Hochiminh City University of Technology
Faculty of Computer Science and Engineering
Mobile Identity
Present:
Nguyen Thi Th...
OUTLINE
• Introduction
• Mobile identity authentication
• Mobile Identity Management
• Q&A
2
Introduction
• Mobile devices
– Mobile phones
– Smart cards
– RFIDs
3
Introduction
• Elements of a mobile identity
– Information describe a mobile user’s identity.
– Technical access to compon...
Introduction
• User Identity
– Something I know
• username, password or PIN
5
Introduction
• User Identity
– Something I know
– Something I have
• SIM card and mobile device
6
Introduction
• User Identity
– Something I know
– Something I have
– Something I am
• location, behavioural profile or bio...
Mobile identity authentication
• SIM card:
– Tampered resistant module providing strong
authentication to Internet applica...
Mobile identity authentication
• SIM card:
– Include:
• International Mobile Subscriber Identity
• strong encryption funct...
Mobile identity authentication
• SIM card:
– GSM authentication
• Random challenge: RAND
• 64-bit session key Kc  128-bit...
Mobile identity authentication
• Mobile Digital Signature
– Proving your real-world identity to third parties.
– Making a ...
Mobile identity authentication
• Use RSA private key in SIM card.
12
Mobile Identity Management
• GSM-based Mobile Identity Management
– Profile management
• the information may be encrypted ...
Mobile Identity Management
• GSM-based Mobile Identity Management
– Profile management
– Exchanging mobile identities
• Th...
Mobile Identity Management
• GSM-based Mobile Identity Management
– Profile management
– Exchanging mobile identities
– Ap...
Mobile Identity Management
• Mobile Identity Management System Target:
– Easy identity management & application access
– S...
Mobile Identity Management
• Mobile Identity Management System
17
Mobile Identity Management
• Authentication in Mobile Identity
Management System
– 3-factor authentication
• Smart cards t...
Q&A
19
Upcoming SlideShare
Loading in …5
×

Mobile identity in network

533 views

Published on

Published in: Mobile, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
533
On SlideShare
0
From Embeds
0
Number of Embeds
195
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mobile identity in network

  1. 1. Hochiminh City University of Technology Faculty of Computer Science and Engineering Mobile Identity Present: Nguyen Thi Thuy Loan 1
  2. 2. OUTLINE • Introduction • Mobile identity authentication • Mobile Identity Management • Q&A 2
  3. 3. Introduction • Mobile devices – Mobile phones – Smart cards – RFIDs 3
  4. 4. Introduction • Elements of a mobile identity – Information describe a mobile user’s identity. – Technical access to components of a mobile identity. – Third parties and exchange information. 4
  5. 5. Introduction • User Identity – Something I know • username, password or PIN 5
  6. 6. Introduction • User Identity – Something I know – Something I have • SIM card and mobile device 6
  7. 7. Introduction • User Identity – Something I know – Something I have – Something I am • location, behavioural profile or biometric parameter 7
  8. 8. Mobile identity authentication • SIM card: – Tampered resistant module providing strong authentication to Internet applications and services. 8
  9. 9. Mobile identity authentication • SIM card: – Include: • International Mobile Subscriber Identity • strong encryption functions 9
  10. 10. Mobile identity authentication • SIM card: – GSM authentication • Random challenge: RAND • 64-bit session key Kc  128-bit • Response value SRES 10
  11. 11. Mobile identity authentication • Mobile Digital Signature – Proving your real-world identity to third parties. – Making a legally-binding commitment by sending a confirmed message to another party. – Solve security problems of the online world with identity confirmation 11
  12. 12. Mobile identity authentication • Use RSA private key in SIM card. 12
  13. 13. Mobile Identity Management • GSM-based Mobile Identity Management – Profile management • the information may be encrypted before it is stored on the device or transmitted to the network operator. 13
  14. 14. Mobile Identity Management • GSM-based Mobile Identity Management – Profile management – Exchanging mobile identities • The current legal landscape already limits the way of how to reveal mobile identity information. 14
  15. 15. Mobile Identity Management • GSM-based Mobile Identity Management – Profile management – Exchanging mobile identities – Applications for mobile identities • marketing service, disaster service. 15
  16. 16. Mobile Identity Management • Mobile Identity Management System Target: – Easy identity management & application access – Secure and controlled mobile authentication – Works with native and web based mobile apps 16
  17. 17. Mobile Identity Management • Mobile Identity Management System 17
  18. 18. Mobile Identity Management • Authentication in Mobile Identity Management System – 3-factor authentication • Smart cards that store a biometric matching template • Smart cards store the biometric matching template and the matching algorithm on the card • Tokens provide the full biometric authentication process (sensors, feature extraction to acquire a query template from the biometric measurement 18
  19. 19. Q&A 19

×