SlideShare a Scribd company logo
LOC-AID Technologies




        1+1=3 Combining IP Intelligence and
           Mobile Network Location for
                 Authentication



                  September 27, 2012
                   San Francisco, CA


                  Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 1
Locaid is Location-as-a-Service

Locaid Locates           Every Device                          On Every                                   For Any
                                                               Network                                 Location Need

   Locaid runs the          Locaid finds any             Locaid reaches 365M                                  Locaid delivers
     largest LaaS        connected device on                   devices.                                    ubiquitous location.
 gateway to mobile      the network including            No app to download.                                 Indoors and out.
  carrier networks        desktops, laptops,            No user action needed.                                 Geofencing, IP
    and internet .         consoles, tablets,                Any device.                                   Location, WiFi, SMS,
                         telematics and m2m                   Anywhere.                                      Global coverage,
                                devices.                                                                       Landlines, and
                                                                                                            location analytics.




                                                                        The world’s first and largest
                                                                              LaaS company


                                          Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 2
One API for Any Location Source




                          LOCATION-AS-A-SERVICE




Landline     Global Cell-ID   Carrier Cell-ID + aGPS                   IP Location               WiFi (BSS ID & MAC)




                                   Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 3
What is Geo IP Location?

                                • Location and other important
                                  information can be gleaned by a web
                                  user’s IP (Internet Protocol) address.
                                • Location information about the
                                  connection, such as lat/long, state, zip
                                  code can be provided in real-time
                                • Geo IP location works with all web
                                  browsers, is non-invasive, does not
                                  involve cookies or violate any privacy
                                  regulations.
                                • It works because a unique identifier is
                                  assigned to any device (computer,
                                  Xbox, smartphone) connected to the
                                  Internet. It is a “connection address.”




              Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 4
IP Location

                                      • Locate a device via an IP address down
                                        to the ZIP code level. IP address data
IP Intelligence
                                        is embedded in firewalls, ad servers,
                                        routing, mail systems, web sites, etc.
                                      • In addition to location information
                                        (country, state, city, ZIP and lat/long)
                                        Locaid IP Location delivers DMA,
                                        connection type, IP Routing type,
                                        carrier and other data
                                      • We also offer Anonymizer status and
                                        User Type information
                                      • Available as a webservice. One API
                                        that can locate any device connected
                                        to the Internet (desktop, laptop,
                                        tablet, smartphone, etc.)



                    Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 5
What Can You Find Out About an IP Address?

                                                              • This is my home IP address. It does
IP address = 69.228.195.68
•   Continent: North America
                                                                not reveal any personal information
•   Country: US                                                 (CPNI).
•   State: California
•   City: Saratoga
                                                              • But you can glean much from this data.
•   Zip Code: 95070                                             I am located in California, in Saratoga.
•   Area Code: 408                                              You also know my zip code, area code
•   Time Zone: UTC/GMT -8 hours                                 and DMA.
•   Latitude/Longitude: 37.263 / -122.021
•   DMA: 803                                                  • You also know that I use DSL (but that I
•   MSA: 41940                                                  didn’t pay for the really fast version).
•   ASN: 4355                                                   But I still can view rich media.
•   ISP: AT&T Internet Services
•   Top Level Domain: .net                                    • You also know that I am not using an
•   Second Level Domain: PacBell                                anonymous proxy – that I am not
•   IP Routing Type: Fixed
                                                                trying to deliberately hide my location.
•   Connection Type: DSL
•   Connection Speed: Medium
                                                                So I am probably not a fraudster.
•   Anonymizer Proxy in Use: No
                                                              • If I was connected from a Global 1000
                                                                company, or major institution, you
                                                                could also identify my industry code

                                            Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 6
1 + 1 = 3 Two-Factor Location Authentication




             +




                 Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 7
What can you do with Locaid IP Location?

