Ericsson Mobile digital identity



Similar documents
How To Build A Digital Business From The Ground Up

Mobile Financial Services

Mobile Connect & FIDO

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Adding Stronger Authentication to your Portal and Cloud Apps

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator

Frans Bolk CEO UniQ-ID

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

m Commerce Working Group

API-Security Gateway Dirk Krafzig

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

Identity and Access Management for the Hybrid Enterprise

A RADICAL NEW OPEN SOURCE Mobile Connect Accelerator (MCX) GSMA Approved Solution

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Multi-Factor Authentication Job Aide

TrustedX: eidas Platform

Glossary of Key Terms

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Longmai Mobile PKI Solution

Secure Your Enterprise with Usher Mobile Identity

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures

How to enroll Android devices in SoMobile. Content Introduction... 1 Prerequisites... 1 Enrollment... 2

Improving Online Security with Strong, Personalized User Authentication

White Paper PalmSecure truedentity

Mobile Wallet Platform. Next generation mobile wallet solution

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Made for MSPs by an MSP

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

CSS CORP SMART MOBILITY SERVICES

QR Code for Digital Signature Online/Offline Payment. James Wu 1

OIX IDAP Alpha Project - Technical Findings

Microsoft Office 365 from Vodafone. Do business virtually anywhere

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

STRONGER AUTHENTICATION for CA SiteMinder

HP Software as a Service

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

EBA STRONG AUTHENTICATION REQUIREMENTS

IDaaS: Managed Credentials for Local & State Emergency Responders

Ariba Supplier Mobile App Quick Start Guide

ADDING STRONGER AUTHENTICATION for VPN Access Control

SAML Security Option White Paper

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Two-Factor Authentication

Introduction to SAML

Mitel Performance Analytics

Strong authentication. NetIQ - All Rights Reserved

Microsoft Enterprise Mobility Suite

Flexible Identity Federation

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

How Secure are Contactless Payment Systems?

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Samsung SDS. Fast IDentity Online

Beyond passwords: Protect the mobile enterprise with smarter security solutions

User Guide FOR TOSHIBA STORAGE PLACE

i-mobile Multi-Factor Authentication

Employee Active Directory Self-Service Quick Setup Guide

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Role of Multi-biometrics in Usable Multi- Factor Authentication

Enhancing Web Application Security

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

Self Service Portal and 2FA User Guide

Modern Multi-factor and Remote Access Technologies

DIGIPASS as a Service. Google Apps Integration

The Who, What, When, Where and Why of IAM Bob Bentley

Moving to Multi-factor Authentication. Kevin Unthank

AWEBDESK LIVE CHAT SOFTWARE

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

MONETIZING THE MOBILE APP. A Light Reading Webinar Sponsored by

Location Based Services for Enterprise

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

Trust Elevation Using Risk-Based Multifactor Authentication. Cathy Tilton

Content Delivery Service (CDS)

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Android pay. Frequently asked questions

VIDEO INTEGRATION. ipad video meetings from within your CRM has never been easier.

Rich Communication Suite Enabler. plus integration with your existing VoIP services

Transcription:

Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity

Ericsson s identity Vision Every mobile phone number can be a Trusted digital ID Every mobile device is a Digital Wallet and ey part in the Networked Society Vision We must enable Simple & secure access to the largest possible set of services Pedro Calderon Ericsson Confidential 2014-11-05 Page 2

What is Ericsson MDI? Pedro Calderon A solution to converts every mobile device into a mobile digital ID Mobile Operators validate credentials and protect identity Simplifies access from any device to online resources Anywhere, anytime, any device Converts operators into Trusted Identity Providers Different levels of assurance (LoA1 to LoA4) for both SIM & non SIM-based services Pedro Calderon Ericsson Confidential 2014-11-05 Page 3

