Ericsson Mobile digital identity
|
|
- Lizbeth Skinner
- 8 years ago
- Views:
Transcription
1 Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity
2 Ericsson s identity Vision Every mobile phone number can be a Trusted digital ID Every mobile device is a Digital Wallet and ey part in the Networked Society Vision We must enable Simple & secure access to the largest possible set of services Pedro Calderon Ericsson Confidential Page 2
3 What is Ericsson MDI? Pedro Calderon A solution to converts every mobile device into a mobile digital ID Mobile Operators validate credentials and protect identity Simplifies access from any device to online resources Anywhere, anytime, any device Converts operators into Trusted Identity Providers Different levels of assurance (LoA1 to LoA4) for both SIM & non SIM-based services Pedro Calderon Ericsson Confidential Page 3
4 What are the use cases? Pedro Calderon Ericsson Confidential Page 4
5 Architecture for MCX Accelerator E-Gov Banks MDI Cloud based components User Portal SP Portal Discovery & Resolution MDI Cloud Gateway E/// API MDI Operator Cloud Components DB App. Server. MCXP / MCXS DB App. Server MCXP / MCXS Operator Authenticators SMS-C USSD BIOMETRICS SMS-C USSD BIOMETRICS AFG AFG Pedro Calderon Ericsson Confidential Page 5
6 identity players today Google + 300M MAU Facebook 1,35B MAU Mobile Operators 4.65B MAU Pedro Ericsson Calderon AB 2014 Ericsson Confidential Page Page 6
7 Identity model Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 7
8 99% of services Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 8
9 Gsma mobile connect Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 9
10 Bank and gov id Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 10
11 Mobile digital identity supported cases Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connec t O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential Page 11
12 Business, trust & simplicity MDI and the Mobile connect move Simple User Interface Pedro Calderon End-User Profile Management MNO LOGO Branding Space Featured Applications Connected Applications Permissions Management per App Pedro Calderon Ericsson Confidential Page 12
13 WherE is the business case For MOBIle ID & eid?
14 Pedro Calderon Ericsson Confidential Page 14
15 3 elements for a strong BC Paid authentication Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 15
16 authentication Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 16
17 levels of assurance Level of Assuran ce Confidence in Asserted Identity Authentication Factors LoA1 Little or no confidence Single Factor Authentication Something I Know Options for Authentication N/A MDI leverages on the possession of a mobile device Social Apps LoA2 Some confidence Single Factor Authentication Something I Have LoA3 High confidence Multi-Factor Authentication: Something I Have Something I Know SMS + URL USSD Smartphone App Idem on LoA2 plus PIN or Password MDI 1.X LoA4 Very high confidence Multi-Factor Authentication: Something I Have Something I Know + PKI for Digital Signature Idem on LOA3 plus PKI MDI 2,x Pedro Calderon Ericsson Confidential Page 17
18 Pedro Calderon Ericsson Confidential Page 18
19 Freemium model High volume (above threshold) Low volume (below threshold) paid free paid free paid LOA2 LOA3 LOA4 Pedro Calderon Ericsson Confidential Page 19
20 Promoting services Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 20
21 Key Take-Aways MDI leverages on the possession of a mobile device to provide multi-factor authentication What I have (Mobile device) What I know (Password, PIN, etc..) What I am (Biometrics and more on research) Offers a Full range of Authentication, Identification and Authorization levels MDI 1.0 is 1 st Global GSMA Mobile Operator Compliant solution in the market Pedro Calderon Ericsson Confidential Page 21
22
23 Promote your own services fast development of ecosystem Pedro Calderon Ericsson Confidential Page 23
24 From Discovery to Recommendations Pedro Calderon Ericsson Confidential Page 24
25 Attribute brokerage Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential Page 25
26 Attribute brokerage Seamlessly needed when there is 1 to Many relationships (e.g. Between an app and identity sources) website or app Company A user database Company B user database Company C user database Pedro Calderon Ericsson Confidential Page 26
27 examples MCX Pedro Calderon Ericsson Confidential Page 27
28 Pedro Calderon Ericsson Confidential Page 28
29 Mobile apps & MOBIle connect Pedro Calderon Ericsson Confidential Page 29
30 Pedro Calderon Ericsson Confidential Page 30
31 Pedro Calderon Ericsson Confidential Page 31
How To Build A Digital Business From The Ground Up
Powering Business Value and Seamless Experiences GSMA Mobile Connect Accelerator and API Exchange by Apigee Apigee Digital Value Chain for Network Operators and Service Providers APP DEVELOPER Wants to
More informationMobile Financial Services
Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity
More informationMobile Connect & FIDO
Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well
More informationSecure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More informationSecurity in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
More informationBringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator
Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box
More informationFrans Bolk CEO UniQ-ID
Frans Bolk CEO UniQ-ID Uses certificates ( x.509) Has its own UniQ-CA ETSI Level of Security LoS5 ( Common Criteria EAL5+) ISO29115 and ISO29003 Level of Assurance LoA 4, and 3, and 2 ( STORK4+, and 3,
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationm Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationWHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
More informationIdentity and Access Management for the Hybrid Enterprise
Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver
More informationA RADICAL NEW OPEN SOURCE Mobile Connect Accelerator (MCX) GSMA Approved Solution
A RADICAL NEW OPEN SOURCE Mobile Connect Accelerator (MCX) GSMA Approved Solution WHY WSO2.TELCO? The ONLY company to ever build a complete 100% open source middleware stack on premise, in the cloud and