• Create relevance with site visitors, drive revenue for online
  marketing, ensure content is delivered to right areas.
• Marketing and Advertising
   ‒ Redirect web pages based on visitor’s location
   ‒ Web traffic analytics
   ‒ Geo targeting for increased sales and click-through

• Compliance and Authentication
   ‒ Detect and prevent password sharing or abuse of service
   ‒ Card Not Present, detect and reduce credit card fraud
   ‒ Filter access from countries you do not do business with
   ‒ Gaming regulatory compliance
   ‒ Digital rights management (DRM)




                                       Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 8
Use Case: Visitor Risk Profiling

• Location specific risk (e.g. countries)
• Risky connection types (e.g. satellite, dial-up, anonymizers)
• Risky domain information (e.g. risky ISP, unsafe domains)
• IP location compared to registered or shipping address




                                Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 9
IP Use Case: Real-Time Risk Detection

• Impossible travel
• Surge in connections from one location/ISP or account
• Unusual time for location
                                                       Nov 10 2009      3:41:34           rogers cable
                                                       Nov 10 2009      3:41:44           primatel
                                                       Nov 10 2009      3:42:01           safelink internet
                                                       Nov 10 2009      3:42:21           alcatel canada
                                                       Nov 10 2009      3:42:24           safelink internet
                                                       Nov 10 2009      3:43:06           safelink internet
                                                       Nov 10 2009      3:43:09           rogers cable
                                                       Nov 10 2009      3:43:14           safelink internet
                                                       Nov 10 2009      3:43:25           safelink internet
                                                       Nov 10 2009      3:43:28           safelink internet




                              Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 10
IP Use Case: Anomalous Behavior Detection

• Current location vs. historical locations
• Change in ISP


                                     Nov 10 2009                        perry             sympatico
                                     Nov 14 2009                        perry             sympatico
                                     Dec 22 2009                        perry             sympatico
                                     Jan 09 2010                        perry             sympatico
                                     Jan 10 2010                        perry             sympatico
                                     Feb 21 2010                        perry             sympatico
                                     Mar 01 2010                        perry             sympatico
                                     Mar 30 2010                        perry             sympatico
                                     Apr 03 2010                        perry             sympatico
                                     Apr 07 2010                        perry             at&t wireless




                               Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 11
Additional Capabilities from IP Location

• Reduction of false positives
   ‒ Consistency
      More important than getting a city name correct
      Critical when comparing current behavior to past
      Obtained by using lat/long instead of city, ASN instead of ISP
   ‒ Confidence Factors
      Low confidence data can cause false positives
   ‒ Accuracy
• Advanced data
   ‒ Combinations of data
      30 miles intra-country is different from 30 miles across a border
   ‒ Network Characteristics
• Relevant human-readable data
   ‒ Customer service representatives need data when talking to customers
• Forensic Analytics


                                        Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 12
1 + 1 = 3 Two-Factor Location Authentication



                                  +

• Fast                                               • Accurate
• Inexpensive                                        • Reliable
• Extensive information                              • Produced in “real time”



Select individual or multiple location services based on the use
requirements. The extensive information contained in the fast and
inexpensive IP data can be used to determine whether to add or substitute
Network Mobile Location data.




                                   Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 13
IP Location Resources
www.loc-aid.com/ip_location_intelligence

                                          Walter Beisheim
                                       wbeisheim@loc-aid.com


  © 2012 Locaid Technologies, Inc. Intellectual Property. All rights reserved. All other marks contained herein are the property of their respective owners.

More Related Content

What's hot

Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloMundo Contact
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
priya Nithya
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CloudIDSummit
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
Juniper Developer Resources Cooney
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobilezan
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
lfilliat
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .amritpal singh
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
Shail Shah
 
Bluetooth
BluetoothBluetooth
Bluetooth
Rohith Raj
 
Fernando Kanacri - Nokia
Fernando Kanacri - NokiaFernando Kanacri - Nokia
Fernando Kanacri - Nokia
Barcelona Digital Technology Centre
 
e-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentatione-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentation
STARSSIP LIMITED
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
SaraswathiRamalingam
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
Buddhima Wijerathna Wickramasinghe
 
Gline Networks - What we do
Gline Networks - What we doGline Networks - What we do
Gline Networks - What we do
Vvikramaditya Pal
 
Unit 3
Unit 3Unit 3

What's hot (17)

Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Myip
MyipMyip
Myip
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Basic lesson before starting internet .
Basic lesson before starting internet .Basic lesson before starting internet .
Basic lesson before starting internet .
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless microservers
Wireless microserversWireless microservers
Wireless microservers
 
