SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Optimising and simplifying
authentication and
authorization services_
Martin Prošek
Telefónica Czech Republic
06.11.2013
About Telefónica Czech Republic
Fixed and mobile voice and data, IPTV
Operated under commercial brand O2

DISCOVER, DISRUPT, DELIVER
Mobile Operator Identification Security

•

SIM card – secure asset giving access to the
network, protected by PIN

•
DISCOVER, DISRUPT, DELIVER

No further interactions
SIM-based Identification

•

Simple, convenient

•

Fully sufficient for telco payments (voice, SMS,
data…)

•

Fails in cases when
Phone is stolen
Phone is borrowed
Data access is shared by WiFi
Corporate users

•
•
•
•

DISCOVER, DISRUPT, DELIVER
Technical Solution – Internal Server

AAA
AAA

Server
Server

IP address
MSISDN resolving

Authorization

DISCOVER, DISRUPT, DELIVER
Technical Solution – Internal + External Server
Typical example: WAP

Gateway
Gateway

AAA
AAA

Server
Server

IP address
MSISDN resolving

Header enrichment
X-Nokia-msisdn: 420602607977

Authorization

DISCOVER, DISRUPT, DELIVER
Technical Solution – Internal + External Server
GET / HTTP/1.1
Host: m.o2.cz
User-Agent: Mozilla/5.0 (SymbianOS/9.3; Series60/3.2 NokiaE72-1/031.023;
Profile/MIDP-2.1 Configuration/CLDC-1.1 ) AppleWebKit/525 (KHTML, like Gecko)
Version/3.0 4 BrowserNG/7.2.3.1
x-wap-profile: "http://nds1.nds.nokia.com/uaprof/NE72-1r100.xml"
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en,cs;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
X-Nokia-msisdn: 420602607977
HTTP/1.0 200 OK
Server: Apache-Coyote/1.1, Apache-Coyote/1.1
Cache-Control: no-cache
x-cocoon-version: 2.0.3
Expires: Fri, 31 Dec 1999 23:59:59 GMT
Date: Wed, 06 Nov 2013 07:19:46 GMT
Vary: Accept-Encoding
Pragma: no-cache
Content-Type: text/html;charset=UTF-8
Content-Encoding: gzip
X-Cache: MISS from proxy1, MISS from Proxy1R
Connection: close
DISCOVER, DISRUPT, DELIVER
Technical Solution – Smartphone Application

API
API

AAA
AAA

IP address
MSISDN resolving

420602607977

DISCOVER, DISRUPT, DELIVER
Technical Solution – WiFi

•
•
•
•

MSISDN - if operator‘s WLAN used
Login by username password – otherwise
MT SMS One-Time Password
Tricks – cookies, certificates

DISCOVER, DISRUPT, DELIVER
Technical Solution – WiFi with MT SMS OTP

SMSC
SMSC

API
API

Server
Server

MSISDN
OTP
OTP
MT SMS
OTP

Authorization

DISCOVER, DISRUPT, DELIVER
Technical Solution – App on WiFi with MO SMS

App
App

Operator
Operator

Server
Server

Token

SMS with Token

Authorization

DISCOVER, DISRUPT, DELIVER
Mobile Content Payments

•
•
•

Natural extension of payments for telco services
Mobile Payments with 3rd parties are next step
Issues:
Authentication not only for operator – mechant
is included
Intangible goods

•
•

DISCOVER, DISRUPT, DELIVER
Mobile Content Payments Risks

•

Communication is not direct anymore
Operator
Operator

•

Man-in-the-middle (M-I-M) attacks are possible
Provider
Provider

•

Even the app itself can compromise the payment
security – App-in-the-middle (A-I-M)*
App
App

•

Operator
Operator

Provider
Provider

Operator
Operator

* Known examples: fraudulent Premium SMS sending…

DISCOVER, DISRUPT, DELIVER
Mobile Content Payments Risks
Typical example: oAuth

App
App

DISCOVER, DISRUPT, DELIVER

Operator
Operator

Server
Server
Summary

Mobile operators are still in

best position to assure
reliable identification of
Users.
NETWORK BASED IDENTIFICATION
Using SIM card
Using other data (location, terminal
information…)

PASSWORD BASED IDENTIFICATION
It creates reliable multifactor authentication

IDENTITY FEDERATION
Evolves from walled garden to modern web
environment

15
DISCOVER, DISRUPT, DELIVER
Mobile Identity 2013 - Optimising and simplifying authentication and authorization services

Weitere ähnliche Inhalte

Was ist angesagt?

CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?Bertrand Carlier
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionJoshuaVictor10
 
24online for Hotels/Resorts
24online for Hotels/Resorts24online for Hotels/Resorts
24online for Hotels/ResortsNitin Mittal
 
24online-Hotel presentation
24online-Hotel presentation24online-Hotel presentation
24online-Hotel presentationvismayibhat
 
DataArt Innovation Showcase Blockchain Billing
DataArt Innovation Showcase Blockchain BillingDataArt Innovation Showcase Blockchain Billing
DataArt Innovation Showcase Blockchain BillingAlan Quayle
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
 
How IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AIHow IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AIDialogic Inc.
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)Andrea Colombetti
 
TADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovTADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovAlan Quayle
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensForgeRock
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...Alan Quayle
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateBjorn Hjelm
 
Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Rambus Inc
 
2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefitsForgeRock
 

Was ist angesagt? (20)

IETF meeting - SIP OAuth use cases
IETF meeting - SIP OAuth use casesIETF meeting - SIP OAuth use cases
IETF meeting - SIP OAuth use cases
 
CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?CIS 2017 - So you want to use standards to secure your APIs?
CIS 2017 - So you want to use standards to secure your APIs?
 
MyGp
MyGpMyGp
MyGp
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Host Card Emulation
Host Card Emulation Host Card Emulation
Host Card Emulation
 
Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification Solution
 
24online for Hotels/Resorts
24online for Hotels/Resorts24online for Hotels/Resorts
24online for Hotels/Resorts
 
24online-Hotel presentation
24online-Hotel presentation24online-Hotel presentation
24online-Hotel presentation
 
DataArt Innovation Showcase Blockchain Billing
DataArt Innovation Showcase Blockchain BillingDataArt Innovation Showcase Blockchain Billing
DataArt Innovation Showcase Blockchain Billing
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
How IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AIHow IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AI
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
 
TADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovTADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin Ivanov
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?
 
2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits
 

Ähnlich wie Mobile Identity 2013 - Optimising and simplifying authentication and authorization services

Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - PhonecardGuy Romanus
 
Rajesh jain 2 g business and technology for value added services
Rajesh jain 2 g   business and technology for value added servicesRajesh jain 2 g   business and technology for value added services
Rajesh jain 2 g business and technology for value added servicesRajeshJain2G
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdinEric Jorgensen
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...drctan
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Mars Corporate Presentation
Mars Corporate PresentationMars Corporate Presentation
Mars Corporate Presentationmarsindia
 
Micro Networks Compnay Profile
Micro Networks Compnay ProfileMicro Networks Compnay Profile
Micro Networks Compnay ProfileMicro Networks
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digitalBurhan Kamal
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solutionNitin Mittal
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover SolutionsNoah Dillard
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profileDev IPage
 

Ähnlich wie Mobile Identity 2013 - Optimising and simplifying authentication and authorization services (20)

Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Rajesh jain 2 g business and technology for value added services
Rajesh jain 2 g   business and technology for value added servicesRajesh jain 2 g   business and technology for value added services
Rajesh jain 2 g business and technology for value added services
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdin
 
802.11ac Byod Linkdin
802.11ac Byod Linkdin802.11ac Byod Linkdin
802.11ac Byod Linkdin
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Mars Corporate Presentation
Mars Corporate PresentationMars Corporate Presentation
Mars Corporate Presentation
 
Micro Networks Compnay Profile
Micro Networks Compnay ProfileMicro Networks Compnay Profile
Micro Networks Compnay Profile
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digital
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution
 
3--AI Clover Solutions
3--AI Clover Solutions3--AI Clover Solutions
3--AI Clover Solutions
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profile
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 

Mehr von Martin Prosek

SDP Global Summit 2012
SDP Global Summit 2012SDP Global Summit 2012
SDP Global Summit 2012Martin Prosek
 
SDP Global Summit 2010
SDP Global Summit 2010SDP Global Summit 2010
SDP Global Summit 2010Martin Prosek
 
SDP Global Summit 2009
SDP Global Summit 2009SDP Global Summit 2009
SDP Global Summit 2009Martin Prosek
 
CDN World Summit 2011
CDN World Summit 2011CDN World Summit 2011
CDN World Summit 2011Martin Prosek
 
Broadband Traffic Management 2011
Broadband Traffic Management 2011Broadband Traffic Management 2011
Broadband Traffic Management 2011Martin Prosek
 
Broadband Traffic Management 2010
Broadband Traffic Management 2010Broadband Traffic Management 2010
Broadband Traffic Management 2010Martin Prosek
 
SDP Global Summit 2013
SDP Global Summit 2013SDP Global Summit 2013
SDP Global Summit 2013Martin Prosek
 
Mobile Broadband Optimisation 2011
Mobile Broadband Optimisation 2011Mobile Broadband Optimisation 2011
Mobile Broadband Optimisation 2011Martin Prosek
 

Mehr von Martin Prosek (9)

SDP Global Summit 2012
SDP Global Summit 2012SDP Global Summit 2012
SDP Global Summit 2012
 
SDP Global Summit 2010
SDP Global Summit 2010SDP Global Summit 2010
SDP Global Summit 2010
 
SDP Global Summit 2009
SDP Global Summit 2009SDP Global Summit 2009
SDP Global Summit 2009
 
CDN World Summit 2011
CDN World Summit 2011CDN World Summit 2011
CDN World Summit 2011
 
