SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Mobile Connect & FIDO
About  the  GSMA
The  GSMA  represents  the  interests  of  
mobile  operators  worldwide
Spanning  more  than  220  countries,  the  
GSMA  unites  nearly  800  of  the  world’s  
mobile  operators,  as  well  as  more  than  
230  companies  in  the  broader  mobile  
ecosystem
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect:  a  convenient  and  secure  alternative  to  
passwordsthat  also  Protects  consumers  privacy  
• Easy  to  use as  it  uses  the  mobile  phone  for  
authentication  (i.e.  no  passwords)
• Anonymous but  secure  log-­in  (no  passwords  to  
steal,  improved  user  experience,  reduce  friction)  
• Adds  trust  into  digital  transactions  (e.g.  by  
confirming  location,  user  identity,  usage)
• Protects  privacy  (operator  confirm  credentials,  
user  gives  consent  for  sharing)
• Reduce  SP  fraud through  assurance  that  there  
is  as  real  person  behind  the  account
• Simple  and  cost  effective  for  MNOs  to  deploy,  
leveraging  existing  operator  assets
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Something  I  
Know
Something  I  
Have
Something  I  Have
+
Something  I  
Know
Something  I  Have
+
Something  I  Am
Or
Mobile  Connect  and  FIDO  both  seek  to  replace  passwords
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ Both  FIDO  and  Mobile  Connect  are  addressing  the  same  problem:  easier,  safer  
online  authentication
¢ Both  FIDO  and  Mobile  Connect  leverage  the  mobile  phone  to  achieve  this
¢ Whilst  Mobile  Connect  uses  existing  MNO  services  for  authentication   (SMS,  USSD,  
SIM  Toolkit)
¢ …  FIDO  leverages  the  local  device  authentication   on  the  phone  itself
¢ In  doing  so,  both  provide  easy,  secure  two-­‐factor  authentication
¢ Both  also  provide  a  pluggable  framework  that  can  support  a  variety  of  security  
levels  as  well  as  supporting  new  authentication   methods  as  they  arise
FIDO  objectives  align  well  with  those  of  Mobile  Connect
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Synergistic  fit  using  FIDO  for  the  first  mile  of  Mobile  Connect
FIDO  UAF  protocol
Mobile  phone
with  FIDO  client AuthN server
MNO
Tablet/desktop
Service  access   request
Service  Provider
Authentication  
request
Identity  GW
First  mile
Second  mileSIM  applet  protocol  (CPAS8)
AuthN
server
SIM  
applet
A  key  difference  between  FIDO  and  
Mobile  Connect  is  that  FIDO  purposefully  
focuses  solely  on  the  first  mile  –
authentication  itself  – whilst  Mobile  
Connect  also  provides  a  federation  layer  
via  OpenID  Connect  
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
MNO
¢ Leveraging  FIDO  enables  users  to  authenticate  using  existing  
authentication  mechanisms  on  their  mobile  phone
¢ …including  biometrics  – the  user  
becomes  the  credential  (Something  I  am)
FIDO  can  be  integrated  into  Mobile  Connect  to  extend  the  range  of  
authenticators
Authentication
Mobile  phone
with  FIDO  client MFAS Identity  GW
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect  and  FIDO  UAF  integration:  White  Paper
¢ Main  objective:
– Overview  of  FIDO  Architecture  and  use  cases
– Integration  of  FIDO  UAF  authenticators  into  Mobile  Connect  arch
¢ Status:
– Co-­‐developed  between  GSMA,  MNOs  and  FIDO  members
– First  draft  finished  and  out  for  review  within  FIDO  Alliance  and  GSMA;  targeting  
publication  by  end  June
¢ Left  for  a  second  phase:
– UICC  based  FIDO  authenticator
– Use  of  UICC  to  enhance  FIDO  implementation  security
– FIDO  U2F  integration
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect  and  FIDO  UAF  integration  building  blocks
MNO
Server Side
User Mobile Phone
Client Side
FIDO Metadata Service
IdP
FIDO Server
Mobile Connect App
FIDO Client
ASM
FIDO Authenticator
Device Push Notification System
(ex. Android GCM)
FIDO%Authen,cator%
IDGW%
INT  1:  FIDO  Transport
Binding Protocol
INT  2:  Vendor dependent
interface
INT  3:  FIDO  defined (OS  
dependent)
INT  4:  Notification system
interface  (client-­side)
INT  5:  Notification system
interface  (server-­side)
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ Service  Providers  need  to  be  able  to  both  specify  and  receive  feedback  on  the  type  of  
authenticator  used  
¢ Mobile  Connect
– uses  Level  of  Assurance  (LoA)  values  (ISO  29115)  in  the  OIDC  request  acr_values
params,  so  the  SP  can  indicate  the  authenticator  class  that  should  be  used
¢ FIDO  
– uses  the  FIDO  Policy  to  describe  the  required  authenticator  characteristics  for  
accepted  authenticators
¢ Options:
– Expand  the  list  of  acr_values to  accommodate  additional  LoA/policies
– Capture  SP  requirements  at  registration  to  the  Mobile  Connect  service  and  
propagate  via  the  Mobile  Connect  federation
Matching  of  FIDO  policies  to  OpenID  Connect  ‘acr_values’  
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ GSMA  White  paper
– Continue  Working  on  open  issues  related   to  the  integration  of  
the  FIDO  authentication  framework  with  Mobile  Connect
– Improve  the  document  with  feedback  from  the  PoC
¢ FIDO/GSMA/MNO  PoC (June/July)
– Prototype  of  FIDO  integration  into  an  end-­‐end  Mobile  Connect  
implementation:  Telefonica   +  NokNok Labs
– Targeted  for  Mobile  World  Congress  Shanghai
¢ MNO/SP  beta  trial  (post  MWCS)
– Live  implementation   and  trial  of  FIDO  authenticators  within  a  
Mobile  Connect  service  provided  to  an  SP
Next  steps