Fernando Kanacri - Nokia
Fernando Kanacri - NokiaFernando Kanacri - Nokia
Fernando Kanacri - Nokia
 
e-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentatione-numx.com mobile voip mgm presentation
e-numx.com mobile voip mgm presentation
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
 
Gline Networks - What we do
Gline Networks - What we doGline Networks - What we do
Gline Networks - What we do
 
Unit 3
Unit 3Unit 3
Unit 3
 

Viewers also liked

Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesLocaid Technologies
 
The tier application
The tier applicationThe tier application
The tier applicationalyciak33
 
Up in smoke
Up in smokeUp in smoke
Up in smoke
saradenhart
 
Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook
Mike Bear
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTERicardo Rodriguez
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
Alejandro Videla
 
706 - Pets and dolls
706 - Pets and dolls706 - Pets and dolls
706 - Pets and dolls
mireille 30100
 
651- Greedy squirrel
651- Greedy squirrel651- Greedy squirrel
651- Greedy squirrel
mireille 30100
 
Wounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringWounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringTimothy Higgins
 
Giving back
Giving backGiving back
Giving back
Timothy Higgins
 
Oral presentation english i nivel 4
Oral presentation english i nivel 4Oral presentation english i nivel 4
Oral presentation english i nivel 4gracielaballestander
 
921 my cats-1.pps
921 my cats-1.pps921 my cats-1.pps
921 my cats-1.pps
mireille 30100
 
Mapping the new economy
Mapping the new economyMapping the new economy
Mapping the new economy
gt2012
 
Realtor Referral Program
Realtor Referral ProgramRealtor Referral Program
Realtor Referral Program
Unique Real Estate Accommodations Inc.
 
Mitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck CrashesMitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck Crashes
Mid-America Transportation Center
 
NDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. RilettNDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. Rilett
Mid-America Transportation Center
 
Student Presentation- ISU
Student Presentation- ISUStudent Presentation- ISU
Student Presentation- ISU
Mid-America Transportation Center
 
MATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia DabipiMATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia Dabipi
Mid-America Transportation Center
 
Hydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersHydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersTimothy Higgins
 

Viewers also liked (20)

What's New in Location
What's New in LocationWhat's New in Location
What's New in Location
 
Geofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success StoriesGeofencing and Location Marketing Success Stories
Geofencing and Location Marketing Success Stories
 
The tier application
The tier applicationThe tier application
The tier application
 
Up in smoke
Up in smokeUp in smoke
Up in smoke
 
Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook Identifying Sevengill Sharks with Wildbook
Identifying Sevengill Sharks with Wildbook
 
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTEEL CUIDADO DE NUESTRO MEDIO AMBIENTE
EL CUIDADO DE NUESTRO MEDIO AMBIENTE
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
 
706 - Pets and dolls
706 - Pets and dolls706 - Pets and dolls
706 - Pets and dolls
 
651- Greedy squirrel
651- Greedy squirrel651- Greedy squirrel
651- Greedy squirrel
 
Wounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer MentoringWounded Warrior Project’s Peer Mentoring
Wounded Warrior Project’s Peer Mentoring
 
Giving back
Giving backGiving back
Giving back
 
Oral presentation english i nivel 4
Oral presentation english i nivel 4Oral presentation english i nivel 4
Oral presentation english i nivel 4
 
921 my cats-1.pps
921 my cats-1.pps921 my cats-1.pps
921 my cats-1.pps
 
Mapping the new economy
Mapping the new economyMapping the new economy
Mapping the new economy
 
Realtor Referral Program
Realtor Referral ProgramRealtor Referral Program
Realtor Referral Program
 
Mitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck CrashesMitigating Wind Induced Truck Crashes
Mitigating Wind Induced Truck Crashes
 
NDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. RilettNDOR Research Conference: Dr. Rilett
NDOR Research Conference: Dr. Rilett
 
Student Presentation- ISU
Student Presentation- ISUStudent Presentation- ISU
Student Presentation- ISU
 
MATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia DabipiMATC Scholars Program: Dr. Ibibia Dabipi
MATC Scholars Program: Dr. Ibibia Dabipi
 