What are the use cases? Pedro Calderon Ericsson Confidential 2014-11-05 Page 4

Architecture for MCX Accelerator E-Gov Banks MDI Cloud based components User Portal SP Portal Discovery & Resolution MDI Cloud Gateway E/// API MDI Operator Cloud Components DB App. Server. MCXP / MCXS DB App. Server MCXP / MCXS Operator Authenticators SMS-C USSD BIOMETRICS SMS-C USSD BIOMETRICS AFG AFG Pedro Calderon Ericsson Confidential 2014-11-05 Page 5

identity players today Google + 300M MAU Facebook 1,35B MAU Mobile Operators 4.65B MAU Pedro Ericsson Calderon AB 2014 Ericsson 2014-09-04 Confidential Page 2014-11-05 6 Page 6

Identity model Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential 2014-11-05 Page 7

99% of services Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential 2014-11-05 Page 8

Gsma mobile connect Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential 2014-11-05 Page 9

Bank and gov id Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connect O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential 2014-11-05 Page 10

Mobile digital identity supported cases Who are you claiming to be? Can I trust this claim? Do you have a physical key? Prove to me the key isn t stolen! Smart card/reader BankID Bank / Gov Validated ID SIM PKI Mobile ID Facebook ID Google ID Twitter ID Open ID Connec t O A U T H MNO validated against UDM Data MNO validated at Point of Sale GBA 2FA SMS challenge Location Challenge Notification SMS Setup SMS challenge Biometrics PKI password password Manual entry form NO NO Pedro Calderon Ericsson Confidential 2014-11-05 Page 11

Business, trust & simplicity MDI and the Mobile connect move Simple User Interface Pedro Calderon End-User Profile Management MNO LOGO Branding Space Featured Applications Connected Applications Permissions Management per App Pedro Calderon Ericsson Confidential 2014-11-05 Page 12

WherE is the business case For MOBIle ID & eid?

Pedro Calderon Ericsson Confidential 2014-11-05 Page 14

3 elements for a strong BC Paid authentication Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential 2014-11-05 Page 15

authentication Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential 2014-11-05 Page 16

levels of assurance Level of Assuran ce Confidence in Asserted Identity Authentication Factors LoA1 Little or no confidence Single Factor Authentication Something I Know Options for Authentication N/A MDI leverages on the possession of a mobile device Social Apps LoA2 Some confidence Single Factor Authentication Something I Have LoA3 High confidence Multi-Factor Authentication: Something I Have Something I Know SMS + URL USSD Smartphone App Idem on LoA2 plus PIN or Password MDI 1.X LoA4 Very high confidence Multi-Factor Authentication: Something I Have Something I Know + PKI for Digital Signature Idem on LOA3 plus PKI MDI 2,x Pedro Calderon Ericsson Confidential 2014-11-05 Page 17

Pedro Calderon Ericsson Confidential 2014-11-05 Page 18

Freemium model High volume (above threshold) Low volume (below threshold) paid free paid free paid LOA2 LOA3 LOA4 Pedro Calderon Ericsson Confidential 2014-11-05 Page 19

Promoting services Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential 2014-11-05 Page 20

Key Take-Aways MDI leverages on the possession of a mobile device to provide multi-factor authentication What I have (Mobile device) What I know (Password, PIN, etc..) What I am (Biometrics and more on research) Offers a Full range of Authentication, Identification and Authorization levels MDI 1.0 is 1 st Global GSMA Mobile Operator Compliant solution in the market Pedro Calderon Ericsson Confidential 2014-11-05 Page 21

Promote your own services fast development of ecosystem Pedro Calderon Ericsson Confidential 2014-11-05 Page 23

From Discovery to Recommendations Pedro Calderon Ericsson Confidential 2014-11-05 Page 24

Attribute brokerage Paid authentication Provide Attribute Brokerage Promote Own Services Pedro Calderon Ericsson Confidential 2014-11-05 Page 25

Attribute brokerage Seamlessly needed when there is 1 to Many relationships (e.g. Between an app and identity sources) website or app Company A user database Company B user database Company C user database Pedro Calderon Ericsson Confidential 2014-11-05 Page 26

examples MCX Pedro Calderon Ericsson Confidential 2014-11-05 Page 27

Pedro Calderon Ericsson Confidential 2014-11-05 Page 28

Mobile apps & MOBIle connect Pedro Calderon Ericsson Confidential 2014-11-05 Page 29

Pedro Calderon Ericsson Confidential 2014-11-05 Page 30

Pedro Calderon Ericsson Confidential 2014-11-05 Page 31