ICON PITCH:  iMinds 16/12/2010 Andreas Pashalidis COSIC / K.U.Leuven
Who are we? <ul><li>IBBT-K.U.Leuven Security department (COSIC) </li></ul><ul><li>Preliminary contacts with some possible ...
Context and Need <ul><li>Mobile network operators are introducing  mobile wallets . </li></ul><ul><li>EXAMPLE USE CASE </l...
Research Goals <ul><li>Advanced authentication methods for mobile platforms </li></ul><ul><ul><li>Biometric voice authenti...
Looking for… <ul><li>Voice / VoiP biometrics & recognition </li></ul><ul><li>Fraud detection </li></ul><ul><li>Authenticat...
Upcoming SlideShare
Loading in …5
×

A. Pashalidis - Advanced authentication for Mobile Platforms

548 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
548
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

A. Pashalidis - Advanced authentication for Mobile Platforms

  1. 1. ICON PITCH: iMinds 16/12/2010 Andreas Pashalidis COSIC / K.U.Leuven
  2. 2. Who are we? <ul><li>IBBT-K.U.Leuven Security department (COSIC) </li></ul><ul><li>Preliminary contacts with some possible industrial partners </li></ul>
  3. 3. Context and Need <ul><li>Mobile network operators are introducing mobile wallets . </li></ul><ul><li>EXAMPLE USE CASE </li></ul><ul><ul><li>Remittance (money sent home by migrants) constitutes the second largest financial inflow to many developing countries; overall $316 billion in 2009 [world bank]. </li></ul></ul><ul><ul><li>Transaction costs remain high in many cases (see http://remittanceprices.worldbank.org; e.g. sending $200 from Germany to Croatia costs more than $36 on average) </li></ul></ul><ul><li>The challenge is to make sure that the right people take part in international transactions & reduce fraud. </li></ul>
  4. 4. Research Goals <ul><li>Advanced authentication methods for mobile platforms </li></ul><ul><ul><li>Biometric voice authentication </li></ul></ul><ul><ul><li>Spoken passwords, security questions </li></ul></ul><ul><ul><li>Transaction authentication </li></ul></ul><ul><li>Meaningful combinations based on e.g. dynamic risk assessment </li></ul><ul><li>Ensure privacy preservation </li></ul><ul><li>Build a demonstrator </li></ul>
  5. 5. Looking for… <ul><li>Voice / VoiP biometrics & recognition </li></ul><ul><li>Fraud detection </li></ul><ul><li>Authentication solution providers </li></ul><ul><ul><li>Hardware & Software tokens </li></ul></ul><ul><ul><li>MNOs </li></ul></ul><ul><li>Partners with expertise in charging & billing </li></ul><ul><li>System integrators / software providers </li></ul>

×