SlideShare a Scribd company logo
1 of 18
Download to read offline
GSMA
N O R D I C I A M C O N F E R E N C E 2 0 1 8
Marta Ienco, Head of Governments and Regulatory Affairs, Identity Programme
EIDAS-MOBILE CONNECT PILOT:
How To Combine Cross-border eID Recognition With
Convenience For Users And Online Services
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
What is the GSMA?
49
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
1. Digital is everywhere – and mobile is everything;
valuable services are turning digital (and mobile) -
globally
2. Security in the digital world is not up the task but
alternatives are growing – increasingly require
trusted identities
3. Major regulatory changes underway
• Europe: eIDAS, PSD2, GDPR, 5G Networks and
IOT
• US: NIST recommendations 800-63
• UNCITRAL: Legal issues for IdM and trust
services
Major market trends are driving the need for secure mobile identity
• 5bn mobile subscribers
globally, with Asia
representing 60%1
• Mobile identity industry is
estimated to be worth 87.9bn
by 20201.
• Average cost of security is
$141 per record stolen2.
• Businesses have lost up to
40% of their revenue in
customer churn due to
negative brand reputation3.
[1] GSMA Intelligence, 2017.
[2] IBM Global Report – cost of data breaches. SOURCE: https://www.ibm.com/security/data-breach/
[3] http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html
Identity– Mobile Connect50
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
• Simple, secure and convenient access to online services
• Combines the user’s unique mobile number, optional PIN and
multi-factor authentication to:
• Authenticate users online
• Authorise digital transactions and payments
• Verify identity
• Confirm attributes about user or device
• Strong positive user feedback on usefulness and user
experience resulting in significant take-up
Mobile Connect strengthens Operators’ end-user relationship
and secures a key position in digital services
A mobile operator facilitated global digital identity solution
Identity– Mobile ConnectIdentity– Mobile Connect51
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
eIDAS addressable market: Mobile Identity and Mobile Connect
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.53
A multi-stakeholders public and private sector cooperation employing the requirements of a
commercially viable, government backed solution, demonstrating how mobile operators can
support via Mobile Connect the deployment and scaling of eIDAS within two or more
European countries, positioning
Mobile Connect as the first private-sector cross-border service authentication solution that
meets the technical requirements of eIDAS.
Key outcomes
1. Deployed Mobile Connect authentication process and validation of the citizen’s digital identity across
France, Norway and Sweden via the eIDAS framework.
2. Developed and tested eIDAS Reference architecture to demonstrate the interoperability of Mobile
Connect and private sector service providers with eIDAS nodes integration requirements in a test
environment.
3. Showcased a owner centric approach to test Mobile Connect secure authentication and eIDAS identity
services to access healthcare private sector services in a Internet of Things application environment.
eIDAS and Mobile Connect cross-border pilot
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.56 Identity– Mobile Connect
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity– Mobile Connect57
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
eIDAS and Mobile Connect
leverage the synergies between robust
and secure remote identity proofing
technologies with the security and
convenience of strong authentication
in a mobile environment for both
public and private sector use cases
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
The use case: eHealth cross-border services
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity – Mobile Connect60
eIDAS pilot endorsement
• Report published on gsma.com
resources page
• Announcement posted on
European Commission website
• News article written by the
European Commission about the
eIDAS pilot
• Report hosted on European
Commission website
• eIDAS blog posted on
gsma.com/identity
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Mobile Connect is being deployed for government services
France – French government with Orange France on accessing government services
using Mobile Connect
Spain – Use of Mobile Connect to log into digital public services in Catalonia
UK – user identity verification service to confirm identity for e-Government services
EU – CEF funded project on transferring identity cross-border to open bank account
(eIDAS)
US – National Institute of Standards and Technology – proof of concepts using Mobile
Connect for authentication, identification and attribute verification (financial services, consumer
goods, health, e-Government)
EU – eIDAS Phase I European-wide solution for log-in to government services
EU – eIDAS Phase II European-wide solution for public and private online healthcare
services
Identity– Mobile Connect61
If you would like more information, please contact the GSMA via:
mobileconnect@gsma.com
+44 (0) 20 7356 0600
www.gsma.com/identity
Follow the GSMA on Twitter: @GSMA
GSMA London Office
The Walbrook Building, 25 Walbrook, London EC4N 8AF
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Thank-you
Marta Ienco: mienco@gsma.com
END OF PRESENTATION
COFFEE BREAK

More Related Content

What's hot

The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020OpenID Foundation Japan
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID - itsme
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital idCapgemini
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)CM.com
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Secure Identity Alliance
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011kantarainitiative
 

What's hot (20)

The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
 
Social research mobile id march 2017
Social research mobile id march 2017Social research mobile id march 2017
Social research mobile id march 2017
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital id
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Loqr
LoqrLoqr
Loqr
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 

Similar to GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services

[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile ConnectFIDO Alliance
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO Alliance
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...drctan
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsPrayukth K V
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?O2 Business UK
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaThibault Cantegrel
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsFIDO Alliance
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfMatthew Allen
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificOrange Business Services
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013Alix Murphy
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2CMR WORLD TECH
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
Mobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River CrossingMobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River Crossingjapie swanepoel
 

