Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Microsoft Passport Waldemar Swiercz.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Official Portal of Turkish Healthcare Travel Council Turkey’s Medical Tourism Reservation Portal.
Certificate and Key Storage Tokens and Software
By : Injeong Lee 9CC. 1. Creator of this Presentation   2. What is Digital Security?   3. Why is Digital Security important?   4. How does Digital.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Internet Security for Small & Medium Business Week 6
Innovative ITS services thanks to Future Internet technologies ITS World Congress Orlando, SS42, 18 October 2011.
IoT, Big Data and Emerging Technologies
An innovative, electronic personal health record Overview.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Electronic Banking & Security Electronic Banking & Security.
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Virtual Private Networks
Intro to Kinian technology
CLOUDENTIFY.
Reliable VPN Solutions IN IOT Environments
DATA SECURITY FOR MEDICAL RESEARCH
Do you know who your employees are sharing their credentials with
Information Technology Deanship
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Secure Electronic Transaction
How to Protect Yourself from ID Theft and Social Engineering
Virtual Private Networks (VPN)
Public Key Infrastructure (PKI)
BY GAWARE S.R. DEPT.OF COMP.SCI
An ICT role in key sectors of development of society.
Best mobile app development company in Madurai
Driving the UK towards zero emissions
Mobile Commerce and the Internet of Things
Internet of Things (IoT)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Commerce Development CZ&SK
What Is Tapestry? An Online learning journal system.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Modular Object Scanning Technology (MOST)
Installation & User Guide
What Is Tapestry? An Online learning journal system.
SiMobility Innovative technology that moves you.
Cengage Learning: Computer Networking from LANs to WANs
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Unit 8 Network Security.
ITB Identity Solutions.
Global megatrends (relevant for our business)
Company Name | Phone Number | Website | Address
Mobile Commerce and Ubiquitous Computing
Topic 12: Virtual Private Networks
Taxi Booking App Development Introduction About Taxi App When every start-up or business owner was seeking for the solution, Uber.
Hazelwood Schools Wednesday 2nd October 2019.
Presentation transcript:

Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect

Productivity User experience M2M & IoT Offering Renewal My Data, Open Data, Big Data Cloud Software defined networks Mobility Unified communications Business innovations Business opportunities Technology enablers Growth Business models

Digital Identity and Other Trust Services Digital Identity and Other Trust Services

Sonera Certification Authority (CA) Web Trust audited since 2003 Servers identity (SSL certificates) VPN – gateway certificates Datanet – encryption Managed LAN – device certificates Skype 4 Business – encryption – encryption TS Cloud – device certificates Sonera Mobile ID – Digital ID in user’s mobile phone Sonera Identifications Service, powered by Mobile Connect (cross border trust)

Digital identity allows a person to prove her identity in digital services. Mobile ID + PIN Physical IdentityDigital Identity + Passport Driver’s license Card (+ PIN) Something you have (+ know)

Consent & Control Secure Access Click & Collect Shopping Call Center Banking / Payment Data sharing

- LEVEL OF SECURITY + - EASE OF USE + Digital Authentication Options Facebook login One-time password Smart card Online registration/login form SMS One-time password Mobile ID

Case Mobility as a Service

New better travel chains  MaaS (Mobility as a Service) Today we own vehicles (car, bike, motorcycle etc). We buy separate tickets for mass or private transportation. MaaS means buying Mobility as a Service. Target: By combining several vehicles and ways of travelling together we are able to tailormade door-to-door journey experience. The travelling experience is complete, flexible, cost-effective and easy to manage and purchase.

Easy and effortless traffic - Sonera Reissu service Routing; start point, destination, time, passengers. You get best mix of transportation options E-tickets Payments through credit card, stored with your account Shared taxi by default, private taxi as an option Personal data Anonymous data  development of routing, shared resources, time tables, quality of service, pricing

Case e-Health

Click to edit Master title style The change in care and healthcare From institution to home

Click to edit Master title style Sensors and health technology – Threat or support?

Click to edit Master title style Sonera in healthcare Wellness Open Care Hospitalized Care Acute medical care Specialized care Rehab Home Open medical care Inside the care Care Gray boxes indicate conservation areas with great potential for rapid efficiency gains through digital eHealth solutions Homecare Home Prevention and health care Before medical care Monitoring the health process Care at a distance Care for elderly

New business opportunities Data, including My Data, offers fuel for innovations and renewal Service design Co-creation with users Building trust is crucial Privacy protection, consent of usage and integrity of data My Data completes...My Identity!

Thank you! Contact please Pekka Turpeinen