Hydration Hints for Marathon Runners
Hydration Hints for Marathon RunnersHydration Hints for Marathon Runners
Hydration Hints for Marathon Runners
 

Similar to 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
DaoliCloud Ltd
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
Firoze Hussain
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
Tom Eston
 
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
IPv4Mall
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
Joe Robens
 
LocalSocial Overview Q409v3
LocalSocial Overview Q409v3LocalSocial Overview Q409v3
LocalSocial Overview Q409v3
Sean O'Sullivan
 
IP Geolocation Demystified
IP Geolocation  DemystifiedIP Geolocation  Demystified
IP Geolocation Demystified
BigDataCloudAPI
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneur
getsocialize
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
Mead Eblan
 
Socialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategistsSocialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategists
getsocialize
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
Oliver Müller
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxy
BU
 
RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop Presentation
Peter Kaptein
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
moduledesign
 
Artilium Location
Artilium LocationArtilium Location
Artilium Location
Mobile Monday Brussels
 

Similar to 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication (20)

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
Web identity part1
Web identity part1Web identity part1
Web identity part1
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
My Phone Stole My Credit Card
My Phone Stole My Credit CardMy Phone Stole My Credit Card
My Phone Stole My Credit Card
 
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
The Connection Between Geolocation and IPv4 Addresses | How to Get IPv4 | IPv...
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
LocalSocial Overview Q409v3
LocalSocial Overview Q409v3LocalSocial Overview Q409v3
LocalSocial Overview Q409v3
 
IP Geolocation Demystified
IP Geolocation  DemystifiedIP Geolocation  Demystified
IP Geolocation Demystified
 
Being a mobile entrepreneur
Being a mobile entrepreneurBeing a mobile entrepreneur
Being a mobile entrepreneur
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
 
Socialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategistsSocialize Mobil:e + Social at LavaCon for conetnt strategists
Socialize Mobil:e + Social at LavaCon for conetnt strategists
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 
Manika
ManikaManika
Manika
 
Ip hiding using proxy
Ip hiding using proxyIp hiding using proxy
Ip hiding using proxy
 
RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop Presentation
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
 
Artilium Location
Artilium LocationArtilium Location
Artilium Location
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication

  • 1. LOC-AID Technologies 1+1=3 Combining IP Intelligence and Mobile Network Location for Authentication September 27, 2012 San Francisco, CA Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 1
  • 2. Locaid is Location-as-a-Service Locaid Locates Every Device On Every For Any Network Location Need Locaid runs the Locaid finds any Locaid reaches 365M Locaid delivers largest LaaS connected device on devices. ubiquitous location. gateway to mobile the network including No app to download. Indoors and out. carrier networks desktops, laptops, No user action needed. Geofencing, IP and internet . consoles, tablets, Any device. Location, WiFi, SMS, telematics and m2m Anywhere. Global coverage, devices. Landlines, and location analytics. The world’s first and largest LaaS company Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 2
  • 3. One API for Any Location Source LOCATION-AS-A-SERVICE Landline Global Cell-ID Carrier Cell-ID + aGPS IP Location WiFi (BSS ID & MAC) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 3
  • 4. What is Geo IP Location? • Location and other important information can be gleaned by a web user’s IP (Internet Protocol) address. • Location information about the connection, such as lat/long, state, zip code can be provided in real-time • Geo IP location works with all web browsers, is non-invasive, does not involve cookies or violate any privacy regulations. • It works because a unique identifier is assigned to any device (computer, Xbox, smartphone) connected to the Internet. It is a “connection address.” Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 4
  • 5. IP Location • Locate a device via an IP address down to the ZIP code level. IP address data IP Intelligence is embedded in firewalls, ad servers, routing, mail systems, web sites, etc. • In addition to location information (country, state, city, ZIP and lat/long) Locaid IP Location delivers DMA, connection type, IP Routing type, carrier and other data • We also offer Anonymizer status and User Type information • Available as a webservice. One API that can locate any device connected to the Internet (desktop, laptop, tablet, smartphone, etc.) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 5
  • 6. What Can You Find Out About an IP Address? • This is my home IP address. It does IP address = 69.228.195.68 • Continent: North America not reveal any personal information • Country: US (CPNI). • State: California • City: Saratoga • But you can glean much from this data. • Zip Code: 95070 I am located in California, in Saratoga. • Area Code: 408 You also know my zip code, area code • Time Zone: UTC/GMT -8 hours and DMA. • Latitude/Longitude: 37.263 / -122.021 • DMA: 803 • You also know that I use DSL (but that I • MSA: 41940 didn’t pay for the really fast version). • ASN: 4355 But I still can view rich media. • ISP: AT&T Internet Services • Top Level Domain: .net • You also know that I am not using an • Second Level Domain: PacBell anonymous proxy – that I am not • IP Routing Type: Fixed trying to deliberately hide my location. • Connection Type: DSL • Connection Speed: Medium So I am probably not a fraudster. • Anonymizer Proxy in Use: No • If I was connected from a Global 1000 company, or major institution, you could also identify my industry code Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 6
  • 7. 1 + 1 = 3 Two-Factor Location Authentication + Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 7
  • 8. What can you do with Locaid IP Location? • Create relevance with site visitors, drive revenue for online marketing, ensure content is delivered to right areas. • Marketing and Advertising ‒ Redirect web pages based on visitor’s location ‒ Web traffic analytics ‒ Geo targeting for increased sales and click-through • Compliance and Authentication ‒ Detect and prevent password sharing or abuse of service ‒ Card Not Present, detect and reduce credit card fraud ‒ Filter access from countries you do not do business with ‒ Gaming regulatory compliance ‒ Digital rights management (DRM) Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 8
  • 9. Use Case: Visitor Risk Profiling • Location specific risk (e.g. countries) • Risky connection types (e.g. satellite, dial-up, anonymizers) • Risky domain information (e.g. risky ISP, unsafe domains) • IP location compared to registered or shipping address Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 9
  • 10. IP Use Case: Real-Time Risk Detection • Impossible travel • Surge in connections from one location/ISP or account • Unusual time for location Nov 10 2009 3:41:34 rogers cable Nov 10 2009 3:41:44 primatel Nov 10 2009 3:42:01 safelink internet Nov 10 2009 3:42:21 alcatel canada Nov 10 2009 3:42:24 safelink internet Nov 10 2009 3:43:06 safelink internet Nov 10 2009 3:43:09 rogers cable Nov 10 2009 3:43:14 safelink internet Nov 10 2009 3:43:25 safelink internet Nov 10 2009 3:43:28 safelink internet Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 10
  • 11. IP Use Case: Anomalous Behavior Detection • Current location vs. historical locations • Change in ISP Nov 10 2009 perry sympatico Nov 14 2009 perry sympatico Dec 22 2009 perry sympatico Jan 09 2010 perry sympatico Jan 10 2010 perry sympatico Feb 21 2010 perry sympatico Mar 01 2010 perry sympatico Mar 30 2010 perry sympatico Apr 03 2010 perry sympatico Apr 07 2010 perry at&t wireless Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 11
  • 12. Additional Capabilities from IP Location • Reduction of false positives ‒ Consistency More important than getting a city name correct Critical when comparing current behavior to past Obtained by using lat/long instead of city, ASN instead of ISP ‒ Confidence Factors Low confidence data can cause false positives ‒ Accuracy • Advanced data ‒ Combinations of data 30 miles intra-country is different from 30 miles across a border ‒ Network Characteristics • Relevant human-readable data ‒ Customer service representatives need data when talking to customers • Forensic Analytics Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 12
  • 13. 1 + 1 = 3 Two-Factor Location Authentication + • Fast • Accurate • Inexpensive • Reliable • Extensive information • Produced in “real time” Select individual or multiple location services based on the use requirements. The extensive information contained in the fast and inexpensive IP data can be used to determine whether to add or substitute Network Mobile Location data. Copyright © 2012, Locaid® | Patents pending, all rights reserved | Confidential | www.loc-aid.com | 13
  • 14. IP Location Resources www.loc-aid.com/ip_location_intelligence Walter Beisheim wbeisheim@loc-aid.com © 2012 Locaid Technologies, Inc. Intellectual Property. All rights reserved. All other marks contained herein are the property of their respective owners.