SlideShare a Scribd company logo
1 of 21
Download to read offline
FIDO Alliance Seminar in Seoul
NTT DOCOMO Deployment Case Study:
“Your Security, More Simple.”
December 6, 2016
Koichi Moriyama
NTT DOCOMO, INC.
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved.
Table of Contents
• Motivation: “Your Security, More Simple.”
• Overview: NTT DOCOMO’s Deployment
• NTT DOCOMO FIDO-enabled Devices for d ACCOUNT™ - 20 Models in Total
Video Clip: “Let’s setup, use FIDO-enabled authentication for d ACCOUNT”
• Design Principles to Integrate the FIDO Standards
• Solution Architecture: Before & After the Deployment
• Security Architecture: Biometric Data and Secret Key stored in Secure Area
• Open Standards for Future Interoperability
• Varieties of FIDO® Certified Authenticator Solutions
• Deployment at More Scale – Rolled Out the same to iOS Customers
• NTT DOCOMO as a FIDO Alliance Board Member
FIDO Seminar in Seoul 12/6/2016 2© 2016 NTT DOCOMO, INC. All Rights Reserved.
Motivation: “Your Security, More Simple.”
• NTT DOCOMO provides our customers OpenID based “d ACCOUNT” in
addition to 4-digit passwords for online service access including DOCOMO
branded services, partner services, and carrier billing payments.
• NTT DOCOMO wanted to help our customers, who always needed to
remember their passwords, for their convenience in a secure way, and
recognized that the FIDO standards may help.
FIDO Seminar in Seoul 12/6/2016 3© 2016 NTT DOCOMO, INC. All Rights Reserved.
https://www.youtube.com/watch?v=UP0DyYk5IXc
Iris Fingerprints
Passwords-less Authn
using Biometrics
Login Unlock
Carrier Billing
Payment
Overview: NTT DOCOMO’s Deployment (1/2)
• DOCOMO launched FIDO-enabled online authentication with biometric
sensor equipped devices for “d ACCOUNT” (a.k.a. docomo ID) login and
carrier billing payments from May 2015. DOCOMO has been continuing to
extend FIDO-enabled experience, supporting legacy 4-digit pins and others
including “d ACCOUNT” carrier billing partners.
FIDO Seminar in Seoul 12/6/2016 4© 2016 NTT DOCOMO, INC. All Rights Reserved.
Carrier Billing Payment
MARKET
Overview: NTT DOCOMO’s Deployment (2/2)
• NTT DOCOMO selected the FIDO UAF 1.0 standard due to reasons below:
1.) Easy, and fast online authentication using biometrics, 2.) Secure protocol that
utilizes public key crypto, and 3.) Open-standard for interoperability in the future.
• NTT DOCOMO launched four FIDO® Certified devices and the FIDO-
enabled server in May 2015. There were some world firsts, a.) as an MNO,
b.) with multiple FIDO Certified devices from multiple OEMs, c.) with the
world first Iris scanner equipped smartphone, and d.) for multiple services.
FIDO Seminar in Seoul 12/6/2016 5© 2016 NTT DOCOMO, INC. All Rights Reserved.
FIDO-enabled Devices for d ACCOUNT
20 Models in Total
• 4 models for 2015 Summer, 6 for 2015-16 Winter/Spring, 4 for 2016
Summer, and 6 for 2016-17 Winter/Spring by
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 6
SH-01H SO-03H SO-01H SO-02HF-02HSC-05G
SH-04HF-04H SO-04HSC-02H
F-04G SC-04G F-01HSH-03G
SO-02JF-01J SH-02J DM-01JSO-01J L-01J
Coming soon! Coming soon!
Video Clip: Let’s setup, let’s use FIDO-enabled
biometric authentication for d ACCOUNT!
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 7
Design Principles to Integrate the FIDO Standards
• Integrate the FIDO standards in a straightforward manner
– Create and maintain the FIDO eco-system, and align with it for sustainability
• Utilize the FIDO standards as much as possible
– Allow different type of authenticators e.g. fingerprint sensors and iris scanner
• Protect users and ecosystem partners in consideration of security
– Follow the FIDO privacy policy, “Biometric template and private keys never
leave devices,”
– Realize that genuineness of authenticator shall be securely proven to servers,
– Keep the same security level of various devices from multiple OEMs, and
– Avoid to generate wrong perception in the market.
• Minimize the integration efforts, time and cost
– Gather FIDO-enabled service apps to a single point of I/F – d ACCOUNT to ASM
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 8
Solution Architecture: d ACCOUNT and 4-digits
[before the FIDO integration]
• The d ACCOUNT app and system had already been introduced and
operated for authentication and single-sign-on experience.
FIDO Seminar in Seoul 12/6/2016 9© 2016 NTT DOCOMO, INC. All Rights Reserved.
…
DOCOMO Branded Devices
by OEM Partners
Client App Pre-installed
…
Web Browser
Pre-installedService Apps
System Server
…
DOCOMO Branded
Services
Carrier Billing
Partner Services
Billing
System Servers
Launched by Service
Apps or Web Browser
Authenticate user by
ID/Password or 4-digitsID/Password
• Single Sign-On
Solution Architecture: d ACCOUNT and 4-digits
