Mobile Identity Management

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
B-CERB complete protection against phishing copyright 2008 by Wheel.
Internet Applications
Taxpayers registration and e-services provided by the Estonian Tax and Customs Board Karin Aleksandrov Chief Expert Service Management Department.
Strong Mobile Authentication in Finland (MPKI, WPKI) Special Discussion Topic Kantara Initiative Telco Identity Working Group Prepared by: Keith Uber Ubisecure.
BUSINESS PLAN Project Brief: Facilitating general public to have Cash-in-hand by converting mobile phone credit to cash. And transfering the credit to.
Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
FinTUG/VNUG 13 November Silja Serenade Secure real-time multi channel electronic payment service with NonStop By Ari Viitanen.
Siemens IT Solutions and Services Porvoo 12 – Grosseto, October 2007 Update on EU Common Specifications.
The European Activities of BR Communication e-CODEX e-Justice Communication via Online Data Exchange Bucharest, June 14 th 2013.
M-PAYMENT SYSTEM (e–WALLET ).
Research, Development, and Evaluation Commission Department of Information Management Research, Development, and Evaluation Commission The Executive Yuan,
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
WPKI available technology diagram and the business model
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Secure Communication Architectures.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Vasco Product Portfolio Eric Gabrys – Product Manager The world ’ s leading software company specialized in Internet Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
De Nederlandsche Bank Eurosysteem Card Payments and Internet Banking Thijs Kettenis 2nd Conference of the Macedonian Financial Sector on Payments and Securities.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Secure Electronic Transaction (SET)
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Internet Security for Small & Medium Business Week 6
PKI interoperability and policy in the wireless world.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Two Factor Authentication On Mobile, Solution for tomorrow? Nicolas Fort, Product Manager Solution for today !
Author: Ingelin Olsen Content Strategy- mission and vision Functionality Demo Summary.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
TAG Presentation 18th May 2004 Paul Butler
Chapter 5 – E-commerce and Enterprise Systems
CENTRALIZED AUTHENTICATION SERVICES THROUGH MOBILE PHONE
TAG Presentation 18th May 2004 Paul Butler
EMV® 3-D Secure - High Level Overview
Public Key Infrastructure (PKI)
BY GAWARE S.R. DEPT.OF COMP.SCI
October 27, 2016 EMV 3DS Seizing the opportunity to enhance security and deliver a great consumer experience September 22, 2018.
Leveraging on EMV cards for One-Time-Password authentication
Presentation transcript:

Mobile Identity Management Mobile Payments Mobile Identity Management Mobile Signatures © Copyright Valimo Wireless Ltd, 2006

Valimo Wireless …is a Finnish company specialized in developing software for performing and securing transactions in fixed and mobile networks …main customer segments are telecom operators, large enterprises and service providers in finance, government, health care, betting and media

Topics Need Key Drivers for Mobile Signature Services - Bank - Mobile Operator - Government Short Overview of the ETSI — MSS Concept How the SIM Card and Mobile Network Operator's Infrastructure Plays a Key Role User experience

Urgent need! Industry has a demand to know the user and get his approval for actions. We must be sure that the user is who he claims to be. We must get user’s approval in a way that user can not claim afterwards that it did not happen. Needs to support mass-market.

Key Stakeholders Bank Mobile Operator Government Consumer Internet Bank & ePayment Services Customer base Mobile Operator Network Infrastucture Subscribers Government More and more public services moving to Web. Strong authentication a must! Consumer User of the value added services

Valimo Need & Key Drivers Banks

VISA & Mastercard fraud figures 40 million credit cards hacked in 2005 Breach at 3rd party payment processor affects 22 million VISA cards and 14 million MasterCards 70% of the losses caused by use of counterfeit cards e-Commerce is the next target Source: Jani Kallio, Security Manager, Luottokunta Eurocard Oy, Finland

Online fraud figures in UK 2004 frauds £5 million 2005 £30 million 2006 EMV launched, POS card frauds going rapidly down, Online services on target Latest news (BBC1 Nov. 7th): Online frauds already doubled comparing to 2005 What it will be at the end of 2006? Source: FSA & BBC, UK

Net users want banks to do something “What could your bank do to boost your confidence in online banking security?” Source: Forrester UK Internet User Monitor, Q2 2005 Base: British Net users

Online Banking Security Concerns

Key Drivers, Banks The mobile phone is a trusted device that provides anywhere, anytime access to confidential, personal and business content and guarantees integrity and non-repudiation of electronic transactions

Key Drivers, Banks Authentication through different channel than the service Makes phishing and Man-in-the-Middle impossible

Key Drivers, Banks Legally binding transactions and agreements by mobile phone. (non-repudiation)

