FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs

Nok Nok Labs, Inc
Nok Nok Labs, IncNok Nok Labs, Inc
FIDO & THE MOBILE 
NETWORK OPERATOR 
Alan Goode, Managing Director, 
Goode Intelligence 
Jamie Cowper, Senior Director, 
Nok Nok Labs
THE AUTHENTICATION CHALLENGE: 
HOW DO WE KNOW WHO YOU ARE? 
2 
?
MODERN AUTHENTICATION NEEDS 
3 
COST 
PRIVACY 
SECURITY 
USABILITY 
INFRASTRUCTURE: 
EXISTING 
TECHNOLOGY 
AUTHENTICATION 
LEGACY
LATEST RESEARCH 
4 
• What is the current Standard 
landscape for Authentication & 
identity? 
• What are the integration points 
between Identity & 
Authentication 
• How can MNO’s take advantage 
of the new opportunities in 
Authentication
THE MOBILE NETWORK 
OPERATORS AND THE FUTURE 
OF AUTHENTICATION 
11 November 2014 
Alan Goode - Goode Intelligence
1 
• Two inter-connected megatrends: 
• The rise of mobile computing 
• Cloud and SaaS 
• Mobile & Cloud – legacy authentication not fit for 
purpose 
• Failure of traditional of monolithic authentication 
solutions: 
• Passwords 
• Siloed 2FA 
• The need to support legacy IT
2 
• Putting the mobile at the heart of authentication and 
identity 
• Industry standards and initiatives facilitating 
emergence of intelligent mobile-based 
authentication 
• OpenID Connect 
• SAML 
• GSMA Mobile Connect 
• FIDO 
• Leverage the security of the SIM and built-in 
features of mobile for authentication
3 
• The first mile = using a mobile device as an 
authenticator 
• Leveraging native capabilities including 
biometrics 
• The second mile = connections to wider risk and 
fraud management and authorisation services 
• Importance of Identity Federation services 
• Authenticate once & then access multiple 
services 
• Vital to smoothly connect first and second miles 
• Seamless user experience
4 
• GSMA Mobile Connect provides a framework for 
MNOs to deliver mobile-based authentication 
services 
• Opportunity to become a central part of modern 
authentication ecosystem 
• MNOs are logical owners of mobile authentication 
and can leverage existing components and 
infrastructure: 
• SIM 
• Subscriber Data
5 
• First-to-market for FIDO Ready™ 
Authentication with S3 
Authentication Suite 
• Powers fingerprint biometric 
authentication for Alipay and 
Paypal 
• Reference model for mobile-based 
authentication using FIDO 
standards 
• Leverages mobile device secure 
hardware
Thank you. 
alan.goode@goodeintelligence.com 
www.goodeintelligence.com 
Twitter: @goodeintel
THE FIDO APPROACH 
ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. 
12 
Standardized Protocols 
Local authentication 
unlocks app specific key 
Key used to authenticate 
to server
FIDO ECOSYSTEM MOMENTUM 
13
MARKET DRIVERS FOR FIDO 
• Reduce 
transaction 
abandonment 
- Lower friction 
• Reduce 
transaction time 
• Reduce fraud 
• Increase trust in 
provider 
• Increase adoption 
of stronger 
adoption 
• Risk appropriate 
• Unified 
framework 
- Any device 
- Any 
authenticator 
• Future-proof 
architecture 
14 
Usability Security Cost
BROAD UTILITY FOR BETTER AUTHENTICATION 
15 
Enables innovation and revenue across B2C, B2B, B2B2C Ecosystems 
Strong FIDO Authentication is the 
eHealth 
gateway to… 
Federated Identity Services 
Home Automation 
Mobile / Retail Commerce and 
Payments 
The Internet of ThingsNew Cloud Services 
Much, much more... 
Ecosystems
FINGERPRINT SENSOR UPTAKE 
16 
iPhone 5s 
Galaxy S5 & Mini 
Galaxy Tab S 
iPhone 6 
“By 2017 there will over 990 million mobile devices (smart phones, phablets and 
tablets) with fingerprint sensors. This number is set to increase further by the 
following year when there will be well over one billion mobile devices – making 
fingerprint sensors a common feature in mobile devices.” 
Goode Intelligence, December 2013
MANY AUTHENTICATORS, MANY DEVICES… 
17
AUTHENTICATION IS THE GATEWAY 
TO USER EXPERIENCE 
Benefits 
• Service & Product Differentiation 
• Increased Brand Loyalty 
• Expanded Customer Revenue 
• New Partnership Opportunities 
Current Innovation Examples 
• Google – Personal Unlocking 
• Apple – TouchID + iTunes 
• PayPal – “Swipe to Pay” on Samsung S5, Tab S 
Lessons Learned 
• NFC + Softcard Wallet 
18 
Simpler, Faster, and Contextual Authentication 
Increases User Engagement and Satisfaction
NOK NOK’S S3 SUITE ARCHITECTURE 
19 
NOK NOK LABS 
3RD PARTY
DEPLOYED TODAY 
20 
Devices Customers 
S5 & Mini 
Tab S 
Pat 
Johnson 
pat@example.com 
Note 4
PARTNERS 
21 
Device 
Authenticator 
Secure Hardware
GSMA ‘MOBILE CONNECT’
HOW FIDO FITS INTO MOBILE CONNECT 
FIDO client in a 
TEE/SIM based 
config 
FIDO server 
hosted by 
MNO
MNO/IDP INFRASTRUCTURE 
NNL server 
MNO DEPLOYMENT 
Web Browser 
24 
FEDERATION INTEGRATION MODEL 
USER’S DEVICE 
RELYING PARTY’S INFRASTRUCTURE 
HTML 
Javascript 
Browser Extension 
NNL client 
Web Application 
Session 
Management 
Infrastructure 
Relying Party 
FIDO 
3rd party 
Federation Gateway 
(SAML, OpenID, etc.) 
IDP Adapter Plugin 
Authen4ca4on 
Registra4on
SECURE AUTHENTICATOR 
IMPLEMENTATION MODELS 
Trusted Execution Environment (TEE) 
FIDO Authenticator as Trusted Application (TA) 
User 
Verification / 
Presence 
Trusted 
UI 
eSE/SIM 
Attestation Key 
Authentication Key(s) 
Biometric Template(s) 
Implemented with NXP, 
Infineon & Oberthur 
Implemented with 
Trustonic
EXTENSIBLE AND FUTURE PROOF 
ARCHITECTURE 
New Authenticators 
New Devices 
New Use Cases 
Internet of Things 
Home Automation 
and more…
CONSUMER PREFERENCES 
PRIVATE & CONFIDENTIAL 
27
Q&A 
28
1 von 28