[after the FIDO integration]
• The d ACCOUNT app and system had already been introduced and
operated for authentication and single-sign-on experience.
FIDO Seminar in Seoul 12/6/2016 10© 2016 NTT DOCOMO, INC. All Rights Reserved.
DOCOMO Branded Devices
by OEM Partners
…
Web Browser
Pre-installedService Apps
…
DOCOMO Branded
Services
Carrier Billing
Partner Services
Billing
System Servers
FIDO-enabled by
xxxx Client SDK
FIDO-enabled
by Server
FIDO-enabled w/
some additional
requirements to adopt
…
In addition to ID/Password
• Single Sign-On
• Biometric Authentication
without Passwords
Client App Pre-installed System Server
FIDO Enables Online Authentication by
Utilizing Biometric Data in a Secure Manner
– Biometric Data and Secret Key stored in Secure Area –
FIDO Seminar in Seoul 12/6/2016 11© 2016 NTT DOCOMO, INC. All Rights Reserved.
Biometric
Authentication Device
Secure Area (TEE)
User Verification through
Matching
Secure App
Secure Folder
FIDO Client
Verified
FIDO Authenticator
FIDO Server
Challenge
Authentication is completed
once the Signed Challenge is
verified by
Public Key
Sign the Challenge
by Secret Key
✓
✓
Signed Challenge
d ACCOUNT
Server
d ACCOUNT
App
Scope of FIDO UAF 1.0 Spec
✓
✓
Public Key CryptographySecure Protocol
Biometric Data
Device Server
FIDO-enabled services are
enhanced gradually…
Registered
Template
Secret Key
The FIDO Standards Connect Multiple Services
– Open Standards for Future Interoperability –
FIDO Seminar in Seoul 12/6/2016 12© 2016 NTT DOCOMO, INC. All Rights Reserved.
Standards
SH-01H SO-03H SO-01H SO-02HF-02H F-01H
F-04H SH-04HSO-04H SC-02H
SO-02J F-01J SH-02J DM-01JSO-01J L-01J
2015 Summer models
2015-16 Winter/Spring models
2016 Summer models
2016-17 Winter/Spring models
Company A’s
Server
Company B’s
Server
Company C’s
Server
d ACCOUNT
DOCOMO Server
Implementations of the FIDO Authenticators
– Varieties of FIDO® Certified FIDO Authenticator Solutions –
• OEMs may choose a FIDO® Certified authenticators solution from a variety
of choices in order to meet their requirements.
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 13
FIDO-enabled by
xxxx Client SDK
FIDO® Certified
xxxxx Server
FIDO Standards
Client App Pre-installed System Server
14
NTT DOCOMO Rolls Out FIDO Biometric Authentication to iOS Customers
Underscores rapid market adoption of FIDO as the new standard for strong authentication
Mountain View, Calif., March 7, 2016 – The FIDO® Alliance, the cross-industry creators of open standards for simpler, stronger authentication, announced
today that Japan’s largest mobile network operator NTT DOCOMO, INC. (“DOCOMO”) has extended its market-leading deployment of FIDO® Certified strong
authentication to its millions of customers with Touch ID®-equipped Apple iPhones and other iOS(1) devices. DOCOMO adds this new FIDO-for-iOS capability to
an already impressive suite of 10 FIDO Certified Android devices from Samsung, Fujitsu, Sharp, and Sony Mobile, ensuring that their customers enjoy
unprecedented choice between platforms, devices and biometric authentication modalities including fingerprint touch, fingerprint swipe, and iris recognition.
(1) iOS 9 or later
DOCOMO’s decision to add support for FIDO strong authentication to the base capabilities of Touch ID underscores both the security benefits and the rapid
market adoption of FIDO standards in just over a year since the specifications were published. Today more than 100 solutions have been FIDO Certified and, in
addition to DOCOMO, hundreds of millions of end-users’ web and mobile apps have been FIDO-enabled for strong authentication protection by leading service
providers, including Google, PayPal, Samsung, Bank of America, Dropbox, and GitHub.
“The expansion of cross-platform support from NTT DOCOMO highlights the growing global consensus that using open standards from FIDO Alliance is the right
strategy for moving the connected economy off its dependency on passwords,” said Brett McDowell, executive director of the FIDO Alliance. “As more service
providers look to reduce fraud risk and give customers a better, faster user experience, I believe they will be following DOCOMO’s example and deploying cross-
platform FIDO-enabled, privacy-respecting biometric authentication that is simultaneously more secure and convenient.”
More details on DOCOMO’s FIDO-for-iOS deployment
Using FIDO specifications, DOCOMO is enabling its customers to securely authenticate themselves with Touch ID instead of a password to the DOCOMO d
ACCOUNT™ app, which will be available in the App Store on March 9. From there, they will have secure access to DOCOMO account details, billing and services,
including mobile gaming and music platforms d game™ and d music™, and shopping sites such as d delivery™ and d shopping™. DOCOMO is also removing the