Security Method Analyze A = 1234 D=8273 B = 2345 E=3554 C = 5635 F=6455   OTP via SMS Mobile Signature Hardware token PIN/TAN list Device required GSM phone people has it already GSM phone + PKI SIM people has it and operator manage SIM Separate token Bank has to manage Separate list / mailing Multi application and multi-service channel usage YES - difficult in mobile channel and mobile applications YES – all channels all applications Only for one bank or application limitation with usability of channels Only for one bank or application, usability low – all channels User experience Requires retyping of a different password every time Requires entering the same Authentication #PIN every time Requires retyping of a different number every time Carry around requirement Mobile Phone The token (single purpose) The password-list (single purpose) Customer Service Support No Extra Cost All in operator’s responsibility The issuing bank’s responsibility Limiting features Function requires a mobile phone subscription and network availability Function requires a mobile phone subscription With PKI SIM and network availability Battery expiry Synchronize pins Distribution / support issues Can be copied, list need to be renewed. Phishing & man-in-middle – with users (?) of confidence Distribution costs No Costs Existing SIM logistics Expensive Continuous Mailing Costs (single purpose)

Authentication Methods Costs (annum) PIN/ TAN OTP/ OTC MSS HW Token SW Token Smart Card COST PER YEAR PER USER € 13 € 15 € 12 € 35 € 50 € 100 € USABILITY LOW MEDIUM HIGH Source: Entrust and MSS business model security cost analyze, 10 000 users, 3 year period

Benefits for Bank Increased security level Reduced cost Two factor security Reduced cost No dedicated hardware tokens, scratch-cards or lists Lower administration and maintenance costs with one solution Promote more self service, lower transaction costs Potential for increased revenue Value-added services Authorization for 3. parties Increased consumer convenience Leverages mobile device Simple user interaction Cross channel Same authentication solution for all access points (services) Internet, mobile, digital tv, phone Cross transaction Same solution for all types of transactions Login, payment, workflow approval, digital signing Security for all parties Customer identification Bank identification Confidentiality Non-repudiation of transaction

Summary of eBanking eBanking is usually the most attempting application at starting point with Wireless PKI: Banks have huge need for fraud prevention Security level should be as high as possible Security methods should be cost effective Constant support work should be at minimum level Easy to adopt and to use for customers Tunnistaminen Sisäänkirjautuminen web-pankkiin, -kauppaan, … Sisäänkirjautuminen yrityksen intranettiin, sähköpostiin, … Asioint-kumppanin tunnistaminen: puhelu, web, … Maksaminen Maksun vahvistus web-pankissa, -kaupassa, etc Tilauksen (maksun) vahvistus web-kaupassa, puhelimessa, etc Dokumentin allekirjoitus Sähköinen allekirjoitus Kaiken perusta All above is pointing towards to WPKI

Valimo Need & Key Drivers Mobile Operators

Need! After recent years heavy investments to 3G licenses/network development and heavy price competition, operators are in deep need of new revenue streams New innovative value added services are the only way to generate such streams Services must support mass-market most widely, meaning corporate, governmental and financial market applications At the same time, number transferability has become a big influencer around Western Countries, causing rising churn rate

Key Drivers, Mobile Operators Mobile operator needs to offer many new high security services Business and consumer customers

Key Drivers, Mobile Operators SIM-card with digital keys linked to a mobile signature service may reduce frequent changes of a mobile operator

Mobile PKI Public Key Infrastructure is a ideal technical solution for this need. Everyone has Mobile Phone – implementing PKI on SIM/UICC card is the ideal solution. PKI on Mobile Terminal is called Wireless PKI or WPKI and sometimes Mobile PKI. Mobile PKI is just an enabler to services.

Valimo Need & Key Drivers Government

Key Drivers, Government All possible Governmental & Municipal services will be on Web Any service containing sensitive information (financial, health, etc.) must have strong authentication in place National level eID is/will be based on PKI solution

Key Drivers, Government eIDM Roadmap for EU eIDM 2006 Manchester Declaration, setting objectives for a EU eIDM interoperability and mutual recognition of national eIDM 2007 Common spesifications for interoperable EIDM and call for large scale pilots 2008 Large scale pilots of eIDM in cross-border services 2009 eSignatures in eGovernment, undertake review of take-up in public services 2010 Review the uptake by the Member States, interoperable eIDM at work Countries in piloting phase: Austria/Belgium (leading countries), UK, Germany, Italy, Poland, Netherlands, Portugal, Malta, Estonia + possibly others

ETSI MSS (Mobile Signature Service) Valimo Mobile PKI ETSI MSS (Mobile Signature Service)

Mobile PKI Public Key Infrastructure is a ideal technical solution for this need. Everyone has Mobile Phone – implementing PKI on SIM/UICC card is the ideal solution. PKI on Mobile Terminal is called Wireless PKI or WPKI and sometimes Mobile PKI. Mobile PKI is just an enabler to services.

