SlideShare a Scribd company logo
1 of 14
Download to read offline
LOC-AID Technologies




        1+1=3 Combining IP Intelligence and
           Mobile Network Location for
                 Authentication



                  September 27, 2012
                   San Francisco, CA


                  Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 1
Locaid is Location-as-a-Service

Locaid Locates           Every Device                          On Every                                   For Any
                                                               Network                                 Location Need

   Locaid runs the          Locaid finds any             Locaid reaches 365M                                  Locaid delivers
     largest LaaS        connected device on                   devices.                                    ubiquitous location.
 gateway to mobile      the network including            No app to download.                                 Indoors and out.
  carrier networks        desktops, laptops,            No user action needed.                                 Geofencing, IP
    and internet .         consoles, tablets,                Any device.                                   Location, WiFi, SMS,
                         telematics and m2m                   Anywhere.                                      Global coverage,
                                devices.                                                                       Landlines, and
                                                                                                            location analytics.




                                                                        The world’s first and largest
                                                                              LaaS company


                                          Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 2
One API for Any Location Source




                          LOCATION-AS-A-SERVICE




Landline     Global Cell-ID   Carrier Cell-ID + aGPS                   IP Location               WiFi (BSS ID & MAC)




                                   Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 3
What is Geo IP Location?

                                • Location and other important
                                  information can be gleaned by a web
                                  user’s IP (Internet Protocol) address.
                                • Location information about the
                                  connection, such as lat/long, state, zip
                                  code can be provided in real-time
                                • Geo IP location works with all web
                                  browsers, is non-invasive, does not
                                  involve cookies or violate any privacy
                                  regulations.
                                • It works because a unique identifier is
                                  assigned to any device (computer,
                                  Xbox, smartphone) connected to the
                                  Internet. It is a “connection address.”




              Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 4
IP Location

                                      • Locate a device via an IP address down
                                        to the ZIP code level. IP address data
IP Intelligence
                                        is embedded in firewalls, ad servers,
                                        routing, mail systems, web sites, etc.
                                      • In addition to location information
                                        (country, state, city, ZIP and lat/long)
                                        Locaid IP Location delivers DMA,
                                        connection type, IP Routing type,
                                        carrier and other data
                                      • We also offer Anonymizer status and
                                        User Type information
                                      • Available as a webservice. One API
                                        that can locate any device connected
                                        to the Internet (desktop, laptop,
                                        tablet, smartphone, etc.)



                    Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 5
What Can You Find Out About an IP Address?

                                                              • This is my home IP address. It does
IP address = 69.228.195.68
•   Continent: North America
                                                                not reveal any personal information
•   Country: US                                                 (CPNI).
•   State: California
•   City: Saratoga
                                                              • But you can glean much from this data.
•   Zip Code: 95070                                             I am located in California, in Saratoga.
•   Area Code: 408                                              You also know my zip code, area code
•   Time Zone: UTC/GMT -8 hours                                 and DMA.
•   Latitude/Longitude: 37.263 / -122.021
•   DMA: 803                                                  • You also know that I use DSL (but that I
•   MSA: 41940                                                  didn’t pay for the really fast version).
•   ASN: 4355                                                   But I still can view rich media.
•   ISP: AT&T Internet Services
•   Top Level Domain: .net                                    • You also know that I am not using an
•   Second Level Domain: PacBell                                anonymous proxy – that I am not
•   IP Routing Type: Fixed
                                                                trying to deliberately hide my location.
•   Connection Type: DSL
•   Connection Speed: Medium
                                                                So I am probably not a fraudster.
•   Anonymizer Proxy in Use: No
                                                              • If I was connected from a Global 1000
                                                                company, or major institution, you
                                                                could also identify my industry code

                                            Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 6
1 + 1 = 3 Two-Factor Location Authentication




             +




                 Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 7
What can you do with Locaid IP Location?