password from carrier billing, allowing customers to approve their payments via Touch ID.
In a media update about this news, DOCOMO said, “The app will encourage more DOCOMO partner companies to incorporate the FIDO standard as users
demand biometric authentication for an increasingly diverse range of mobile handsets.”
“d ACCOUNT,” “d game,” “d music,” “d delivery,” and “d shopping” are trademarks or registered trademarks of NTT DOCOMO, INC. NTT DOCOMO’s “d ACCOUNT,” “d delivery” and “d shopping” services are only
available to subscribers in Japan.
Touch ID is a registered trademark of Apple, Inc.
iOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license.
Android is a trademark or registered trademark of Google, Inc.
Media Contact
Megan Shamas
Montner Tech PR 203-226-9290
mshamas@montner.com
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved.
Screen Shot Example: d ACCOUNT Login with Touch ID
FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 15
• “Login with Touch ID” button appears in addition to the legacy
ID/password button. Once select to login with Touch ID, easy to login.
d ACCOUNT login screen
supporting Touch ID
d ACCOUNT Touch ID app
encourages you to do Touch ID
If you haven’t installed d ACCOUNT Touch
ID app yet, you encouraged to install it
“Login with Touch ID”
Screen Shot Example: Shopping at d Shopping
© 2016 NTT DOCOMO, INC. All Rights Reserved. 16
• Shopping is the same. Once select to purchase with Touch ID, easy to go.
d ACCOUNT app to support Touch ID on iOS 9 or later works behind of it.
Select what you
purchase, and go next
Authenticate with
Touch ID
d ACCOUNT Touch ID app
encourages you to do Touch ID
That’s it!
FIDO Seminar in Seoul 12/6/2016
How NTT DOCOMO Implements FIDO UAF on iOS
© 2016 NTT DOCOMO, INC. All Rights Reserved. 17
• NTT DOCOMO developed “d ACCOUNT app” for iOS, incorporating Nok
Nok Labs’ FIDO Certified FIDO UAF Client SDK to work with DOCOMO
services and the FIDO-enabled d ACCOUNT server.
• NTT DOCOMO utilizes the Touch ID security feature of Secure Enclave that
enables to keep the FIDO Privacy Policy.
FIDO Seminar in Seoul 12/6/2016 https://support.apple.com/en-us/HT204587
• The recent APIs enabled after iOS 9 help
DOCOMO for friendly-fraud concerns.
d ACCOUNT App
FIDO Client
Touch ID
Secure Enclave
The Same Server Hosts Your Authentication!
© 2016 NTT DOCOMO, INC. All Rights Reserved. 18FIDO Seminar in Seoul 12/6/2016
…
DOCOMO Branded
Services
Carrier Billing
Partner Services
Billing
System ServersSystem Server
SH-01H SO-03H SO-01H SO-02HF-02H F-01H
F-04H SH-04HSO-04H SC-02H SO-02J F-01J SH-02J DM-01JSO-01J L-01J
iOS
Android
NTT DOCOMO as a FIDO Alliance Board Member
• NTT DOCOMO joined FIDO Alliance as a Board of Directors in May 2015,
encouraged by FIDO Alliance with the accomplishment of some world’s
firsts. e.g. as an MNO w/ the world first Iris scanner equipped smartphone.
• NTT DOCOMO is now chairing a WG “Deployment at Scale” in short “D@S”,
where following themes have been addressed and being resolved:
– How to manage non-technical issues in business b/w FIDO authenticator
manufactures and RPs. NOTE: NTT DOCOMO behaves as both…
– How to adopt the FIDO specs – through Case Studies in practice approach…
• Please join FIDO Alliance, join the D@SWG, and let’s make it happen
together!
FIDO Seminar in Seoul 12/6/2016 19© 2016 NTT DOCOMO, INC. All Rights Reserved.
Creating a World without Passwords
“The new of today, the norm of tomorrow.”
• Through collaboration with the FIDO Alliance, NTT DOCOMO
will further deliver “Your Security, More Simple.”
FIDO Seminar in Seoul 12/6/2016 20© 2016 NTT DOCOMO, INC. All Rights Reserved.
https://www.youtube.com/watch?v=QzM4PpXEqP8
References
• 2015 May Announcements
- https://www.nttdocomo.co.jp/english/info/media_center/pr/2015/0526_00.html
Attachment: Biometric Authentication from DOCOMO (PDF format: 957KB)
Movie: Biometric Authentication
- https://fidoalliance.org/fido-alliance-welcomes-ntt-docomo-to-board/
- https://www.qualcomm.com/#/news/releases/2015/05/25
- https://www.noknok.com/what-they-say/press-releases/ntt-docomo-selects-nok-nok-labs-power-
first-fido-enabled-ecosystem
• 2015 September Announcements
- https://www.nttdocomo.co.jp/english/info/media_center/pr/2015/0930_01.html
- https://fidoalliance.org/worlds-first-mobile-network-operator-to-deploy-fido-authentication-ntt-
docomo-extends-its-mobile-innovation-lead-with-new-fido-certified-devices-and-services/
Movie: Biometric Authentication Chapter II
• 2016 March Announcement (There are some more accouchements but in Japanese)
- https://fidoalliance.org/ntt-docomo-rolls-out-fido-biometric-authentication-to-ios-customers/
FIDO Seminar in Seoul 12/6/2016 21© 2016 NTT DOCOMO, INC. All Rights Reserved.