More informationDerived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationMulti-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
More informationTrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationGlossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
More informationMicrosoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
More informationLongmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationMOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
More informationTHE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
More informationSignicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08
Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this
More informationHow to enroll Android devices in SoMobile. Content Introduction... 1 Prerequisites... 1 Enrollment... 2
How to enroll Android devices in SoMobile Content Introduction... 1 Prerequisites... 1 Enrollment... 2 Introduction This document provides a detailed step-by-step to enroll your Android device in the SoMobile
More informationWhat s it all about? SAFE-BioPharma Association
What s it all about? SAFE-BioPharma Association Topics! ONC HIT Standards Committee! ASTM Standards 2 SAFE-BioPharma Association ONC HIT Standards Committee! Oct 21 st meeting Security & Privacy Consumer
More informationImproving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
More informationWhite Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
More informationMobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
More informationIdentity and Access Management Solutions MWC 2016
Identity and Access Management Solutions MWC 2016 The new EXPERIENCE to consume the digital world is our IDENTITY PROPOSAL EXPERIENCE the digital world EASILY, with TRUST and TRANSPARENCY I use y o ile
More informationAuthentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationMade for MSPs by an MSP
Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution
More informationKey Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
More informationCSS CORP SMART MOBILITY SERVICES
Mobility Services Mobility Services As handheld devices and next generation service provider networks enable rich, real time user experiences, mobility is fast emerging as a critical component of enterprise
More informationQR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1
QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,
More informationOIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
More informationMicrosoft Office 365 from Vodafone. Do business virtually anywhere
Do business virtually anywhere Now there s an easy way to do business virtually anywhere 2 Microsoft Office 365 from Vodafone is helping to empower people to work the way they want, on their terms, from
More informationAuthentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationSAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
More informationOpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
More informationSECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationMobile multifactor security
Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,
More informationHP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationCASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk
Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk 1 About the Airline Since its founding, this worldwide airline has led the industry in flight technology innovation and flyer
More informationAUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
More informationEBA STRONG AUTHENTICATION REQUIREMENTS
EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European
More informationIDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
More informationAriba Supplier Mobile App Quick Start Guide
Ariba Supplier Mobile App Quick Start Guide Table of Contents Getting Started...3 Downloading and Authenticating Your App... 3 Using the Ariba Supplier Mobile App...6 Logging In... 6 Setting Up Alerts
More informationNeustar Intelligent Cloud Services
Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz
More informationEXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski August 2013 by Alexei Balaganski ab@kuppingercole.com August 2013 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationSAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
More informationProtect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
More informationTwo-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationIdentity in the Internet Age
Identity in the Internet Age By Michael Dargue and William Wadsworth The traditional password model of identity management is no longer fit-for-purpose. Increased security risks and growing consumer frustration
More informationMitel Performance Analytics
Mitel Performance Analytics For Enterprises May 2016 Summary Mitel Performance Analytics: Service Quality Matters MPA Plus: Advanced Enterprise Features Fault & Performance Management Features MPA Service
More informationStrong authentication. NetIQ - All Rights Reserved
Strong authentication NetIQ - All Rights Reserved Agenda Strong authentication Demo 2 Questions about Identification / Authentication What is authentication? Identity verification, are you who you say
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationTABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
More informationGLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M. July 2013
GLOBAL TELECOM INVOLVEMENT in the I D E N T I T Y E C O S YS T E M July 2013 S P E A K E R S David Pollington GSMA (UK/EU) Andrew Johnston TELUS (CANADA) Scott Rice PACIFICEAST / OIX TDWG (US) Telecom
More informationHow Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationSamsung SDS. Fast IDentity Online
Samsung SDS Innovating User In the era of Digital Convergence In the coming era of digital convergence, user authentication is becoming increasingly important as a gateway to the digital world. Companies
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationUser Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
More informationi-mobile Multi-Factor Authentication
i-mobile Multi-Factor Authentication Introduction... 1 i-mobile Multi-Factor Authentication... 1 i-mobile WAP MFA Enrollment... 2 i-mobile Application MFA Enrollment... 4 Error Conditions and Resolutions...