• Create relevance with site visitors, drive revenue for online
  marketing, ensure content is delivered to right areas.
• Marketing and Advertising
   ‒ Redirect web pages based on visitor’s location
   ‒ Web traffic analytics
   ‒ Geo targeting for increased sales and click-through

• Compliance and Authentication
   ‒ Detect and prevent password sharing or abuse of service
   ‒ Card Not Present, detect and reduce credit card fraud
   ‒ Filter access from countries you do not do business with
   ‒ Gaming regulatory compliance
   ‒ Digital rights management (DRM)




                                       Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 8
Use Case: Visitor Risk Profiling

• Location specific risk (e.g. countries)
• Risky connection types (e.g. satellite, dial-up, anonymizers)
• Risky domain information (e.g. risky ISP, unsafe domains)
• IP location compared to registered or shipping address




                                Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 9
IP Use Case: Real-Time Risk Detection

• Impossible travel
• Surge in connections from one location/ISP or account
• Unusual time for location
                                                       Nov 10 2009      3:41:34           rogers cable
                                                       Nov 10 2009      3:41:44           primatel
                                                       Nov 10 2009      3:42:01           safelink internet
                                                       Nov 10 2009      3:42:21           alcatel canada
                                                       Nov 10 2009      3:42:24           safelink internet
                                                       Nov 10 2009      3:43:06           safelink internet
                                                       Nov 10 2009      3:43:09           rogers cable
                                                       Nov 10 2009      3:43:14           safelink internet
                                                       Nov 10 2009      3:43:25           safelink internet
                                                       Nov 10 2009      3:43:28           safelink internet




                              Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 10
IP Use Case: Anomalous Behavior Detection

• Current location vs. historical locations
• Change in ISP


                                     Nov 10 2009                        perry             sympatico
                                     Nov 14 2009                        perry             sympatico
                                     Dec 22 2009                        perry             sympatico
                                     Jan 09 2010                        perry             sympatico
                                     Jan 10 2010                        perry             sympatico
                                     Feb 21 2010                        perry             sympatico
                                     Mar 01 2010                        perry             sympatico
                                     Mar 30 2010                        perry             sympatico
                                     Apr 03 2010                        perry             sympatico
                                     Apr 07 2010                        perry             at&t wireless




                               Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 11
Additional Capabilities from IP Location

• Reduction of false positives
   ‒ Consistency
      More important than getting a city name correct
      Critical when comparing current behavior to past
      Obtained by using lat/long instead of city, ASN instead of ISP
   ‒ Confidence Factors
      Low confidence data can cause false positives
   ‒ Accuracy
• Advanced data
   ‒ Combinations of data
      30 miles intra-country is different from 30 miles across a border
   ‒ Network Characteristics
• Relevant human-readable data
   ‒ Customer service representatives need data when talking to customers
• Forensic Analytics


                                        Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 12
1 + 1 = 3 Two-Factor Location Authentication



                                  +

• Fast                                               • Accurate
• Inexpensive                                        • Reliable
• Extensive information                              • Produced in “real time”



Select individual or multiple location services based on the use
requirements. The extensive information contained in the fast and
inexpensive IP data can be used to determine whether to add or substitute
Network Mobile Location data.




                                   Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 13
IP Location Resources
www.loc-aid.com/ip_location_intelligence

                                          Walter Beisheim
                                       wbeisheim@loc-aid.com


  © 2012 Locaid Technologies, Inc. Intellectual Property. All rights reserved. All other marks contained herein are the property of their respective owners.

More Related Content

What's hot

Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloMundo Contact
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCloudIDSummit
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobilezan
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .amritpal singh
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)Shail Shah
 
e-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentatione-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentationSTARSSIP LIMITED
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMSaraswathiRamalingam
 

What's hot (17)

Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Myip
MyipMyip
Myip
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless microservers
Wireless microserversWireless microservers
Wireless microservers
 
Fernando Kanacri - Nokia
Fernando Kanacri - NokiaFernando Kanacri - Nokia
Fernando Kanacri - Nokia
 
e-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentatione-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentation
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
 
Gline Networks - What we do
Gline Networks - What we doGline Networks - What we do
Gline Networks - What we do
 
Unit 3
Unit 3Unit 3
Unit 3
 

Viewers also liked

Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesLocaid Technologies
 
The tier application
The tier applicationThe tier application
The tier applicationalyciak33
 
Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Mike Bear
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTERicardo Rodriguez
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCAlejandro Videla
 
Wounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringWounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringTimothy Higgins
 
Oral presentation english i nivel 4
Oral presentation english i nivel 4Oral presentation english i nivel 4
Oral presentation english i nivel 4gracielaballestander
 
Mapping the new economy
Mapping the new economyMapping the new economy
Mapping the new economygt2012
 
Hydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersHydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersTimothy Higgins
 

Viewers also liked (20)

What's New in Location
What's New in LocationWhat's New in Location
What's New in Location
 
Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success Stories
 
The tier application
The tier applicationThe tier application
The tier application
 
