Cellular Device – Versatile personal identification Joint workshop on mobile web privacy W3C presentation, Dec. 2000.

Slides:



Advertisements
Similar presentations
Steps towards E-Government in Syria
Advertisements

TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
The Internet & Electronic Commerce THE ELECTRONIC MALL.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Cloud Computing (101).
VPN Extension Requirements for Private Clouds draft-so-vepc-00.txt.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Public Key Infrastructure Ammar Hasayen ….
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Introduction to Cloud Computing
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security for Managers (Master MIS)
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Intranet, Extranet, Firewall. Intranet and Extranet.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
PETS – Power Exchange Trading Software Power Exchange Trading Software for Online Bidding, Billing and much more.
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
X-Road – Estonian Interoperability Platform
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
C5- IT Infrastructure and Emerging Technologies. Input – Process - Output 2 A computer  Takes data as input  Processes it  Outputs information CPU.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Human-computer interfaces. Operating systems are software (i.e. programs) used to control the hardware directly used to run the applications software.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Chapter 8 – Cloud Computing
SMART CARDS Presented By Jishnu Sasikumar Reg No : 09 PG 142.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
M IND Q S YSTEMS Leaders in Training /7, 2nd Floor, Srinivasa Nagar Colony (W) Above HDFC Bank, S.R.Nagar Hyderabad
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Clouding with Microsoft Azure
Identity and Access Management
Chapter 1 Characterization of Distributed Systems
Secure Connected Infrastructure
CompTIA Security+ Study Guide (SY0-401)
Technologies in everyday’s life
VPN Extension Requirements for Private Clouds
Mobile Payment Protocol 3D by Using Cloud Messaging
CompTIA Security+ Study Guide (SY0-401)
PREPARED BY: RUMMY MIRANDA
Enhancing Web Application Security with Secure Hardware Tokens
Azure-Powered Solution Ensures Great Precision and Clinical Accuracy for Health Monitoring Kit “Security and privacy are at the core of how we develop.
Goals Introduce the Windows Server 2003 family of operating systems
Information Technology Fundamentals
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Done by:Thikra abdullah
Presentation transcript:

Cellular Device – Versatile personal identification Joint workshop on mobile web privacy W3C presentation, Dec. 2000

This Presentation Current challenges The cellular perspective Proposed action About cFORM Application example (mSAFE)

Current situation Lack of effective means of definitive identification prevent popular use of e- transactions Ink-signature available everywhere Digital signature is currently restricted

Current situation Internet Subscribers Cellular Subscribers Voice vs. Data Data Voice

Challenges Provide a definitive identification of the user Provide sufficient level of security Enable non-repudiation Provision of cost effective alternative with a global spread Convenient, easy to use user interface Availability across most platforms and devices

Cellular perspective More cellular users than internet users Currently voice-centric rather than data Geographically spread with good coverage and roaming abilities Good means of control over security Limited interface

Possible methods of identification Biometric (price, size,) Encryption (software level) Smart cards (price, size, interface to ither devices) Other hardware devices

Some drawbacks Interface Cost Security tasks impose load on the cellular device Restricted penetration to mass market

Possible trends A number of cellular OS Remote activation of digital signature Identification is performed using hardware built-in components or software Separation of security tasks from main cellular processor towards a designated component

Proposed action Utilize the cellular infra-structure and cellular devices as an identification devices Creation of a standard method which allow access from software (cellular OS) to hardware (built-in components in cellular device)

cFORM Convenient and efficient interface, with automated submission of information. Personal, secure and accessible information repository with external information import mechanism – low cost, no pain. Enable error-free data exchange between transacting parties, via unified channels. Standard data structure that serves as a basis for electronic transactions.

Application example - mSAFE Strategic partnership with cFORM Built-in component Handles all security tasks (WTLS, PKI, VPN) Has memory to host application software Provision of hardware level security Gateway to the data streamed to the cellular device

Internet Cellular Service Provider CForm Server WTLS Layer Software Encryption Password protected MSafe Security Technology and hardware Data Encryption Fire Wall VPN Organizational Information System