More Related Content

What's hot

KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO Alliance
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APACFIDO Alliance
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinFIDO Alliance
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
UAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoUAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoFIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipFIDO Alliance
 
FIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO Alliance
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
 
LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望FIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanDeployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanFIDO Alliance
 

What's hot (20)

KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
UAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoUAF Case Study by NTT Docomo
UAF Case Study by NTT Docomo
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
FIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Ecosystem in China
FIDO Ecosystem in China
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! JapanDeployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
 

Viewers also liked

TTA’s approach to promoting FIDO standards in Korea
  TTA’s approach to promoting FIDO standards in Korea	  TTA’s approach to promoting FIDO standards in Korea
TTA’s approach to promoting FIDO standards in Korea FIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithW3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithFIDO Alliance
 
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellFIDO Alliance
 
FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance
 
NTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More SimpleNTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More SimpleFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
 
NTT DoCoMo, one true story
NTT DoCoMo, one true storyNTT DoCoMo, one true story
NTT DoCoMo, one true storyerwinsumargo
 
NTT Docomo Case Study - Susan
NTT Docomo Case Study - SusanNTT Docomo Case Study - Susan
NTT Docomo Case Study - Susanelsanora
 
Strategy Proposal: IKEA
Strategy Proposal: IKEAStrategy Proposal: IKEA
Strategy Proposal: IKEARina22
 
Qinetiq Business Strategy Proposal
Qinetiq Business Strategy ProposalQinetiq Business Strategy Proposal
Qinetiq Business Strategy ProposalSascha Michel
 
docomo (report and analysis)
docomo (report and analysis)docomo (report and analysis)
docomo (report and analysis)Gerhard Fasol
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?JoAnna Cheshire
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchJim St. Leger
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 

Viewers also liked (19)

TTA’s approach to promoting FIDO standards in Korea
  TTA’s approach to promoting FIDO standards in Korea	  TTA’s approach to promoting FIDO standards in Korea
TTA’s approach to promoting FIDO standards in Korea
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -SmithW3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
 
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan FIDO Alliance Activity in Japan
FIDO Alliance Activity in Japan
 
NTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More SimpleNTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More Simple
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
NTT DoCoMo, one true story
NTT DoCoMo, one true storyNTT DoCoMo, one true story
NTT DoCoMo, one true story
 
NTT Docomo Case Study - Susan
NTT Docomo Case Study - SusanNTT Docomo Case Study - Susan
NTT Docomo Case Study - Susan
 
NTT DoCoMo : Case Study
NTT DoCoMo : Case StudyNTT DoCoMo : Case Study
NTT DoCoMo : Case Study
 
Strategy Proposal: IKEA
Strategy Proposal: IKEAStrategy Proposal: IKEA
Strategy Proposal: IKEA
 
Qinetiq Business Strategy Proposal
Qinetiq Business Strategy ProposalQinetiq Business Strategy Proposal
Qinetiq Business Strategy Proposal
 
docomo (report and analysis)
docomo (report and analysis)docomo (report and analysis)
docomo (report and analysis)
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 

Similar to NTT DOCOMO Deployment Case Study: Your Security, More Simple.

NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyFIDO Alliance
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
FIDO Adoption and Market Trends in Japan
FIDO Adoption and Market Trends in JapanFIDO Adoption and Market Trends in Japan
FIDO Adoption and Market Trends in JapanFIDO Alliance
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
(2016) uPrism company introduction(eng) v2.5
(2016) uPrism company introduction(eng) v2.5(2016) uPrism company introduction(eng) v2.5
(2016) uPrism company introduction(eng) v2.5Dae Rhee
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationFIDO Alliance
 
Deployment Snapshots from Japan
Deployment Snapshots from JapanDeployment Snapshots from Japan
Deployment Snapshots from JapanFIDO Alliance
 
Automatic Android Telecaller App Using REST API
Automatic Android Telecaller App Using REST APIAutomatic Android Telecaller App Using REST API
Automatic Android Telecaller App Using REST APIIRJET Journal
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO Alliance
 
How Changing Mobile Technology Is Changing The Way We Do Business
How Changing Mobile Technology Is Changing The Way We Do Business How Changing Mobile Technology Is Changing The Way We Do Business
How Changing Mobile Technology Is Changing The Way We Do Business Osaka University
 
11st FIDO Deployment Case Study
11st FIDO Deployment Case Study11st FIDO Deployment Case Study
11st FIDO Deployment Case StudyKi-Eun Shin
 
The Future of Video
The Future of VideoThe Future of Video
The Future of VideoCisco Canada
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionFIDO Alliance
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Alliance
 
MCET WebEx vs Lync competitive analysis,
MCET WebEx vs Lync competitive analysis,MCET WebEx vs Lync competitive analysis,
MCET WebEx vs Lync competitive analysis,dark19921
 
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail Next
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail NextEnergizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail Next
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail NextLuis Guirigay
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT ChallengeFIDO Alliance
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 

Similar to NTT DOCOMO Deployment Case Study: Your Security, More Simple. (20)

NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
FIDO Adoption and Market Trends in Japan
FIDO Adoption and Market Trends in JapanFIDO Adoption and Market Trends in Japan
FIDO Adoption and Market Trends in Japan
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
(2016) uPrism company introduction(eng) v2.5
(2016) uPrism company introduction(eng) v2.5(2016) uPrism company introduction(eng) v2.5
(2016) uPrism company introduction(eng) v2.5
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA Presentation
 
Deployment Snapshots from Japan
Deployment Snapshots from JapanDeployment Snapshots from Japan
Deployment Snapshots from Japan
 
Automatic Android Telecaller App Using REST API
Automatic Android Telecaller App Using REST APIAutomatic Android Telecaller App Using REST API
Automatic Android Telecaller App Using REST API
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
How Changing Mobile Technology Is Changing The Way We Do Business
How Changing Mobile Technology Is Changing The Way We Do Business How Changing Mobile Technology Is Changing The Way We Do Business
How Changing Mobile Technology Is Changing The Way We Do Business
 
11st FIDO Deployment Case Study
11st FIDO Deployment Case Study11st FIDO Deployment Case Study
11st FIDO Deployment Case Study
 
The Future of Video
The Future of VideoThe Future of Video
The Future of Video
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
MCET WebEx vs Lync competitive analysis,
MCET WebEx vs Lync competitive analysis,MCET WebEx vs Lync competitive analysis,
MCET WebEx vs Lync competitive analysis,
 
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail Next
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail NextEnergizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail Next
Energizing IBM Notes Domino Enterprises: Social, Mobile, Cloud and Mail Next
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 

More from FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

NTT DOCOMO Deployment Case Study: Your Security, More Simple.

