2.6.2006 Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Working with the Internet
M-PAYMENT SYSTEM (e–WALLET ).
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Secure Communication Architectures.
Our Eyes are on the watch for you! One Stop Shop Payment Automation: Innovative and Smart platform that: Increase Sales and Merchant Retentions Creates.
Mobile Payments Index: Introduction Technologies Payment methods
Mobile Payment Forum of India Technology sub-committee Presentation on mobile payments.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
A Guide to major network components
QuesCom 2007 Introducing QuesCom Mobility Solution June 2007.
Do you know how to keep yourself safe?
Remote Workers Without the Hassle
Services and Applications in Wireless Broadband Networks Josef Noll, Prof. stip. University Graduate studies, N-2027 Kjeller Researcher.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to Sharepoint.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Company/Product Overview. You have lots of files all over the place.
Wireless Networking 102.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
LU Chenglong ( ) DIAO Wenrui ( )
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
How can you protect yourself from online identity theft?
Josef Noll, Personalised broadband1 Personalised Broadband: The key for Advanced Service Delivery Josef Noll 1,2 1 Telenor R&D, N-1331 Fornebu.
Mobile Payments Antti Pihlajamäki Slide 2 Helsinki University of Technology Seminar on Networking Business Outline Introduction  Terminology.
PKI interoperability and policy in the wireless world.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Josef Noll, The role of the Mobile1 Mobile based Admittance and Access to Information Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Ch 11. Integrated Architecture for Wireless Myungchul Kim
4N TELECOMMUNICATION. The solutions on offer are already being used by:  Vodafone New Zealand  Vodafone Portugal  Vodafone Spain  Telefónica and Orange.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
Confidential & proprietary M2M communications in Transportation industry.
ITGS Types of network.
By Kovtunenko Inna. Payment risks Protection measures Safety rules.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Figures for Telektronikk – Services – Noll
Ecommerce Applications 2007/8 Session 70 E-Commerce Applications Mobile commerce.
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
Me Customized Customized Relevant Relevant Community Community Permission Permission Presence Presence Multi- session Multi- session.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
Online Parking System.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
(Josef Noll) -> MasterThesis Masteroppgaver 2006 Josef Noll, Prof. stip. Univ. Graduate Center.
Networks & Communications Diambil dari : Module Application Training Institut Teknologi Bandung
HDL-MGSM.431. Description MGSM.431 is an automation module based on GSM monitoring and controlling. Being at a great distance you can operate a target.
NETWORKING & SYSTEM UPDATES
Mobility productivity connectivity convenience security MOBILE PAYMENT SOLUTION ATSONIC installation run registration user guide Connect your PDA to the.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
2N SmartGate 2N TELEKOMUNIKACE a.s.. Why 2N? We have proven international experience We provide customized solutions locally and internationally We care.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
HotSpot Software HotSpot Billing Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page.
WHAT IS SO SPECIAL? Wireless Router Analogue Telephone Adaptor + SMCWTVG.
Electronic Banking & Security Electronic Banking & Security.
Basic Settings Last update: February 2017
Suronapee Phoomvuthisarn, Ph.D.
M-COMMERCE.
Lecture 4 - Cryptography
Presentation transcript:

Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1 UniK, 2 Telenor R&D, 3 Canaldigital

Josef NollPayment and Access2

Josef NollPayment and Access3 Leading questions What do I fear? –That somebody steals my identity and I can't do anything about it. –That biometrics takes it all. What can I use to make life more comfortable? –Reduce number of “secure devices” I have to carry (BankID, Telenor Sharepoint ID, keys, money, credit card, …) –Have a device which is secure (enough). Why is my phone the security infrastructure? –Because I can ask Telenor to block it, if it gets stolen. –Because it is not an insecure Microsoft device. What challenges does Telenor face, when it comes to authentication and security?