More informationDell Mobile Clinical Computing
Dell Mobile Clinical Computing Healthcare Technology Solutions that Deliver Greater Security, IT Productivity and Clinician Efficiency Today s healthcare environment relies heavily on the latest technology
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationSophos Mobile Control User guide for Windows Phone 8. Product version: 3.5
Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5
More informationLife is now. www.vodafone.com.mt
BlackBerry Enterprise Solution Mobilise Your E-mail and Enterprise Applications The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business.
More informationRole of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from
More informationFrequently asked questions
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
More informationEnhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
More informationMember FAQ Premier Members Mobile Banking
Member FAQ Premier Members Mobile Banking 1.1 General Questions 1. What is Mobile Banking Premier Members Mobile? Premier Members Mobile allows members to access their accounts (checking, savings, certificates,
More informationDIGITAL LIFE E-GUIDE How to Protect your Smartphone
A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money
More informationSelf Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
More informationModern Multi-factor and Remote Access Technologies
Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1 Agenda Problem and solution
More informationDIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
More informationThe Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
More informationMoving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
More informationAWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.
More informationp@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
More informationMONETIZING THE MOBILE APP. A Light Reading Webinar Sponsored by
MONETIZING THE MOBILE APP A Light Reading Webinar Sponsored by TODAY S PRESENTERS ANDY GRAY Moderator Heavy Reading CASSIDY SHIELD Head of Global Marketing Content, Cloud, Communications 2 AGENDA 1. Service
More informationInnovation Summit 2012 You spoke. We listened.
Innovation Summit 2012 You spoke. We listened. Rapid Connect: The NEW First Data Connection Cheryl Ellmore - Director, Global Partner Management, First Data Trace Ussery - Director, Global Partner Management,
More informationLocation Based Services for Enterprise
Location Based Services for Enterprise Introduction WHITEPAPER Location Based Services (LBS) have been making foray into enterprise applications, thanks to the rise in smartphone ownership and the phenomenal
More informationHOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
More informationTrust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton
Trust Elevation Using Risk-Based Multifactor Authentication Cathy Tilton 1 Caveat Intent is to present an approach for risk-based multifactor authentication and how it might be used in a trustelevation
More informationContent Delivery Service (CDS)
Content Delivery Service (CDS) Xyleme delivers content management for learning and development. We transform the way you author, publish, deliver, and analyze learning content to drive business performance.
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationAndroid pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
More informationVIDEO INTEGRATION. ipad video meetings from within your CRM has never been easier.
VIDEO INTEGRATION ipad video meetings from within your CRM has never been easier. At SuiteBox we have strived to make this integration clean and simple, with only 4 touchpoints with your CRM. Only 1 API
More informationInternet ID - Flexible Re-use of Mobile Phone Authentication Security for Service Access
Internet ID - Flexible Re-use of Mobile Phone Authentication Security for Service Access Marko Schuba, Volker Gerstenberger, Paul Lahaije Abstract Identity management systems like.net Passport and the
More informationRich Communication Suite Enabler. plus integration with your existing VoIP services
Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.
More information