  • 1. FIDO Alliance Seminar in Seoul NTT DOCOMO Deployment Case Study: “Your Security, More Simple.” December 6, 2016 Koichi Moriyama NTT DOCOMO, INC. FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved.
  • 2. Table of Contents • Motivation: “Your Security, More Simple.” • Overview: NTT DOCOMO’s Deployment • NTT DOCOMO FIDO-enabled Devices for d ACCOUNT™ - 20 Models in Total Video Clip: “Let’s setup, use FIDO-enabled authentication for d ACCOUNT” • Design Principles to Integrate the FIDO Standards • Solution Architecture: Before & After the Deployment • Security Architecture: Biometric Data and Secret Key stored in Secure Area • Open Standards for Future Interoperability • Varieties of FIDO® Certified Authenticator Solutions • Deployment at More Scale – Rolled Out the same to iOS Customers • NTT DOCOMO as a FIDO Alliance Board Member FIDO Seminar in Seoul 12/6/2016 2© 2016 NTT DOCOMO, INC. All Rights Reserved.
  • 3. Motivation: “Your Security, More Simple.” • NTT DOCOMO provides our customers OpenID based “d ACCOUNT” in addition to 4-digit passwords for online service access including DOCOMO branded services, partner services, and carrier billing payments. • NTT DOCOMO wanted to help our customers, who always needed to remember their passwords, for their convenience in a secure way, and recognized that the FIDO standards may help. FIDO Seminar in Seoul 12/6/2016 3© 2016 NTT DOCOMO, INC. All Rights Reserved. https://www.youtube.com/watch?v=UP0DyYk5IXc Iris Fingerprints Passwords-less Authn using Biometrics Login Unlock Carrier Billing Payment
  • 4. Overview: NTT DOCOMO’s Deployment (1/2) • DOCOMO launched FIDO-enabled online authentication with biometric sensor equipped devices for “d ACCOUNT” (a.k.a. docomo ID) login and carrier billing payments from May 2015. DOCOMO has been continuing to extend FIDO-enabled experience, supporting legacy 4-digit pins and others including “d ACCOUNT” carrier billing partners. FIDO Seminar in Seoul 12/6/2016 4© 2016 NTT DOCOMO, INC. All Rights Reserved. Carrier Billing Payment MARKET
  • 5. Overview: NTT DOCOMO’s Deployment (2/2) • NTT DOCOMO selected the FIDO UAF 1.0 standard due to reasons below: 1.) Easy, and fast online authentication using biometrics, 2.) Secure protocol that utilizes public key crypto, and 3.) Open-standard for interoperability in the future. • NTT DOCOMO launched four FIDO® Certified devices and the FIDO- enabled server in May 2015. There were some world firsts, a.) as an MNO, b.) with multiple FIDO Certified devices from multiple OEMs, c.) with the world first Iris scanner equipped smartphone, and d.) for multiple services. FIDO Seminar in Seoul 12/6/2016 5© 2016 NTT DOCOMO, INC. All Rights Reserved.
  • 6. FIDO-enabled Devices for d ACCOUNT 20 Models in Total • 4 models for 2015 Summer, 6 for 2015-16 Winter/Spring, 4 for 2016 Summer, and 6 for 2016-17 Winter/Spring by FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 6 SH-01H SO-03H SO-01H SO-02HF-02HSC-05G SH-04HF-04H SO-04HSC-02H F-04G SC-04G F-01HSH-03G SO-02JF-01J SH-02J DM-01JSO-01J L-01J Coming soon! Coming soon!
  • 7. Video Clip: Let’s setup, let’s use FIDO-enabled biometric authentication for d ACCOUNT! FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 7
  • 8. Design Principles to Integrate the FIDO Standards • Integrate the FIDO standards in a straightforward manner – Create and maintain the FIDO eco-system, and align with it for sustainability • Utilize the FIDO standards as much as possible – Allow different type of authenticators e.g. fingerprint sensors and iris scanner • Protect users and ecosystem partners in consideration of security – Follow the FIDO privacy policy, “Biometric template and private keys never leave devices,” – Realize that genuineness of authenticator shall be securely proven to servers, – Keep the same security level of various devices from multiple OEMs, and – Avoid to generate wrong perception in the market. • Minimize the integration efforts, time and cost – Gather FIDO-enabled service apps to a single point of I/F – d ACCOUNT to ASM FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 8
  • 9. Solution Architecture: d ACCOUNT and 4-digits [before the FIDO integration] • The d ACCOUNT app and system had already been introduced and operated for authentication and single-sign-on experience. FIDO Seminar in Seoul 12/6/2016 9© 2016 NTT DOCOMO, INC. All Rights Reserved. … DOCOMO Branded Devices by OEM Partners Client App Pre-installed … Web Browser Pre-installedService Apps System Server … DOCOMO Branded Services Carrier Billing Partner Services Billing System Servers Launched by Service Apps or Web Browser Authenticate user by ID/Password or 4-digitsID/Password • Single Sign-On
