https://labs.ericsson.com/apis?api_category=199
Ericsson Labs' presentation at Over the Air 2011.
Examples of how to establish a trusted identity, how to do mash-ups of multiple data feeds and how to secure peer-to-peer communication.
21. How does it all fit
together?
used in used in
SIM identification Federated AuthN (OpenID) Delegated AuthZ (OAuth) P2P Key Est.
›The OAuth Authorization server authenticates the user using OpenID
›The OpenID Provider authenticates the user using SIM card identification
›The P2P key establishment is largely independent from the other tools
(though the peer-KMS trust relation is based on SIM card identification)