Similar to GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services (20)

[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of Things
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
M commerce
M commerceM commerce
M commerce
 
Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standards
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Mobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River CrossingMobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River Crossing
 

More from Ubisecure

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use CasesUbisecure
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-OnUbisecure
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-ServiceUbisecure
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business IdentitiesUbisecure
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of AuthorityUbisecure
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectUbisecure
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Ubisecure
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMUbisecure
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessUbisecure
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!Ubisecure
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationUbisecure
 

More from Ubisecure (16)

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business Identities
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 

GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services

  • 1. GSMA N O R D I C I A M C O N F E R E N C E 2 0 1 8
  • 2. Marta Ienco, Head of Governments and Regulatory Affairs, Identity Programme EIDAS-MOBILE CONNECT PILOT: How To Combine Cross-border eID Recognition With Convenience For Users And Online Services
  • 3. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. What is the GSMA? 49
  • 4. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. 1. Digital is everywhere – and mobile is everything; valuable services are turning digital (and mobile) - globally 2. Security in the digital world is not up the task but alternatives are growing – increasingly require trusted identities 3. Major regulatory changes underway • Europe: eIDAS, PSD2, GDPR, 5G Networks and IOT • US: NIST recommendations 800-63 • UNCITRAL: Legal issues for IdM and trust services Major market trends are driving the need for secure mobile identity • 5bn mobile subscribers globally, with Asia representing 60%1 • Mobile identity industry is estimated to be worth 87.9bn by 20201. • Average cost of security is $141 per record stolen2. • Businesses have lost up to 40% of their revenue in customer churn due to negative brand reputation3. [1] GSMA Intelligence, 2017. [2] IBM Global Report – cost of data breaches. SOURCE: https://www.ibm.com/security/data-breach/ [3] http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html Identity– Mobile Connect50
  • 5. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. • Simple, secure and convenient access to online services • Combines the user’s unique mobile number, optional PIN and multi-factor authentication to: • Authenticate users online • Authorise digital transactions and payments • Verify identity • Confirm attributes about user or device • Strong positive user feedback on usefulness and user experience resulting in significant take-up Mobile Connect strengthens Operators’ end-user relationship and secures a key position in digital services A mobile operator facilitated global digital identity solution Identity– Mobile ConnectIdentity– Mobile Connect51
  • 6. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. eIDAS addressable market: Mobile Identity and Mobile Connect
  • 7. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.53 A multi-stakeholders public and private sector cooperation employing the requirements of a commercially viable, government backed solution, demonstrating how mobile operators can support via Mobile Connect the deployment and scaling of eIDAS within two or more European countries, positioning Mobile Connect as the first private-sector cross-border service authentication solution that meets the technical requirements of eIDAS. Key outcomes 1. Deployed Mobile Connect authentication process and validation of the citizen’s digital identity across France, Norway and Sweden via the eIDAS framework. 2. Developed and tested eIDAS Reference architecture to demonstrate the interoperability of Mobile Connect and private sector service providers with eIDAS nodes integration requirements in a test environment. 3. Showcased a owner centric approach to test Mobile Connect secure authentication and eIDAS identity services to access healthcare private sector services in a Internet of Things application environment. eIDAS and Mobile Connect cross-border pilot
  • 8. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
  • 9. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
  • 10. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.56 Identity– Mobile Connect
  • 11. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity– Mobile Connect57
  • 12. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. eIDAS and Mobile Connect leverage the synergies between robust and secure remote identity proofing technologies with the security and convenience of strong authentication in a mobile environment for both public and private sector use cases
  • 13. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. The use case: eHealth cross-border services
  • 14. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity – Mobile Connect60 eIDAS pilot endorsement • Report published on gsma.com resources page • Announcement posted on European Commission website • News article written by the European Commission about the eIDAS pilot • Report hosted on European Commission website • eIDAS blog posted on gsma.com/identity
  • 15. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. Mobile Connect is being deployed for government services France – French government with Orange France on accessing government services using Mobile Connect Spain – Use of Mobile Connect to log into digital public services in Catalonia UK – user identity verification service to confirm identity for e-Government services EU – CEF funded project on transferring identity cross-border to open bank account (eIDAS) US – National Institute of Standards and Technology – proof of concepts using Mobile Connect for authentication, identification and attribute verification (financial services, consumer goods, health, e-Government) EU – eIDAS Phase I European-wide solution for log-in to government services EU – eIDAS Phase II European-wide solution for public and private online healthcare services Identity– Mobile Connect61
  • 16. If you would like more information, please contact the GSMA via: mobileconnect@gsma.com +44 (0) 20 7356 0600 www.gsma.com/identity Follow the GSMA on Twitter: @GSMA GSMA London Office The Walbrook Building, 25 Walbrook, London EC4N 8AF Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. Thank-you Marta Ienco: mienco@gsma.com