Up in smoke
Up in smokeUp in smoke
Up in smoke
 
Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
 
706 - Pets and dolls
706 - Pets and dolls706 - Pets and dolls
706 - Pets and dolls
 
651- Greedy squirrel
651- Greedy squirrel651- Greedy squirrel
651- Greedy squirrel
 
Wounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringWounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer Mentoring
 
Giving back
Giving backGiving back
Giving back
 
Oral presentation english i nivel 4
Oral presentation english i nivel 4Oral presentation english i nivel 4
Oral presentation english i nivel 4
 
921 my cats-1.pps
921 my cats-1.pps921 my cats-1.pps
921 my cats-1.pps
 
Mapping the new economy
Mapping the new economyMapping the new economy
Mapping the new economy
 
Realtor Referral Program
Realtor Referral ProgramRealtor Referral Program
Realtor Referral Program
 
Mitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck CrashesMitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck Crashes
 
NDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. RilettNDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. Rilett
 
Student Presentation- ISU
Student Presentation- ISUStudent Presentation- ISU
Student Presentation- ISU
 
MATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia DabipiMATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia Dabipi
 
Hydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersHydration Hints for Marathon Runners
Hydration Hints for Marathon Runners
 

Similar to 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout PresentationFiroze Hussain
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility InsightsJoe Robens
 
LocalSocial Overview Q409v3
LocalSocial Overview Q409v3LocalSocial Overview Q409v3
LocalSocial Overview Q409v3Sean O'Sullivan
 
IP Geolocation Demystified
IP Geolocation  DemystifiedIP Geolocation  Demystified
IP Geolocation DemystifiedBigDataCloudAPI
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneurgetsocialize
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseMead Eblan
 
Socialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategistsSocialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategistsgetsocialize
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoTOliver Müller
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxyBU
 
RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop PresentationPeter Kaptein
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocationmoduledesign
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 

Similar to 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication (20)

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
Web identity part1
Web identity part1Web identity part1
Web identity part1
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
My Phone Stole My Credit Card
My Phone Stole My Credit CardMy Phone Stole My Credit Card
My Phone Stole My Credit Card
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
LocalSocial Overview Q409v3
LocalSocial Overview Q409v3LocalSocial Overview Q409v3
LocalSocial Overview Q409v3
 
IP Geolocation Demystified
IP Geolocation  DemystifiedIP Geolocation  Demystified
IP Geolocation Demystified
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneur
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
 
Socialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategistsSocialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategists
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 
Manika
ManikaManika
Manika
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxy
 
RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop Presentation
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
 
Artilium Location
Artilium LocationArtilium Location
Artilium Location
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 

Recently uploaded

SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTxtailishbaloch
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 

Recently uploaded (20)

SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENTSIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
SIM INFORMATION SYSTEM: REVOLUTIONIZING DATA MANAGEMENT
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 