Josef NollPayment and Access4 B3G: Device, Networks, Services original: Eurescom P1145 “Beyond 3G” (2001) Beyond 3G: Personalised Broadband Wireless Services Personal and Public Devices Personal Area Network (PAN) Roaming access across networks public GSM/GPRS/UMTS Mobility: GSM/GPRS, Mobile IP, n.n. BSC HA, FA NT(1) Wire- less Ethernet home xDSL, cable PrivatSupport Wire- less Ethernet hot-spot/ corporate LAN 1G: G: 2G: B3G: Mobile telephony Mobile telephony, SMS, FAX, Data Multimedia communication Personlised broadband wireless services EAP/SIM, Telenor demo at the GSM world congress

Josef NollPayment and Access5 Agenda “Payment and Access" Seamless SIM access in wireless systems: –Near Field Communication (NFC) –Bluetooth, Wifi, –GSM/UMTS Service access examples Seamless access to home content: my pictures, my music Community services: Contact information Bank transactions: SIM & PKI Supported by demonstrations

Josef NollPayment and Access6 Device Authentication SIM with NFC & PKI

Josef NollPayment and Access7 New role: Telenor as authentication provider Seamless authentication Physical access VPN Home access,.mp3,.jpg Service access

Josef NollPayment and Access8 Example: Picture gallery “your content, independent of the device” Access from “anywhere” and “any device” Supports mobile and home network access Identifies user through WAP gateway –Alternative: username/password Identifies device through WAP gateway PC mobil

Josef NollPayment and Access9 Banking from the mobile phone Security considerations Equally secure as SMS (get your account status) Easy to use Advanced functionality through PIN (if required)  Seamless phone (SIM) authentication Advanced security when required –BankID or –PIN Welcome Josef: SIM authentication Account status Transfer, payments Information: Advanced functionality Using SIM, no customer input required BankID or PIN (double security)

Josef NollPayment and Access10 MyBank example: Banking from the mobile phone User incentive: “My account is just one click away” “enhanced security for transactions”  Phone (SIM) authentication  Level 2 security through PKI/BankID/PIN?

Josef NollPayment and Access11 Community service: Contact info User incentive: “change your phone, and miss your contacts” “my wife has the phone number, not me”  Contacts database in Wap Each member with specific addresses –Child: family, friends –Mother: family, companies, her friends –Father: family, companies, work

Josef NollPayment and Access12 NFC activities in Telenor R&D Payment on coffee machine Registration of containers RFID card in 2007? Tests in OSL and Arlanda RFID cards Think Tromsø life trial: Tromsbuss Payment, Entrance

Josef NollPayment and Access13 Current prototype: SMS key access Service Centre Application 1) Send SMS 2) Send service to phone 3) Send info to recipient 4) Enters house with NFC access

Josef NollPayment and Access14 SMS key access How does it work? “Josef” want to gives access to “Inge” to his home He registers Inge as a legal recipient “reg Inge ” Sends Key to Inge’s phone “rfid number lock date time” –Access is only granted to “known” people –Other formats also okay Inge receives welcome message and key Inge opens the door

Josef NollPayment and Access15 NG interactive TV It’s me, get my services (seamless authentication) Extra information, IP services: Extra channels My personal EPG Remote control

Josef NollPayment and Access16 Conclusions “The last time we were connected by a wire was at birth!” [Motorola] All services from your mobile –Music –Pictures, addresses, … Seamless service access –Personalised –Adapted to device Payment and access through NFC Telecom as authentication provider

Josef NollPayment and Access17 Authentication Knowledge based: Username/password authentication Widely used Not comfortable Bad passwords, not secure Seamless authentication Comfortable Trusted third party might be needed Security issues Property-based Biometric Knowledge- based Seamless authentication

Josef NollPayment and Access18 Seamless authentication with WAP HTTP request Hash HTTP request cTHG8aseJPIjog== Pictures for ’ rzso ’. Password:1234 sID: cTHG8aseJPIjog==

Josef NollPayment and Access19 Challenges: Standardisation of NFC/SIM connection Major challenges Communication with SIM card Set-up of other communication (WLAN, Bluetooth,…) Phone compatibility Smartcard interfaces ISO/IEC 7816 NFC communication unit SIM NFC reader NFC2SIM

Josef NollPayment and Access20 Future ideas: DRM handling Internet Home access,.mpg,.mp3,.jpg NFC communication unit SIM with DRM keys NFC2SIM 4. Request DRM key for selected content 5. Return DRM key 1. Request for home content 2. Seamless authentication and redirect to personalised content 3. Streaming of encrypted content NFC