TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective.

Slides:



Advertisements
Similar presentations
Copyright © Jigsaw 1 Marketing Cloud Manifesto First Draft Submitted by Kevin Akeroyd COO/CMO JigsawOctober 21, 2009.
Advertisements

Time is of the Essence The Real Estate Industry has the opportunity to Take Back Its Future. Today, MLS is not the only way to gain exposure for listings.
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary December 2010 Irvine, CA – PWG Meeting Ira McDonald (High.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary and IDS WG TCG Activity Summary August 2010 Bagsvaerd, Denmark – PWG Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 10 June 2010 Rochester, NY – PWG F2F Meeting Ira McDonald.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 7 April 2010 Camas, WA – PWG F2F Meeting Ira McDonald (High.
1Copyright © 2011, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary May 2011 Webster, NY – PWG Meeting Ira McDonald (High North.
Proprietary and confidential for Client/Partner. © 2004 INTENT MediaWorks, LLC. All rights reserved. All registered trademarks are the property of their.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
1 2 nd Shanghai, 19/02/06 Architecture for Next Generation Grids Kostas Tserpes, NTUA Shanghai, 20th of February 2006.
1 Supporting the Dreams David M. Kennedy Senior Programme Manager EURESCOM
Intel Transforming Education through Technology Name of Presenter.
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Business Development Suit Presented by Thomas Mathews.
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco Partner Plus: Premium Enablement Accelerate Your Competitive Edge.
Open Solutions for a Changing World™ Copyright 2005, Data Access Worldwide June 6-9, 2005 Key Biscayne, Florida Crystal Reports XI Environment, Features.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
XBRL: Harness the Digital Power XBRL: Decision Making in a Digital Economy How XBRL Will Make a Difference.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Introducing Open Platform for NFV Please direct any questions or comments to 1.
Cloud Usability Framework
INTERNET and CODE OF CONDUCT
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© Copyright High Performance Concepts, Inc. 12 Criteria for Software Vendor Selection July 14, 2014 prepared by: Brian Savoie Vice President HIGH.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
QuestDirect.org Understand Your Support Options and What They Mean To Your Organization’s Internal Roadmap.
An Enterprise Platform Copyright © Impact Technologies Group, Inc. | All Rights Reserved | | Ph:
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Big Picture Governments, corporations & consumers are moving to open standards Drivers are pragmatic concerns of cost, efficiency and control.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
 2007, Verizon. All rights reserved. Advanced Emergency Network Capabilities & Communications Solutions Presentation to The Joint Advisory Committee on.
Microsoft Dynamics AX Name Title Microsoft Corporation Financial Management.
Aiia : voice of the digital economy ASR: voice of services in Australia Presented by Kaaren Koomen Director, Australian Services Roundtable Director (Alternate),
Security Vulnerabilities in A Virtual Environment
Emtec, Inc. Proprietary & Confidential. All rights reserved Implementing PeopleSoft v9.2 During the Age of the Cloud September 30, 2014.
Digital Ecosystems Re-tuning the user requirements after 3 years Digital Ecosystems Re-tuning the user requirements after 3 years Towards Business Cases.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
<Insert Picture Here>
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
August 3-4, 2004 San Jose, CA Panel Session: The Consumer VoIP ‘Food Chain’ Date: Wednesday, August 4, 2004 Time: 4:15 – 5:00 PM.
Safe’n’Sec IT security solutions for enterprises of any size.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
Reach us at Call: | Visit:
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Chapter 1 The Nature of Software
Chapter 1 The Nature of Software
Chapter 1 The Nature of Software
Operationalize your data lake Accelerate business insight
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Presentation transcript:

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #1 Security in a Mobile World Mr. Janne Uusilehto Chairman of TCGs Mobile Phone Work Group Head of Nokia Product Security iX Conference 2007 Singapore

This slide set has been prepared to represent Trusted Computing Groups Mobile Phone Work Group, which is chaired by Janne Uusilehto (Nokia). This slide set is intended for external presentations, e.g. for analysts, press, industry influencers, etc. that are relevant to Trusted Computing Group and its Mobile Phone Work Group. To the event organizer: never give out hard/paper or soft copies, i.e. file in any electronic form. Please treat this document as confidential, and delete all copies from computers and other devices after the presentation is done. Pictures of these slides (originally in the slides 3, 5, 11, 12) are property of Jyrki Kallinen, Nokia (©Jyrki Kallinen). Taking copies as well as further distribution of these pictures, covering all methods such as hard and soft copies, is prohibited. All rights reserved. Document owner: Jyrki Kallinen (Nokia). Instructions for the event organizer and speaker

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #3 Mobile Generation Mobile Revolution TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners.