1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication

  • 1. LOC-AID Technologies 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication September 27, 2012 San Francisco, CA Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 1
  • 2. Locaid is Location-as-a-Service Locaid Locates Every Device On Every For Any Network Location Need Locaid runs the Locaid finds any Locaid reaches 365M Locaid delivers largest LaaS connected device on devices. ubiquitous location. gateway to mobile the network including No app to download. Indoors and out. carrier networks desktops, laptops, No user action needed. Geofencing, IP and internet . consoles, tablets, Any device. Location, WiFi, SMS, telematics and m2m Anywhere. Global coverage, devices. Landlines, and location analytics. The world’s first and largest LaaS company Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 2
  • 3. One API for Any Location Source LOCATION-AS-A-SERVICE Landline Global Cell-ID Carrier Cell-ID + aGPS IP Location WiFi (BSS ID & MAC) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 3
  • 4. What is Geo IP Location? • Location and other important information can be gleaned by a web user’s IP (Internet Protocol) address. • Location information about the connection, such as lat/long, state, zip code can be provided in real-time • Geo IP location works with all web browsers, is non-invasive, does not involve cookies or violate any privacy regulations. • It works because a unique identifier is assigned to any device (computer, Xbox, smartphone) connected to the Internet. It is a “connection address.” Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 4
  • 5. IP Location • Locate a device via an IP address down to the ZIP code level. IP address data IP Intelligence is embedded in firewalls, ad servers, routing, mail systems, web sites, etc. • In addition to location information (country, state, city, ZIP and lat/long) Locaid IP Location delivers DMA, connection type, IP Routing type, carrier and other data • We also offer Anonymizer status and User Type information • Available as a webservice. One API that can locate any device connected to the Internet (desktop, laptop, tablet, smartphone, etc.) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 5
  • 6. What Can You Find Out About an IP Address? • This is my home IP address. It does IP address = 69.228.195.68 • Continent: North America not reveal any personal information • Country: US (CPNI). • State: California • City: Saratoga • But you can glean much from this data. • Zip Code: 95070 I am located in California, in Saratoga. • Area Code: 408 You also know my zip code, area code • Time Zone: UTC/GMT -8 hours and DMA. • Latitude/Longitude: 37.263 / -122.021 • DMA: 803 • You also know that I use DSL (but that I • MSA: 41940 didn’t pay for the really fast version). • ASN: 4355 But I still can view rich media. • ISP: AT&T Internet Services • Top Level Domain: .net • You also know that I am not using an • Second Level Domain: PacBell anonymous proxy – that I am not • IP Routing Type: Fixed trying to deliberately hide my location. • Connection Type: DSL • Connection Speed: Medium So I am probably not a fraudster. • Anonymizer Proxy in Use: No • If I was connected from a Global 1000 company, or major institution, you could also identify my industry code Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 6
  • 7. 1 + 1 = 3 Two-Factor Location Authentication + Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 7
  • 8. What can you do with Locaid IP Location? • Create relevance with site visitors, drive revenue for online marketing, ensure content is delivered to right areas. • Marketing and Advertising ‒ Redirect web pages based on visitor’s location ‒ Web traffic analytics ‒ Geo targeting for increased sales and click-through • Compliance and Authentication ‒ Detect and prevent password sharing or abuse of service ‒ Card Not Present, detect and reduce credit card fraud ‒ Filter access from countries you do not do business with ‒ Gaming regulatory compliance ‒ Digital rights management (DRM) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 8
  • 9. Use Case: Visitor Risk Profiling • Location specific risk (e.g. countries) • Risky connection types (e.g. satellite, dial-up, anonymizers) • Risky domain information (e.g. risky ISP, unsafe domains) • IP location compared to registered or shipping address Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 9
  • 10. IP Use Case: Real-Time Risk Detection • Impossible travel • Surge in connections from one location/ISP or account • Unusual time for location Nov 10 2009 3:41:34 rogers cable Nov 10 2009 3:41:44 primatel Nov 10 2009 3:42:01 safelink internet Nov 10 2009 3:42:21 alcatel canada Nov 10 2009 3:42:24 safelink internet Nov 10 2009 3:43:06 safelink internet Nov 10 2009 3:43:09 rogers cable Nov 10 2009 3:43:14 safelink internet Nov 10 2009 3:43:25 safelink internet Nov 10 2009 3:43:28 safelink internet Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 10
  • 11. IP Use Case: Anomalous Behavior Detection • Current location vs. historical locations • Change in ISP Nov 10 2009 perry sympatico Nov 14 2009 perry sympatico Dec 22 2009 perry sympatico Jan 09 2010 perry sympatico Jan 10 2010 perry sympatico Feb 21 2010 perry sympatico Mar 01 2010 perry sympatico Mar 30 2010 perry sympatico Apr 03 2010 perry sympatico Apr 07 2010 perry at&t wireless Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 11
  • 12. Additional Capabilities from IP Location • Reduction of false positives ‒ Consistency More important than getting a city name correct Critical when comparing current behavior to past Obtained by using lat/long instead of city, ASN instead of ISP ‒ Confidence Factors Low confidence data can cause false positives ‒ Accuracy • Advanced data ‒ Combinations of data 30 miles intra-country is different from 30 miles across a border ‒ Network Characteristics • Relevant human-readable data ‒ Customer service representatives need data when talking to customers • Forensic Analytics Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 12
  • 13. 1 + 1 = 3 Two-Factor Location Authentication + • Fast • Accurate • Inexpensive • Reliable • Extensive information • Produced in “real time” Select individual or multiple location services based on the use requirements. The extensive information contained in the fast and inexpensive IP data can be used to determine whether to add or substitute Network Mobile Location data. Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 13
  • 14. IP Location Resources www.loc-aid.com/ip_location_intelligence Walter Beisheim wbeisheim@loc-aid.com © 2012 Locaid Technologies, Inc. Intellectual Property. All rights reserved. All other marks contained herein are the property of their respective owners.