Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.

Slides:



Advertisements
Similar presentations
Setting the Course for the New Digital Economy. The Elements of the New Digital Economy Content and Services Growth of content and service consumption.
Advertisements

Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Software Security & Privacy Risks in Mobile E-Commerce Kartikeya Kakarala CSCI 5939-Independent Study Wireless Application Protocols.
Mobile Communication MMS.
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
Performance and Efficiency in Wireless Security Terry Fletcher, Senior Security Architect Chrysalis-ITS
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
 WAP WAP  Foundation Of WAP Foundation Of WAP  Benefits… Benefits…  Architecture… Architecture…  Layers of WAP protocol stack Layers of WAP protocol.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Certicom MobileTrust™: PKI for Mobile and Wireless Systems John Kennedy Director of PKI Product Marketing April, 2000.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
The Internet & The New IT Infrastructure Chapter 9.
GSM: A Double-edged Sword Tom Kellermann, CISM Sr. Data Risk Management Specialist, The World Bank.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
@ V ictoria U niversity Enterprise eCommerce Mobile Computing.
Wireless Village (WV) Mobile IMPS ( Instant Messaging and Presence Services) Reporter : Allen.
Chapter 8 Mobile Commerce
Wireless Application Protocol (WAP) Reference: Chapter 12, section 2, Wireless Communications and Networks, by William Stallings, Prentice Hall.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Starfish/Motorola Confidential 1 September 8, 2015 Starfish/Motorola Confidental Overview Starfish Software, Inc. Bob Koche (Ko-chee) Director of Partner.
1 Will there be a wireless standard anytime soon ? Best Of Wireless January 21, 2004.
Wireless Application Protocol. . The Two Paradigms W – World W – Wide W -- Web W – World W – Wide W – Wireless W -- Web.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Development of Mobile Applications Juan Fernando Arboleda Carlos Avendaño Juan David Gomez Medellín, Colombia South America.
Mobile Terminals WAP, WML and Bluetooth Edoardo Berera University of Nice Sophia Antipolis Telelinea 26 September 2001 Seminar on Electronic Commerce
PKI interoperability and policy in the wireless world.
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
Tablets Laptops PDAs Smart Phones Mobile Commerce &Wireless Network.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
M-COMMERCE M-Commerce & E-Commerce BY JYOTINDRA ZAVERI W-www Consultant M-Commerce & E-Commerce BY JYOTINDRA ZAVERI W-www Consultant.
Mobile Commerce (M-Commerce)
TECHNICAL SEMINAR Presented by :- Satya Prakash Pattnaik TECHNICAL SEMINAR By Satya Prakash Pattnaik EC Under the guidance of Mr.
WIRELESS APPLICATION PROTOCOL Definition It is universal, open standard developed by the WAP Forum to provide mobile users of wireless phones and other.
Chapter 7 Mobile Commerce— The Business of Time
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Ecommerce Applications 2007/8 Session 70 E-Commerce Applications Mobile commerce.
M-COMMERCE PRESENTED TO ASIM IFTIKHAR PRESENTED BY TAQDEES TAHIR MUHAMMAD SHAHID SIDRA RANA ASMA KALEEM HAIDER ALI.
Mobile Security. Security is Hard Just this year: Denial of service Credit card compromise I Love you Cost to manage security quickly becomes prohibitive.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
The Mobile Inbox Reaping The Rewards Of Wireless David Koretz President & CEO, BlueTie, Inc.
Wireless Application Protocol (WAP) William Thau CSC 8560 Dr. L. Cassel.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Mobile E-Commerce in Asia Issues and Strategies for the New Information Age Business Wong Jeat Shyan CYBERSOURCE PTE LTD SINGAPORE.
Mobile SEO & E-Commerce Growth beyond Black Friday & Cyber Monday.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
M-COMMERCE.
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies

Device Revolution 4 Mobile Phones to every PC worldwide Huge growth in network ready PDAs

WW Internet Subscribers, Source: IDC, 2000

What’s Happening? Connectivity Revolution WCDMA, GPRS, EDGE, HSCSD, Bluetooth, WLL Wireless Application Protocol (WAP) Device Revolution Personal, hand devices, rather than corporate desktop devices e-pliances, Communicators, Smartphones, Pagers Consumer Revolution E-Commerce now accepted, suitable for certain type of shopping Not reaching all consumers Wireless Mobile Consumer systems New activities not previously viable (e.g. buying tickets) Very much dependent on ease-of-use and ubiquity of cellphones

What the Analysts are Saying There will be 21.3 million mobile data users in the U.S. by the end of Yankee Group, Dec About 95 percent of smart phones shipped to the United States and Western Europe in 2003 will be Wireless Application Protocol (WAP)-enabled and 70% will have Bluetooth technology. Strategy Analytics, June 1999 The number of users of browser-enabled mobile phones will soar from 1.1 million this year to 79.4 million in 2003, whereas Internet-capable PDA users will only increase from 5.2 million to 12 million in the same period of time. Jupiter Communications, Nov. 1999

Securing the Wireless World Wireless e|security will extend Public Key Infrastructures to mobile users

WTLS Security is PKI based Wireless TLS (WTLS) Authentication - Integrity Confidentiality Wireless TLS (WTLS) Authentication - Integrity Confidentiality  Encrypted Session Communications  Digital Certificates for client/server authentication  Data Integrity assured PKI System

Which certificates do I use for authentication? WAP gateways/server need to provide WAP certificates for authentication Need to obtain WTLS certificate Web servers use X.509 the same ones they use today Mobile users use X.509 Wireless PKI WAP Gateway Web Server Mobile User X.509 WTLS

Baltimore Telepathy Product Suite Baltimore Telepathy WAP Security Toolkit Baltimore Telepathy WAP Security Gateway Baltimore Telepathy WAP Certificate Authority Baltimore Telepathy WAP Certificates Baltimore Telepathy PKI Registration System Baltimore Telepathy PKI Validation System Baltimore Telepathy Digital Signature Toolkit

Baltimore Telepathy WAP Solution

Conclusion Public Key Infrastructures can be extended to protect and enable mobile commerce A centralized security infrastructure reduces the cost of managing security