  • 10. Solution Architecture: d ACCOUNT and 4-digits [after the FIDO integration] • The d ACCOUNT app and system had already been introduced and operated for authentication and single-sign-on experience. FIDO Seminar in Seoul 12/6/2016 10© 2016 NTT DOCOMO, INC. All Rights Reserved. DOCOMO Branded Devices by OEM Partners … Web Browser Pre-installedService Apps … DOCOMO Branded Services Carrier Billing Partner Services Billing System Servers FIDO-enabled by xxxx Client SDK FIDO-enabled by Server FIDO-enabled w/ some additional requirements to adopt … In addition to ID/Password • Single Sign-On • Biometric Authentication without Passwords Client App Pre-installed System Server
  • 11. FIDO Enables Online Authentication by Utilizing Biometric Data in a Secure Manner – Biometric Data and Secret Key stored in Secure Area – FIDO Seminar in Seoul 12/6/2016 11© 2016 NTT DOCOMO, INC. All Rights Reserved. Biometric Authentication Device Secure Area (TEE) User Verification through Matching Secure App Secure Folder FIDO Client Verified FIDO Authenticator FIDO Server Challenge Authentication is completed once the Signed Challenge is verified by Public Key Sign the Challenge by Secret Key ✓ ✓ Signed Challenge d ACCOUNT Server d ACCOUNT App Scope of FIDO UAF 1.0 Spec ✓ ✓ Public Key CryptographySecure Protocol Biometric Data Device Server FIDO-enabled services are enhanced gradually… Registered Template Secret Key
  • 12. The FIDO Standards Connect Multiple Services – Open Standards for Future Interoperability – FIDO Seminar in Seoul 12/6/2016 12© 2016 NTT DOCOMO, INC. All Rights Reserved. Standards SH-01H SO-03H SO-01H SO-02HF-02H F-01H F-04H SH-04HSO-04H SC-02H SO-02J F-01J SH-02J DM-01JSO-01J L-01J 2015 Summer models 2015-16 Winter/Spring models 2016 Summer models 2016-17 Winter/Spring models Company A’s Server Company B’s Server Company C’s Server d ACCOUNT DOCOMO Server
  • 13. Implementations of the FIDO Authenticators – Varieties of FIDO® Certified FIDO Authenticator Solutions – • OEMs may choose a FIDO® Certified authenticators solution from a variety of choices in order to meet their requirements. FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 13 FIDO-enabled by xxxx Client SDK FIDO® Certified xxxxx Server FIDO Standards Client App Pre-installed System Server
  • 14. 14 NTT DOCOMO Rolls Out FIDO Biometric Authentication to iOS Customers Underscores rapid market adoption of FIDO as the new standard for strong authentication Mountain View, Calif., March 7, 2016 – The FIDO® Alliance, the cross-industry creators of open standards for simpler, stronger authentication, announced today that Japan’s largest mobile network operator NTT DOCOMO, INC. (“DOCOMO”) has extended its market-leading deployment of FIDO® Certified strong authentication to its millions of customers with Touch ID®-equipped Apple iPhones and other iOS(1) devices. DOCOMO adds this new FIDO-for-iOS capability to an already impressive suite of 10 FIDO Certified Android devices from Samsung, Fujitsu, Sharp, and Sony Mobile, ensuring that their customers enjoy unprecedented choice between platforms, devices and biometric authentication modalities including fingerprint touch, fingerprint swipe, and iris recognition. (1) iOS 9 or later DOCOMO’s decision to add support for FIDO strong authentication to the base capabilities of Touch ID underscores both the security benefits and the rapid market adoption of FIDO standards in just over a year since the specifications were published. Today more than 100 solutions have been FIDO Certified and, in addition to DOCOMO, hundreds of millions of end-users’ web and mobile apps have been FIDO-enabled for strong authentication protection by leading service providers, including Google, PayPal, Samsung, Bank of America, Dropbox, and GitHub. “The expansion of cross-platform support from NTT DOCOMO highlights the growing global consensus that using open standards from FIDO Alliance is the right strategy for moving the connected economy off its dependency on passwords,” said Brett McDowell, executive director of the FIDO Alliance. “As more service providers look to reduce fraud risk and give customers a better, faster user experience, I believe they will be following DOCOMO’s example and deploying cross- platform FIDO-enabled, privacy-respecting biometric authentication that is simultaneously more secure and convenient.” More details on DOCOMO’s FIDO-for-iOS deployment Using FIDO specifications, DOCOMO is enabling its customers to securely authenticate themselves with Touch ID instead of a password to the DOCOMO d ACCOUNT™ app, which will be available in the App Store on March 9. From there, they will have secure access to DOCOMO account details, billing and services, including mobile gaming and music platforms d game™ and d music™, and shopping sites such as d delivery™ and d shopping™. DOCOMO is also removing the password