Secure authentication for more than 4 Billion users • As secure as banking cards • Standardized – Global Platform, ETSI-SCP – SIM Toolkit applications / Java clients • Multi application platform – The SIM can host service provider trusted applications (e.g. banking application, NFC ticketing) in separate security domains – Service providers can “rent” their own space in the SIM • Remote Management over the air – Payment providers can remotely manage their own applications via a trusted third party • Portable, terminal independent 4 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 5. SIM technology evolution • Smart Card Web Server (OMA); an embedded web server on the SIM • USB High Speed Interface, TCP/IP supported • Secure domains on smartcards to support multiple applications • Towards an open internet compatible smart card execution environment: Javacard, .NET, Java Servlet, SCWS The SIM is becoming a secure IP network element 5 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 6. The SIM as the Identity Token for the Internet Enabling the Mobile Operator to become an Internet Security Provider • Adding Security to the Internet (e.g. PKI based user authentication) • Improving user convenience more more convenience security (no need to remember multiple usernames/passwords) less less • Digital Identity Management (private information stored on the SIM) 6 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 7. SIM-Based Authentication Architecture Identity Provider: Web Service: -OpenID -Online Banking -Liberty Alliance -E-Government service -Microsoft CardSpace -Social network service - ... -OpenID Consumer Authentication Services: IP/Device -One-Time-Password -Wireless PKI Convergence -.... User Interface: -(Mobile) Web Browser -(Mobile) Widget -SIM Intelligent Client - ... 7 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 8. Demonstration • Introducing SIM based authentication to OpenID • Supporting different authentication methods – One-Time-Password – WPKI • Could be applied to various online services – Online social network services – Online banking – E-government services • Demonstration movie 8 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 9. Summary and Conclusions • The SIM can enable Mobile Operators to become Internet Security Providers, offering Security and Identity for online services Let’s join forces to exploit the SIM strength’s to become “The Identity Token” for the Internet. 9 Extended roles for the SIM C1 14 May 2009 Group R&D
  • 10. Thank you 10 Extended roles for the SIM C1 14 May 2009 Group R&D