Recomendados

2014 IoT Forum_ Fido Alliance von
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido AllianceCOMPUTEX TAIPEI
15.7K views20 Folien
Bio-Authentication (FIDO) and PKI Trends in Korea von
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
3.6K views48 Folien
Fido U2F Protocol by Ather Ali von
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali OWASP Delhi
940 views23 Folien
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat... von
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
2.1K views25 Folien
Google FIDO Authentication Case Study von
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case StudyFIDO Alliance
1.3K views30 Folien
LINEのFIDO導入と将来展望 von
LINEのFIDO導入と将来展望LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望FIDO Alliance
1.6K views33 Folien

Más contenido relacionado

Was ist angesagt?

Market Study on Mobile Authentication von
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
775 views14 Folien
FIDO and Mobile Connect von
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
7K views14 Folien
Introduction to the FIDO Alliance von
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
10.7K views33 Folien
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview von
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
1.4K views17 Folien
Go passwordless with fido2 von
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2Rob Dudley
1.3K views48 Folien
FIDO Authentication Technical Overview von
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
448 views33 Folien

Was ist angesagt?(20)

Market Study on Mobile Authentication von FIDO Alliance
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance775 views
Introduction to the FIDO Alliance von FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance10.7K views
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview von FIDO Alliance
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance1.4K views
Go passwordless with fido2 von Rob Dudley
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley1.3K views
FIDO Authentication Technical Overview von FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance448 views
A Telco and End-user Perspective on the Authentication Journey von FIDO Alliance
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance327 views
Business Considerations for Deploying FIDO Authentication von FIDO Alliance
Business Considerations for Deploying FIDO AuthenticationBusiness Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO Authentication
FIDO Alliance757 views
FIDO & GSMA Mobile Connect von FIDO Alliance
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
FIDO Alliance1.9K views
Expected Use Cases of FIDO Authentication for Social Applications von FIDO Alliance
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
FIDO Alliance414 views
FIDO, Federation and the Internet of Things von FIDO Alliance
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
FIDO Alliance707 views
Worldpay – FIDO-enabled Point of Sale von FIDO Alliance
Worldpay – FIDO-enabled Point of SaleWorldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of Sale
FIDO Alliance1.1K views
Kookmin Bank FIDO Case Study von FIDO Alliance
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
FIDO Alliance447 views
Expected Use Cases of FIDO Authentication in Social Apps von FIDO Alliance
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
FIDO Alliance1.1K views
Technical Principles of FIDO Authentication von FIDO Alliance
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance1.2K views
NTT DOCOMO Deployment Case Study von FIDO Alliance
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
FIDO Alliance1.4K views
Google Case Study - Towards simpler, stronger authentication von FIDO Alliance
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance987 views
TrustBearer - CTST 2009 - OpenID & Strong Authentication von TrustBearer
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer3.1K views
WebAuthn and Security Keys von FIDO Alliance
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
FIDO Alliance2.6K views