from carrier billing, allowing customers to approve their payments via Touch ID. In a media update about this news, DOCOMO said, “The app will encourage more DOCOMO partner companies to incorporate the FIDO standard as users demand biometric authentication for an increasingly diverse range of mobile handsets.” “d ACCOUNT,” “d game,” “d music,” “d delivery,” and “d shopping” are trademarks or registered trademarks of NTT DOCOMO, INC. NTT DOCOMO’s “d ACCOUNT,” “d delivery” and “d shopping” services are only available to subscribers in Japan. Touch ID is a registered trademark of Apple, Inc. iOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. Android is a trademark or registered trademark of Google, Inc. Media Contact Megan Shamas Montner Tech PR 203-226-9290 mshamas@montner.com FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved.
  • 15. Screen Shot Example: d ACCOUNT Login with Touch ID FIDO Seminar in Seoul 12/6/2016 © 2016 NTT DOCOMO, INC. All Rights Reserved. 15 • “Login with Touch ID” button appears in addition to the legacy ID/password button. Once select to login with Touch ID, easy to login. d ACCOUNT login screen supporting Touch ID d ACCOUNT Touch ID app encourages you to do Touch ID If you haven’t installed d ACCOUNT Touch ID app yet, you encouraged to install it “Login with Touch ID”
  • 16. Screen Shot Example: Shopping at d Shopping © 2016 NTT DOCOMO, INC. All Rights Reserved. 16 • Shopping is the same. Once select to purchase with Touch ID, easy to go. d ACCOUNT app to support Touch ID on iOS 9 or later works behind of it. Select what you purchase, and go next Authenticate with Touch ID d ACCOUNT Touch ID app encourages you to do Touch ID That’s it! FIDO Seminar in Seoul 12/6/2016
  • 17. How NTT DOCOMO Implements FIDO UAF on iOS © 2016 NTT DOCOMO, INC. All Rights Reserved. 17 • NTT DOCOMO developed “d ACCOUNT app” for iOS, incorporating Nok Nok Labs’ FIDO Certified FIDO UAF Client SDK to work with DOCOMO services and the FIDO-enabled d ACCOUNT server. • NTT DOCOMO utilizes the Touch ID security feature of Secure Enclave that enables to keep the FIDO Privacy Policy. FIDO Seminar in Seoul 12/6/2016 https://support.apple.com/en-us/HT204587 • The recent APIs enabled after iOS 9 help DOCOMO for friendly-fraud concerns. d ACCOUNT App FIDO Client Touch ID Secure Enclave
  • 18. The Same Server Hosts Your Authentication! © 2016 NTT DOCOMO, INC. All Rights Reserved. 18FIDO Seminar in Seoul 12/6/2016 … DOCOMO Branded Services Carrier Billing Partner Services Billing System ServersSystem Server SH-01H SO-03H SO-01H SO-02HF-02H F-01H F-04H SH-04HSO-04H SC-02H SO-02J F-01J SH-02J DM-01JSO-01J L-01J iOS Android
  • 19. NTT DOCOMO as a FIDO Alliance Board Member • NTT DOCOMO joined FIDO Alliance as a Board of Directors in May 2015, encouraged by FIDO Alliance with the accomplishment of some world’s firsts. e.g. as an MNO w/ the world first Iris scanner equipped smartphone. • NTT DOCOMO is now chairing a WG “Deployment at Scale” in short “D@S”, where following themes have been addressed and being resolved: – How to manage non-technical issues in business b/w FIDO authenticator manufactures and RPs. NOTE: NTT DOCOMO behaves as both… – How to adopt the FIDO specs – through Case Studies in practice approach… • Please join FIDO Alliance, join the D@SWG, and let’s make it happen together! FIDO Seminar in Seoul 12/6/2016 19© 2016 NTT DOCOMO, INC. All Rights Reserved.
  • 20. Creating a World without Passwords “The new of today, the norm of tomorrow.” • Through collaboration with the FIDO Alliance, NTT DOCOMO will further deliver “Your Security, More Simple.” FIDO Seminar in Seoul 12/6/2016 20© 2016 NTT DOCOMO, INC. All Rights Reserved. https://www.youtube.com/watch?v=QzM4PpXEqP8
  • 21. References • 2015 May Announcements - https://www.nttdocomo.co.jp/english/info/media_center/pr/2015/0526_00.html Attachment: Biometric Authentication from DOCOMO (PDF format: 957KB) Movie: Biometric Authentication - https://fidoalliance.org/fido-alliance-welcomes-ntt-docomo-to-board/ - https://www.qualcomm.com/#/news/releases/2015/05/25 - https://www.noknok.com/what-they-say/press-releases/ntt-docomo-selects-nok-nok-labs-power- first-fido-enabled-ecosystem • 2015 September Announcements - https://www.nttdocomo.co.jp/english/info/media_center/pr/2015/0930_01.html - https://fidoalliance.org/worlds-first-mobile-network-operator-to-deploy-fido-authentication-ntt- docomo-extends-its-mobile-innovation-lead-with-new-fido-certified-devices-and-services/ Movie: Biometric Authentication Chapter II • 2016 March Announcement (There are some more accouchements but in Japanese) - https://fidoalliance.org/ntt-docomo-rolls-out-fido-biometric-authentication-to-ios-customers/ FIDO Seminar in Seoul 12/6/2016 21© 2016 NTT DOCOMO, INC. All Rights Reserved.