Mobile Single Sign On System Souheil Lazghab. The security protocol should secure: First, the Bluetooth communication between the PICDEM FS USB Demo board.

Slides:



Advertisements
Similar presentations
MIDP Mobile Information Device Profile Johnny Yau CIS 642 Prof. Insup Lee.
Advertisements

Real world application Corporate Wireless Networking Andrew Yeomans DrKW & Jericho Forum Board.
Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
© 2013 Marcin Nagy & N. Asokan & Jörg Ott 1 PeerShare: A System for Secure Distribution of Sensitive Data among Social Contacts Marcin Nagy, N. Asokan,
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Mobile Payments Index: Introduction Technologies Payment methods
SKS – Secure Key Store KeyGen2 –Token Provisioning Protocol Executive Level Presentation.
Architecture of Mobile eLearning Services Ivan Minov, Stanimir Stoyanov.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Storage of sensitive data in a Java enabled cell phone MSc Thesis Tommy Egeberg June 2006.
User Adoption Issues Server Admin Fundamentals Solutions to User Adoption Issues.
IP Camera Security System Dallan Byrne th Electronic and Computer Engineering 2007 Supervisor: Fergal O’ Malley.
Little Brother Surveillance Nathaniel Brown & Chris Mordue.
Apache Triplesec: Strong (2-factor)
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Near Field Communication and Bluetooth Bridge System for Mobile Commerce Adviser : Chao-Huang Wei Student : Shin-An Chan SN: M PPT 製作 :100%
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Mobile Based Security System Group 11 Awantha S.A.T. Darshana S.A.T. Kumara M.D.B.J.B. Sandakalum H.K.L.S.
Eduardo Araujo Dustin Littau. Agenda Introduction Requirements Design Testing Conclusion.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
DYNAMIC WAP BASED VOTING SYSTEM Bertrand COLAS Submission date: May 2002 School of Computing Bachelor of Engineering with Honours in Computer.
BeTelGeuse: Tool for Bluetooth Data Gathering Petteri Nurmi, Joonas Kukkonen, Eemil Lagerspetz, Jukka Suomela, Patrik Floréen Helsinki Institute for Information.
Department of Electronic Engineering NUIG A Bluetooth and Ethernet Control System for Home Entertainment Devices By: Shane Long Supervisor: Mr. Frank Callaly.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Little Brother Surveillance Nathaniel Brown and Chris Mordue.
Identity on Force.com & Benefits of SSO Nick Simha.
Example title for notes and handouts
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Single Sign-On
Single sign-on Secure password store Mats Byfuglien.
Mobile Communication Middleware By:Lekometsa Mokhesi Anisa Ragalo Supervisor: Ken Macgregor.
NICOLE AND LAVONTIS COMPUTER APPLICATIONS. USB Flash Drive A USB flash drive,sometimes called s pen drive or thumb drive,is a flash memory storage device.
ID anywhere mobile | smart cards | devices.
Mobile Phone Based Environment Control/Security System Christopher Carroll B.E. Electronic and Computer Engineering.
Skype API Hiroshi OHSUGA. Outline ~目次~ Over view of the Skype API –phone API –access API Skype API for Java.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
Securely assessing encrypted cloud storage from multiple devices Nguyen Hoang Long Supervisor : Prof. N. Asokan Advisor : Sandeep.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
PROJECT MEMBERS: DHARMARAJA K ( ) SANTHOSH KUMAR V ( ) VIGNESH P ( ) VINOTH RAJ B ( ) THIRD REVIEW GUIDE NAME:
SEMINAR ON “ REMOTE CONTROLLING OF TECHNICAL SYSTEMS USING MOBILE DEVICES”
Enhanced mobile services in Java enabled phones Björn Hjelt Sonera zed ltd Supervisor: Professor Jorma Jormakka.
Innovation is Our Passion Online Banking Past, Present and Future.
The eCSG Mobile App Mario Torrisi INFN – Division of Catania 24 June 2013 Webinar on the eCSG 1.
全面推开营业税改征 增值税试点政策培训. 什么是营改增? “营改增”中的“营”指的是营业税,“ 增”指的是增值税。对大多数企业来说,增 值税所带来的税负远低于营业税。 减税本身就是积极的财政政策。营改增所 实现的减税,不仅规模大、范围广,它本质 上是一种“结构性减税”,从而构成“结构 性改革”攻坚战中的实招。
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 2.0 Co-resident Administration Overview Cary A. Bran.
Linux Training in Hyderabad Linux Training in Hyderabad.
Internet of Things (IoT)
Remote User Tracking Life Cycle Objectives
Multifactor Authentication & First Time Login
Give priority to the security of your access
A mobile single sign-on system
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
PREPARED BY: RIDDHI PATEL (09CE085)
Device Registration and Multi-Factor Authentication
Presentation transcript:

Mobile Single Sign On System Souheil Lazghab

The security protocol should secure: First, the Bluetooth communication between the PICDEM FS USB Demo board and the mobile phone device. Second, the access credentials stored in the RMS residing on the mobile phone. Third, provide a secure authentication mechanism between the user and the sso MIDlet.

To achive these goals: RC4 SHA-1 AES-128

Problems! The limitation of the processing power and storage size of the PICDEM FS USB Demo board device. The limitation of the development environment for both Java and embedded system.

Conclusion 100 % security does never exist in any system. The security protocol offers a good security level to the SSO prototype. The degree of security could be ameliorated if it will be included early in the design process.