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #4 IDC agrees that there is unlikely to be a major outbreak until the start of 2008 "Despite this intense vendor - and media-driven speculation - the necessary conditions required for viruses or worms to pose a real rapidly spreading threat to more than 30 percent of enterprise mobile devices will not converge until year-end 2007 (Gartner) "A lot of this (cell phone attacks) is hyped to create a market that doesn't exist," said Neil MacDonald, group vice president and research director at Gartner Inc. "The market will exist eventually because the devices are becoming more powerful, but the threat today is minimal and overblown." Source: Eweek.com; News.com The Facts Behind the Hype…

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #5 We all are consumers… TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners.

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #6 Allows the industry to pool scarce resource of top experts, prioritize key issues, and enable wider peer review for flaws Creates a broader base of customers for the supply chain, eventually lowering costs and speeding time to market Prevents fragmentation, enhances interoperability, ensures better upgradeability and reduces R&D costs Enables development of more sophisticated, value-added services Increases consumers confidence that their devices will work as intended Helps to prevent virtual and physical theft of content and data and unauthorized use Lowers cost and speeds adoption of new systems, meaning users get more features and better security at lower costs Enables better integration between work and leisure time to consumers Why to Standardize Security?

Trusted Computing Group (TCG) and Mobile Phone Working Group (MPWG) The Trusted Computing Group (TCG) is a non-profit organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies TCG provides reasonable and non-discriminatory (RAND) patent licensing policy between Members MPWG works on the adoption of TCG concepts for mobile devices to enable different business models in market environment of open terminal platform TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners.

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #8 Unveiling Mobile Trusted Module (MTM) The worlds first open security standard for Mobile Trusted Platforms (MTP), published today on 21 June 2007 Result of well-coordinated cross-industry collaboration between leading companies MTM is cost-effective, transparent to users, reasonably implemented and interoperable MTM provides mobile security that is embedded in the device architecture and interoperable with the existing trusted computing framework (PCs) MTM enables robust infrastructure to develop sophisticated, value-added services to consumers, professional users, enterprises, industry, governments, etc.

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #9 Mobile Trusted Module Ecosystem Mobile Trusted Module embedded in its user environment MTM is not an isolated entity inside the mobile device. It communicates externally, protecting both users and service providers interests. Software downloads, mBanking and user privacy are good examples of integrated ecosystem use cases MTM Other Advanced Services Financial, health care, and other sectors Solution Development Existing Trusted Platforms and Architectures Platform Development Operators and Carriers Silicon Chip Providers Mobile Phone Vendors Consumers Enterprises Industry Governments USERS MTM EMBEDDED PLATFORM EMBEDDED PLATFORM Source: Jyrki Kallinen, Nokia

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #10 Mobile Trusted Module Use Cases PLATFORM INTEGRITY DEVICE AUTHENTICATION ROBUST DRM IMPLEMENTATION SIM LOCK/DEVICE PERSONALIZATION SECURE SOFTWARE DOWNLOAD SECURE CHANNEL BETWEEN DEVICE&UICC MOBILE TICKETINGMOBILE PAYMENTSOFTWARE USE PROVE INTEGRITY TO END USERS USER DATA PROTECTION & PRIVACY Mobile Trusted Module IN OPERATION

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #11 Security is here to serve us… TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. …to enable us to enjoy the things that matter.

TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners. Slide #12 The Opportunity Made Real In Asia the excellent penetration of mobile devices represents a huge opportunity International standardization vs. narrow, fragmented and national solutions Mobile Trusted Module brings cost-efficiency, R&D savings and access to new markets Cross-industry collaboration on MTM development has aimed at maximizing the quality of user experience Mobile Trusted Module is here. Join us to develop compelling value-added services! TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners.

Supporters of the Mobile Trusted Module (MTM) For more information, please visit: Contact: TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective owners.