Similar a FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs

Security & Seamless CX in User Authentication: How to Achieve Both? von
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
85 views52 Folien
Optimising mobile signature v4 von
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
1.1K views17 Folien
Deploying FIDO Authentication - Business Considerations von
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
716 views19 Folien
Catalyst 2015: Patrick Harding von
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
1.7K views36 Folien
Move your customer authentication to the next level! von
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!Ivona M
37 views49 Folien
Mature connections: 6 stages to IoT success von
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successSingtel
372 views15 Folien

Similar a FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs(20)

Security & Seamless CX in User Authentication: How to Achieve Both? von Ivona M
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M85 views
Deploying FIDO Authentication - Business Considerations von FIDO Alliance
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance716 views
Catalyst 2015: Patrick Harding von Ping Identity
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity1.7K views
Move your customer authentication to the next level! von Ivona M
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
Ivona M37 views
Mature connections: 6 stages to IoT success von Singtel
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
Singtel372 views
OpenID Connect: The Mobile Profile von Bjorn Hjelm
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
Bjorn Hjelm106 views
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington von CloudIDSummit
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit446 views
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa... von IRJET Journal
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal36 views
Learnings of how to simplifying io t solutions and securing business value von Dan Mårtensson
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan Mårtensson1.2K views
NFC & RFID: Enhancing the Customer Experience Near and Far von NFC Forum
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC Forum1.3K views
Reinventing Cybersecurity in the Internet of Things von Nirmal Misra
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra229 views
151022_oml_reinventing_cybersecurity_IoT_v1p von Stéphane Roule
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
Stéphane Roule146 views
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy von WSO2
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
WSO2820 views
Adopting A Zero-Trust Model. Google Did It, Can You? von Zscaler
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler1.5K views
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016 von Joseph Pindar
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Joseph Pindar82 views
Cisco Mobility - IBM & IDC event von Matteo Masi
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
Matteo Masi200 views
Meeting Mobile and BYOD Security Challenges von Symantec
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
Symantec2.3K views
Apps for everything Alec Saunders, QNX von appbackr
Apps for everything   Alec Saunders, QNXApps for everything   Alec Saunders, QNX
Apps for everything Alec Saunders, QNX
appbackr749 views
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident... von ForgeRock
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock302 views

Último

Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
30 views35 Folien
1st parposal presentation.pptx von
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptxi238212
9 views3 Folien
Top 10 Strategic Technologies in 2024: AI and Automation von
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
18 views14 Folien
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
33 views69 Folien
HTTP headers that make your website go faster - devs.gent November 2023 von
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
21 views151 Folien
handbook for web 3 adoption.pdf von
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 views16 Folien

Último(20)

Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
1st parposal presentation.pptx von i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn21 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
Special_edition_innovator_2023.pdf von WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
DALI Basics Course 2023 von Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Perth MeetUp November 2023 von Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price19 views
Data-centric AI and the convergence of data and model engineering: opportunit... von Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier39 views
Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Web Dev - 1 PPT.pdf von gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs

  • 1. FIDO & THE MOBILE NETWORK OPERATOR Alan Goode, Managing Director, Goode Intelligence Jamie Cowper, Senior Director, Nok Nok Labs
  • 2. THE AUTHENTICATION CHALLENGE: HOW DO WE KNOW WHO YOU ARE? 2 ?
  • 3. MODERN AUTHENTICATION NEEDS 3 COST PRIVACY SECURITY USABILITY INFRASTRUCTURE: EXISTING TECHNOLOGY AUTHENTICATION LEGACY
  • 4. LATEST RESEARCH 4 • What is the current Standard landscape for Authentication & identity? • What are the integration points between Identity & Authentication • How can MNO’s take advantage of the new opportunities in Authentication
  • 5. THE MOBILE NETWORK OPERATORS AND THE FUTURE OF AUTHENTICATION 11 November 2014 Alan Goode - Goode Intelligence
  • 6. 1 • Two inter-connected megatrends: • The rise of mobile computing • Cloud and SaaS • Mobile & Cloud – legacy authentication not fit for purpose • Failure of traditional of monolithic authentication solutions: • Passwords • Siloed 2FA • The need to support legacy IT
  • 7. 2 • Putting the mobile at the heart of authentication and identity • Industry standards and initiatives facilitating emergence of intelligent mobile-based authentication • OpenID Connect • SAML • GSMA Mobile Connect • FIDO • Leverage the security of the SIM and built-in features of mobile for authentication
  • 8. 3 • The first mile = using a mobile device as an authenticator • Leveraging native capabilities including biometrics • The second mile = connections to wider risk and fraud management and authorisation services • Importance of Identity Federation services • Authenticate once & then access multiple services • Vital to smoothly connect first and second miles • Seamless user experience
  • 9. 4 • GSMA Mobile Connect provides a framework for MNOs to deliver mobile-based authentication services • Opportunity to become a central part of modern authentication ecosystem • MNOs are logical owners of mobile authentication and can leverage existing components and infrastructure: • SIM • Subscriber Data
  • 10. 5 • First-to-market for FIDO Ready™ Authentication with S3 Authentication Suite • Powers fingerprint biometric authentication for Alipay and Paypal • Reference model for mobile-based authentication using FIDO standards • Leverages mobile device secure hardware
  • 11. Thank you. alan.goode@goodeintelligence.com www.goodeintelligence.com Twitter: @goodeintel
  • 12. THE FIDO APPROACH ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. 12 Standardized Protocols Local authentication unlocks app specific key Key used to authenticate to server
  • 14. MARKET DRIVERS FOR FIDO • Reduce transaction abandonment - Lower friction • Reduce transaction time • Reduce fraud • Increase trust in provider • Increase adoption of stronger adoption • Risk appropriate • Unified framework - Any device - Any authenticator • Future-proof architecture 14 Usability Security Cost
  • 15. BROAD UTILITY FOR BETTER AUTHENTICATION 15 Enables innovation and revenue across B2C, B2B, B2B2C Ecosystems Strong FIDO Authentication is the eHealth gateway to… Federated Identity Services Home Automation Mobile / Retail Commerce and Payments The Internet of ThingsNew Cloud Services Much, much more... Ecosystems
  • 16. FINGERPRINT SENSOR UPTAKE 16 iPhone 5s Galaxy S5 & Mini Galaxy Tab S iPhone 6 “By 2017 there will over 990 million mobile devices (smart phones, phablets and tablets) with fingerprint sensors. This number is set to increase further by the following year when there will be well over one billion mobile devices – making fingerprint sensors a common feature in mobile devices.” Goode Intelligence, December 2013
  • 17. MANY AUTHENTICATORS, MANY DEVICES… 17
  • 18. AUTHENTICATION IS THE GATEWAY TO USER EXPERIENCE Benefits • Service & Product Differentiation • Increased Brand Loyalty • Expanded Customer Revenue • New Partnership Opportunities Current Innovation Examples • Google – Personal Unlocking • Apple – TouchID + iTunes • PayPal – “Swipe to Pay” on Samsung S5, Tab S Lessons Learned • NFC + Softcard Wallet 18 Simpler, Faster, and Contextual Authentication Increases User Engagement and Satisfaction
  • 19. NOK NOK’S S3 SUITE ARCHITECTURE 19 NOK NOK LABS 3RD PARTY
  • 20. DEPLOYED TODAY 20 Devices Customers S5 & Mini Tab S Pat Johnson pat@example.com Note 4
  • 21. PARTNERS 21 Device Authenticator Secure Hardware
  • 23. HOW FIDO FITS INTO MOBILE CONNECT FIDO client in a TEE/SIM based config FIDO server hosted by MNO
  • 24. MNO/IDP INFRASTRUCTURE NNL server MNO DEPLOYMENT Web Browser 24 FEDERATION INTEGRATION MODEL USER’S DEVICE RELYING PARTY’S INFRASTRUCTURE HTML Javascript Browser Extension NNL client Web Application Session Management Infrastructure Relying Party FIDO 3rd party Federation Gateway (SAML, OpenID, etc.) IDP Adapter Plugin Authen4ca4on Registra4on
  • 25. SECURE AUTHENTICATOR IMPLEMENTATION MODELS Trusted Execution Environment (TEE) FIDO Authenticator as Trusted Application (TA) User Verification / Presence Trusted UI eSE/SIM Attestation Key Authentication Key(s) Biometric Template(s) Implemented with NXP, Infineon & Oberthur Implemented with Trustonic
  • 26. EXTENSIBLE AND FUTURE PROOF ARCHITECTURE New Authenticators New Devices New Use Cases Internet of Things Home Automation and more…
  • 27. CONSUMER PREFERENCES PRIVATE & CONFIDENTIAL 27