Cellular Device – Versatile personal identification Joint workshop on mobile web privacy W3C presentation, Dec. 2000
This Presentation Current challenges The cellular perspective Proposed action About cFORM Application example (mSAFE)
Current situation Lack of effective means of definitive identification prevent popular use of e- transactions Ink-signature available everywhere Digital signature is currently restricted
Current situation Internet Subscribers Cellular Subscribers Voice vs. Data Data Voice
Challenges Provide a definitive identification of the user Provide sufficient level of security Enable non-repudiation Provision of cost effective alternative with a global spread Convenient, easy to use user interface Availability across most platforms and devices
Cellular perspective More cellular users than internet users Currently voice-centric rather than data Geographically spread with good coverage and roaming abilities Good means of control over security Limited interface
Possible methods of identification Biometric (price, size,) Encryption (software level) Smart cards (price, size, interface to ither devices) Other hardware devices
Some drawbacks Interface Cost Security tasks impose load on the cellular device Restricted penetration to mass market
Possible trends A number of cellular OS Remote activation of digital signature Identification is performed using hardware built-in components or software Separation of security tasks from main cellular processor towards a designated component
Proposed action Utilize the cellular infra-structure and cellular devices as an identification devices Creation of a standard method which allow access from software (cellular OS) to hardware (built-in components in cellular device)
cFORM Convenient and efficient interface, with automated submission of information. Personal, secure and accessible information repository with external information import mechanism – low cost, no pain. Enable error-free data exchange between transacting parties, via unified channels. Standard data structure that serves as a basis for electronic transactions.
Application example - mSAFE Strategic partnership with cFORM Built-in component Handles all security tasks (WTLS, PKI, VPN) Has memory to host application software Provision of hardware level security Gateway to the data streamed to the cellular device
Internet Cellular Service Provider CForm Server WTLS Layer Software Encryption Password protected MSafe Security Technology and hardware Data Encryption Fire Wall VPN Organizational Information System