Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:

Slides:



Advertisements
Similar presentations
CS4032 Presentation SMS, SIM, MMS and Barcodes Richard Drysdale.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
© Tally Solutions Pvt. Ltd. All Rights Reserved Remote Access & SMS.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Aloaha protects Mobile M2M Communication with secureSIM.
Supplying value. Car in the Home ecosystem. Infotainement Solutions APR - 05 Car as an Home extension Home Terrestrial Broadcast Office Internet .
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Password?. Project CLASP: Common Login and Access rights across Services Plan
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Mobile Payment Forum of India Technology sub-committee Presentation on mobile payments.
IST project ePerSpace N° ePerSpace Call ID: FP IST-1 Contract N°: Date : 11/03/2004 Concertation meeting Brussels.
LYU9901 TravelNet Final Presentation Supervisor: Prof. Michael R. Lyu Members: Ho Chi Ho Malcolm Lau Chi Ho Arthur On
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
MailOnPhone.com An ASP Division of Saltriver Infosystems Private Limited Ahmedabad.
One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand
V v Business Process AMTV Streaming TV Streaming.
Company/Product Overview. You have lots of files all over the place.
SSH Secure Login Connections over the Internet
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Information Security for Managers (Master MIS)
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Josef Noll, Personalised broadband1 Personalised Broadband: The key for Advanced Service Delivery Josef Noll 1,2 1 Telenor R&D, N-1331 Fornebu.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Mobile Terminals WAP, WML and Bluetooth Edoardo Berera University of Nice Sophia Antipolis Telelinea 26 September 2001 Seminar on Electronic Commerce
Chapter 10 Developing a Web-Based Online Shopping Application (I)
PKI interoperability and policy in the wireless world.
Josef Noll, The role of the Mobile1 Mobile based Admittance and Access to Information Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Author: Ingelin Olsen Content Strategy- mission and vision Functionality Demo Summary.
GSM Network Structure Lance Westberg.
Section 4 – Computer Networks Setting up a small network.
Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Figures for Telektronikk – Services – Noll
©2013 Monet Online Commercial Service Co., Ltd. All rights reserved. MONET 09/2015.
Integrating and Troubleshooting Citrix Access Gateway.
I4ma Server Overview. High Level Architecture Internet Mobile Device Web Browser I4ma Server SMS SMS Service.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
Online Parking System.
(Josef Noll) -> MasterThesis Masteroppgaver 2006 Josef Noll, Prof. stip. Univ. Graduate Center.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
CCCognos Connection RSReport Studio ASAnalysis Studio QSQuery Studio ESEvent Studio CSContent Store FWM Framework.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1.
ASSIGNMENT 2 Salim Malakouti. Ticketing Website  User submits tickets  Admins answer tickets or take appropriate actions.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
©2013 Monet Online Commercial Service Co., Ltd. All rights reserved.
Electronic Banking & Security Electronic Banking & Security.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Personal Trip Assistance System. Intelligent Transport Systems Increase in traffic intensity  need for intelligent way for road usage.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
CAS and Web Single Sign-on at UConn
M-COMMERCE.
PRESENTATION FOR WEB LOGIN
Cyber Security Authentication Methods
كارت هوشمند چيست وچگونه كار مي‌كند؟
Presentation transcript:

Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples: Admin access, eCommerce Private Picture access, My Music Public picture gallery access & RFID (& SIM) & RFID & SIM passwd & RFID, SIM & PKI

Telenor R&DMobile Terminals Group 2 Bonus card Wallet Keys Monthly pass Content access Ticket Access card Electronic ID

Telenor R&DMobile Terminals Group 3 Supporting Technology WAP gateway and UMTS Traffic analyser Explains how WAP gateway provides information about The user: x-nokia-alias The terminal: x-nokia-type WAP gateway

Telenor R&DMobile Terminals Group 4 Standardisation of NFC/SIM connection Smartcard interfaces ISO/IEC 7816 NFC communication unit SIM NFC reader NFC2SIM

Telenor R&DMobile Terminals Group 5 DRM handling Internet Home access,.mpg,.mp3,.jpg NFC communication unit SIM with DRM keys NFC2SIM 4. Request DRM key for selected content 5. Return DRM key 1. Request for home content 2. Seamless authentication and redirect to personalised content 3. Streaming of encrypted content NFC

Telenor R&DMobile Terminals Group 6 SMS key access Service Centre Application 1) Send SMS 2) Send service to phone 3) Send info to recipient 4) Enters house with NFC access

Telenor R&DMobile Terminals Group 7 EAP-SIM challenge Authentication Server Internet 1. User wants to log-in to his personalized web page 2. Request login and password 3. Ask for phone number (user) and password (128 bit number Stored in the SIM card) Bluetooth 4. Return phone number and password 5. Forward login and password Web Server 6. Authenticate user and redirect to personalized web page 7. Send a new 128 bit password 8.Write new 128 bit password to the SIM card

Telenor R&DMobile Terminals Group 8 Combined SIM/RFID controller Future SIM requirements CLK I/O system CPU Memory: ROM RAM EPROM VCC, GND, RST Secure OAA Identity module I/O

Telenor R&DMobile Terminals Group 9 Authentication provider Service access Seamless authentication Physical access VPN Home access,.mp3,.jpg SIM with PKI and NFC