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer Authentication
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 

Andere mochten auch

Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012
Nov Matake
 
Addressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO modelAddressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO model
DKAL
 

Andere mochten auch (10)

WSO2 Telco MCX
WSO2 Telco MCXWSO2 Telco MCX
WSO2 Telco MCX
 
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
 
Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
MVNO for MNO
MVNO for MNOMVNO for MNO
MVNO for MNO
 
Addressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO modelAddressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO model
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 

Ähnlich wie Mobile Connect and the FIDO standards

BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokers
mParticle
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
kkvences
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 

Ähnlich wie Mobile Connect and the FIDO standards (20)

OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateOpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
 
OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokers
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Securewify - Eximuis 2015
Securewify - Eximuis 2015Securewify - Eximuis 2015
Securewify - Eximuis 2015
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
DIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsmaDIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsma
 

Mehr von FIDO Alliance

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

Mehr von FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Mobile Connect and the FIDO standards

  • 2. About  the  GSMA The  GSMA  represents  the  interests  of   mobile  operators  worldwide Spanning  more  than  220  countries,  the   GSMA  unites  nearly  800  of  the  world’s   mobile  operators,  as  well  as  more  than   230  companies  in  the  broader  mobile   ecosystem
  • 3. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect:  a  convenient  and  secure  alternative  to   passwordsthat  also  Protects  consumers  privacy   • Easy  to  use as  it  uses  the  mobile  phone  for   authentication  (i.e.  no  passwords) • Anonymous but  secure  log-­in  (no  passwords  to   steal,  improved  user  experience,  reduce  friction)   • Adds  trust  into  digital  transactions  (e.g.  by   confirming  location,  user  identity,  usage) • Protects  privacy  (operator  confirm  credentials,   user  gives  consent  for  sharing) • Reduce  SP  fraud through  assurance  that  there   is  as  real  person  behind  the  account • Simple  and  cost  effective  for  MNOs  to  deploy,   leveraging  existing  operator  assets
  • 4. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Something  I   Know Something  I   Have Something  I  Have + Something  I   Know Something  I  Have + Something  I  Am Or Mobile  Connect  and  FIDO  both  seek  to  replace  passwords
  • 5. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ Both  FIDO  and  Mobile  Connect  are  addressing  the  same  problem:  easier,  safer   online  authentication ¢ Both  FIDO  and  Mobile  Connect  leverage  the  mobile  phone  to  achieve  this ¢ Whilst  Mobile  Connect  uses  existing  MNO  services  for  authentication   (SMS,  USSD,   SIM  Toolkit) ¢ …  FIDO  leverages  the  local  device  authentication   on  the  phone  itself ¢ In  doing  so,  both  provide  easy,  secure  two-­‐factor  authentication ¢ Both  also  provide  a  pluggable  framework  that  can  support  a  variety  of  security   levels  as  well  as  supporting  new  authentication   methods  as  they  arise FIDO  objectives  align  well  with  those  of  Mobile  Connect
