PKI interoperability and policy in the wireless world.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Wireless PKI Shakeel Ahamad Shaik (Research Fellow) Under the supervision of Dr.V.N.Sastry, Associate Professor (IDRBT) & Dr.S.K.Udgata, Reader (UOH) Saturday,
 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC
WPKI available technology diagram and the business model
Performance and Efficiency in Wireless Security Terry Fletcher, Senior Security Architect Chrysalis-ITS
魂▪創▪通魂▪創▪通 WebCert - SOP Sangrae Cho Authentication Research Team.
Advances in Card Solutions 7 th Annual CACR April 25, th Annual CACR April 25, 2001.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
INFORMATION SYSTEMS SERVICES UNIVERSITY OF LEEDS Presentation to the UK e-Science Grid Workshop ‘Managing Access to Resources on the Grid’ e-Science Institute,
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Portal Payment Possibilities 1(21) Department of Teleinformatics KTH – Celltribe Business Solutions AB Portal Payment Possibilities for a start-up company.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
A Survey of WAP Security Architecture Neil Daswani
Mobile Security and Payment Nour El Kadri University Of Ottawa.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 TELECOM ITALIA GROUP Trial at the University of Rome: SIM-based Services Trial at the University of Rome: SIM-based Services Author: Alessandro Rabbini.
UNCLASS DoD Public Key Infrastructure LCDR Tom Winnenberg DISA API1 Chief Engineer 25 April 2002.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
February 25, Infrastructure-ENUM Secure, Private, Next Generation Addressing Infrastructure Douglas J. Ranalli Founder, Chief Strategy Officer NetNumber,
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 Driving Convergence Harel Kodesh Vice President Productivity Appliances Division Microsoft Corporation.
WAP (Wireless Application Protocol). W – World W – Wide W -- Web W – World W – Wide W – Wireless W -- Web The Two Paradigms.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Ch 11. Integrated Architecture for Wireless Myungchul Kim
Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Andersen Labs for Internet & Security PKI Developments in Asia Pacific 5 December 2000.
Time/Date Stamp Time/Date Stamp Authorization Secure Non- repudiation Secure Non- repudiation Key Recovery Key Recovery Message Confidentiality Message.
TECHNICAL SEMINAR Presented by :- Satya Prakash Pattnaik TECHNICAL SEMINAR By Satya Prakash Pattnaik EC Under the guidance of Mr.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Chapter 7 Mobile Commerce— The Business of Time
Building Security into Your System Bill Major Gregory Ponto.
1. 2 WIRELESS APPLICATION PROTOCOL (WAP) 3 Wireless Application Protocol Introduction Evolution WAP Architecture Working Uses Conclusion.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Mobile Security. Security is Hard Just this year: Denial of service Credit card compromise I Love you Cost to manage security quickly becomes prohibitive.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
SCEP Simple Certificate Enrollment Protocol.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback.
WAP Public Key Infrastructure
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Public Key Infrastructure from the Most Trusted Name in e-Security
SSL Decryption Explained
Presentation transcript:

PKI interoperability and policy in the wireless world

Agenda Wireless Trust Services Wireless PKI Technologies Wireless Security Deployments Today Interoperability testing experience Certificate issuance policies Use of certificates by other parties

Trust in The Wireless World Authentication Payment Validation Who are you? Can you pay? Can you prove it?

Wireless PKI Technologies Device independent solutions SIM Toolkit application (GSM) WAP –WTLS class 2 today –WTLS class I Mode Solutions –SSL from fall 2000 –Client Certificates in 2001? Future wireless standards –WAP Next Generation –3G Wireless

SIM Toolkit Application SIM Manager SMS Gateway Phone Application Server CA Processing Center Private key Available today

Device Independent Solution SMS Gateway Phone Signing Portal Application Server Roaming Key Server #2 Roaming Key Server #1 Available today

WAP Gateway Architecture WTLS HTTP/SSL Wireless Gateway Application Servers

WAP Gateway/Server Certificates WAP WAP Server/ Gateway WTLS certificate service CA Processing Center CA Processing Center Private key Root public key Available today

WAP Client Certificates WTLS Wireless Gateway Application Server Mobile Client VeriSign OnSite X.509 client certificates Private key CA Processing Center WML Script API: End-to-end digital signatures & client authentication WTLS client authentication

OnLine-Issued WAP Client Certificates Wireless Gateway Application Server Phone/ WIM Private key CA Processing Center X.509 client certs Certificate Issuance (Carrier cert) PKI Portal SIM Personalization Center SIM Personalization Center Certificate Issuance (Device Certificate) Wireless Client Certificate Issuing Capability in Trial 4Q00 Wireless Client Certificate Issuing Capability in Trial 4Q00

Interoperability testing experience Testing of WAP server certificates successful Problems encountered: –User interface issues –Certificate memory allocation issues

Certificate Issuance Policy Need a published policy Value of certificate depends on level of authentication Certificate status needs to be publicly available

Use of Certificates by other parties Revenue opportunity for wireless carriers –Provide on line status of certificates –Use carrier issued certificate for mCommerce authentication Requires a high level of trust in certificate issuer

Summary Interoperability essential Successful testing of WAP server certs Revenue opportunity for wireless carriers with wireless client certificates Interoperability essential for widespread adoption

“Enabling Trust on the Wireless Internet”