Mobile PKI In year 2000 Valimo started to develop Mobile Signing solution By that time, no standards for interfaces were existing, solutions were only proprietary First commercial deliveries 2002 2002 ETSI published MSS Standards ETSI 102 206 ETSI 102 207 ETSI 102 204 ETSI 102 203 Now all running systems are upgraded to ETSI Standards based solution

Mobile PKI / MSS

Simplicity in Authentication All You need for secure authentication is one SIM-card. Insert your Authentication PIN code: ****

Legally Binding Legally binding agreements by mobile phone. The non-repudiation Official Identity (issued by Government with Mobile Operators) Or Corporate Identity (issued by Corporate with Mobile Operator) Insert your Signature PIN code: ******

Hiding Mobile PKI Complexity Simultaneous support for multiple Certificate Authorities No technology or policy constraints

ETSI MSS ETSI MSSP (Mobile Signature Service Provider) is based on four entities: - Home Entity (has connection to individual clients) - Acquiring Entity (acquires signatures) - Routing Entity (handles roaming in multiple operator environments) - Verification Entity may be as part of first two. All above may be combined together or alternatively be separate entities (like for example a bank having Acquiring Entity which connects to operator’s Home Entity) ETSI Standards include interfaces between entities and for integrating any application to use mobile signature service

Roles in ETSI 102 specification SIM CA Registration processes CA Registration processes DP OTA MSS HOME Entity MSS Roaming Entity MSS Acquiring Entity Relying Party Service Provider GW WAP gateway PPG ETSI 102 207 Roaming ETSI 102 204 WEB interface OTA DP MSS HOME Entity MSS Roaming Entity MSS Acquiring Entity Relying Party Service Provider GW WAP gateway PPG SIM CA Registration processes CA Registration processes ETSI 102 – Specification for Mobile Signature Services

MSSP Signature Roaming

Valimo Mobile Operator’s Key Role

Solution infrastructure

Operator’s Key Role Everything starts from SIM-card where key-pairs are in tamper-proof storage and signature hash is generated Operator owns SIM-cards and have access to them No third party direct access to SIM-card will be allowed by any operator It would be possible for phone manufacturers to include as tamper-proof key storage as SIM-card by having a chip on their phone’s chipset, but for guite obvious business reasons it will most unlikely happen

Issuing SIM/UICC card containing Private Keys are normally issued by Mobile Operators Identity is based on Certificates issued by CAs. CA can be Official Governmental CA Mobile Operator CA Corporate CA 3rd party CA Certificates are not on SIM/UICC, they are on CA’s directory on the network.

Valimo User experience eBanking

eBanking, Authentication End user is accessing bank website with his UserID Bank system sends authentication request to Operator’s WPKI service, based on user credentials (phone number) User enters his authentication PIN Access to the bank service is allowed

eBanking, Transaction Validation Bank sends validation request through Operator’s WPKI service The signature process is WYSIWYS (what you see is what you sign) Allows 160 character messages All messages can be customised

An infrastructure setup : Bank scenario Mobile Phone Subscriber Bank Network End UserNotebook Internet Bank System Valimo iD Server Financial Application Provider in ETSI terminology MSS XML-messages using SOAP over HTTP PKI-enabled Mobile Phone Valimo Validator - MSSP (Acquiring) MSS XML-messages using SOAP over HTTP (SSL-secured) Mobile Operator Domain Mobile Network Valimo Validator - MSSP (Home)

eBanking, Entities & Action Flow Entities involved BANK Action Flow Authentication Valimo iD Server END USER Web Bank CA Bank’s own or Trusted Third Party User Database Certificate Repository OPERATOR End user browses to Web bank: Web bank requests Valimo iD Server for authentication iD Server sends signing request to Validator – MSSP Validator passes request to end user’s handset (SIM) via OTA End user inserts signing PIN Signature hash is send to MSSP MSSP gets users certificate from CA and sends it along with signature hash to iD Server iD Server validates hash and certificate User is granted to access Registration Server Action Flow Registration Validator - MSSP Messaging Server

mobile phone is a trusted device, providing Our Mobile Vision mobile phone is a trusted device, providing anywhere, anytime access to confidential personal and business content, and easily performs secure transactions. THANK YOU! Erkki Saharanta, Valimo Wireless Ltd +358 44 344 5564 erkki.saharanta@valimo.com www.valimo.com