  • 6. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Synergistic  fit  using  FIDO  for  the  first  mile  of  Mobile  Connect FIDO  UAF  protocol Mobile  phone with  FIDO  client AuthN server MNO Tablet/desktop Service  access   request Service  Provider Authentication   request Identity  GW First  mile Second  mileSIM  applet  protocol  (CPAS8) AuthN server SIM   applet A  key  difference  between  FIDO  and   Mobile  Connect  is  that  FIDO  purposefully   focuses  solely  on  the  first  mile  – authentication  itself  – whilst  Mobile   Connect  also  provides  a  federation  layer   via  OpenID  Connect  
  • 7. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   MNO ¢ Leveraging  FIDO  enables  users  to  authenticate  using  existing   authentication  mechanisms  on  their  mobile  phone ¢ …including  biometrics  – the  user   becomes  the  credential  (Something  I  am) FIDO  can  be  integrated  into  Mobile  Connect  to  extend  the  range  of   authenticators Authentication Mobile  phone with  FIDO  client MFAS Identity  GW
  • 8. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect  and  FIDO  UAF  integration:  White  Paper ¢ Main  objective: – Overview  of  FIDO  Architecture  and  use  cases – Integration  of  FIDO  UAF  authenticators  into  Mobile  Connect  arch ¢ Status: – Co-­‐developed  between  GSMA,  MNOs  and  FIDO  members – First  draft  finished  and  out  for  review  within  FIDO  Alliance  and  GSMA;  targeting   publication  by  end  June ¢ Left  for  a  second  phase: – UICC  based  FIDO  authenticator – Use  of  UICC  to  enhance  FIDO  implementation  security – FIDO  U2F  integration
  • 9. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect  and  FIDO  UAF  integration  building  blocks MNO Server Side User Mobile Phone Client Side FIDO Metadata Service IdP FIDO Server Mobile Connect App FIDO Client ASM FIDO Authenticator Device Push Notification System (ex. Android GCM) FIDO%Authen,cator% IDGW% INT  1:  FIDO  Transport Binding Protocol INT  2:  Vendor dependent interface INT  3:  FIDO  defined (OS   dependent) INT  4:  Notification system interface  (client-­side) INT  5:  Notification system interface  (server-­side)
  • 10. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ Service  Providers  need  to  be  able  to  both  specify  and  receive  feedback  on  the  type  of   authenticator  used   ¢ Mobile  Connect – uses  Level  of  Assurance  (LoA)  values  (ISO  29115)  in  the  OIDC  request  acr_values params,  so  the  SP  can  indicate  the  authenticator  class  that  should  be  used ¢ FIDO   – uses  the  FIDO  Policy  to  describe  the  required  authenticator  characteristics  for   accepted  authenticators ¢ Options: – Expand  the  list  of  acr_values to  accommodate  additional  LoA/policies – Capture  SP  requirements  at  registration  to  the  Mobile  Connect  service  and   propagate  via  the  Mobile  Connect  federation Matching  of  FIDO  policies  to  OpenID  Connect  ‘acr_values’  
  • 11. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ GSMA  White  paper – Continue  Working  on  open  issues  related   to  the  integration  of   the  FIDO  authentication  framework  with  Mobile  Connect – Improve  the  document  with  feedback  from  the  PoC ¢ FIDO/GSMA/MNO  PoC (June/July) – Prototype  of  FIDO  integration  into  an  end-­‐end  Mobile  Connect   implementation:  Telefonica   +  NokNok Labs – Targeted  for  Mobile  World  Congress  Shanghai ¢ MNO/SP  beta  trial  (post  MWCS) – Live  implementation   and  trial  of  FIDO  authenticators  within  a   Mobile  Connect  service  provided  to  an  SP Next  steps