Broadband Traffic Management 2011
Broadband Traffic Management 2011Broadband Traffic Management 2011
Broadband Traffic Management 2011
 
Broadband Traffic Management 2010
Broadband Traffic Management 2010Broadband Traffic Management 2010
Broadband Traffic Management 2010
 
3GOptimisation 2012
3GOptimisation 20123GOptimisation 2012
3GOptimisation 2012
 
SDP Global Summit 2013
SDP Global Summit 2013SDP Global Summit 2013
SDP Global Summit 2013
 
Mobile Broadband Optimisation 2011
Mobile Broadband Optimisation 2011Mobile Broadband Optimisation 2011
Mobile Broadband Optimisation 2011
 

Kürzlich hochgeladen

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Mobile Identity 2013 - Optimising and simplifying authentication and authorization services

  • 1. Optimising and simplifying authentication and authorization services_ Martin Prošek Telefónica Czech Republic 06.11.2013
  • 2. About Telefónica Czech Republic Fixed and mobile voice and data, IPTV Operated under commercial brand O2 DISCOVER, DISRUPT, DELIVER
  • 3. Mobile Operator Identification Security • SIM card – secure asset giving access to the network, protected by PIN • DISCOVER, DISRUPT, DELIVER No further interactions
  • 4. SIM-based Identification • Simple, convenient • Fully sufficient for telco payments (voice, SMS, data…) • Fails in cases when Phone is stolen Phone is borrowed Data access is shared by WiFi Corporate users • • • • DISCOVER, DISRUPT, DELIVER
  • 5. Technical Solution – Internal Server AAA AAA Server Server IP address MSISDN resolving Authorization DISCOVER, DISRUPT, DELIVER
  • 6. Technical Solution – Internal + External Server Typical example: WAP Gateway Gateway AAA AAA Server Server IP address MSISDN resolving Header enrichment X-Nokia-msisdn: 420602607977 Authorization DISCOVER, DISRUPT, DELIVER
  • 7. Technical Solution – Internal + External Server GET / HTTP/1.1 Host: m.o2.cz User-Agent: Mozilla/5.0 (SymbianOS/9.3; Series60/3.2 NokiaE72-1/031.023; Profile/MIDP-2.1 Configuration/CLDC-1.1 ) AppleWebKit/525 (KHTML, like Gecko) Version/3.0 4 BrowserNG/7.2.3.1 x-wap-profile: "http://nds1.nds.nokia.com/uaprof/NE72-1r100.xml" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en,cs;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 X-Nokia-msisdn: 420602607977 HTTP/1.0 200 OK Server: Apache-Coyote/1.1, Apache-Coyote/1.1 Cache-Control: no-cache x-cocoon-version: 2.0.3 Expires: Fri, 31 Dec 1999 23:59:59 GMT Date: Wed, 06 Nov 2013 07:19:46 GMT Vary: Accept-Encoding Pragma: no-cache Content-Type: text/html;charset=UTF-8 Content-Encoding: gzip X-Cache: MISS from proxy1, MISS from Proxy1R Connection: close DISCOVER, DISRUPT, DELIVER
  • 8. Technical Solution – Smartphone Application API API AAA AAA IP address MSISDN resolving 420602607977 DISCOVER, DISRUPT, DELIVER
  • 9. Technical Solution – WiFi • • • • MSISDN - if operator‘s WLAN used Login by username password – otherwise MT SMS One-Time Password Tricks – cookies, certificates DISCOVER, DISRUPT, DELIVER
  • 10. Technical Solution – WiFi with MT SMS OTP SMSC SMSC API API Server Server MSISDN OTP OTP MT SMS OTP Authorization DISCOVER, DISRUPT, DELIVER
  • 11. Technical Solution – App on WiFi with MO SMS App App Operator Operator Server Server Token SMS with Token Authorization DISCOVER, DISRUPT, DELIVER
  • 12. Mobile Content Payments • • • Natural extension of payments for telco services Mobile Payments with 3rd parties are next step Issues: Authentication not only for operator – mechant is included Intangible goods • • DISCOVER, DISRUPT, DELIVER
  • 13. Mobile Content Payments Risks • Communication is not direct anymore Operator Operator • Man-in-the-middle (M-I-M) attacks are possible Provider Provider • Even the app itself can compromise the payment security – App-in-the-middle (A-I-M)* App App • Operator Operator Provider Provider Operator Operator * Known examples: fraudulent Premium SMS sending… DISCOVER, DISRUPT, DELIVER
  • 14. Mobile Content Payments Risks Typical example: oAuth App App DISCOVER, DISRUPT, DELIVER Operator Operator Server Server
  • 15. Summary Mobile operators are still in best position to assure reliable identification of Users. NETWORK BASED IDENTIFICATION Using SIM card Using other data (location, terminal information…) PASSWORD BASED IDENTIFICATION It creates reliable multifactor authentication IDENTITY FEDERATION Evolves from walled garden to modern web environment 15 DISCOVER, DISRUPT, DELIVER