SlideShare a Scribd company logo
1 of 21
Download to read offline
Who owns the SIM card?
          -
       The Trusted Third Party Control
           of the Secure Element

                                  5 June 2007

                     Josef Noll
            Senior Advisor, Movation AS
             josef.noll@movation.no, +47 9083 8066
                 Prof. stip., UniK/University of Oslo
                          josef.noll@unik.no


MOVATION – A competitive advantage for ALL invited companies and for Norwegian Innovation
                                                                                            1
                  Josef Noll, “Who owns the SIM?”, 5 June 2007
e best
                                                      ome of th rwegian
                                            where s           e No
                                 initiative        o build th
                           iting          selves t
                   ery exc
       tion is a v             mit them             ation”
quot;Mova                       om
                Norway c technology innov
          es in
compani                                          y, Abelia
                        less
              m in wire               aul Chaffe
          tea                   –P
 national




                                   “Innovation by Design”
                                                                          2
               Josef Noll, “Who owns the SIM?”, 5 June 2007
Movation’s Open Innovation Arena

                                          Mobile Services
                                              Arena


                                                      innovator




                                                               mentor
                innovator

                                                                  core
                                                                research
       partnership
        research
                                     mentor




Innovation in an open network, supported by mentors and innovators
                                                                           3
                Josef Noll, “Who owns the SIM?”, 5 June 2007
Movation owners




                                               4
Josef Noll, “Who owns the SIM?”, 5 June 2007
Our owners
- SmartConnect – Seamless connectivity

- Web miner, Music Search

- (Mobile) Search Platform

- Mobile browser, desktop, Opera Mini

- Indoor location, Wireless equipment

- Worldwide operator > 120 Mio customers

- Satellite phones and communications at sea
  and on land.


          Mobile services with an international perspective
                                                              5
      Josef Noll, “Who owns the SIM?”, 5 June 2007
Movation focus areas
• Mobile Landing Pads
     – Mobile Semantic Web: Service world on the mobile
• Personalised Mobile
     – personalised services on the mobile
     – learning and adaptation
• Mobile Marketing
     – personalised and context related services
• Mobile Security
     – Security platform for Internet banking, service access, mobile
        content handling -> Attila.no
• Convenience
      • using Domain Names instead of numbers




            Innovative services for the mobile world – from Movation and Partners
                                                                                    6
                   Josef Noll, “Who owns the SIM?”, 5 June 2007
Content
• NFC market actors
  – Telecom Operators, SIM card provider, Equipment manufacturers
  – Bank, Mastercard, Visa,
  – Regulatory bodies, customers

• I-centric vision - customer view
  – management, trust
  – new roles in NFC business

• Business solution
  – third party business model
  – role of secure element

• Challenges and benefits




                                                                    7
               Josef Noll, “Who owns the SIM?”, 5 June 2007
Mobile Market
                        • 2006:
• Mobile workforce:
  40-70 % of a group in   • 1020 million mobiles

  different locations     • 209 million PCs

• 90 % of the employees • 4 Billion people with
                          mobile in 2009
  away from HQ
                                                                    • Q4/2006: > 30 %
                                                                      smartphones in Norway
                                                                          •    20-30 % smartphones by 2009.
                Nordic            European
 65.00
                                                                           Opera Desktop       Adobe Flash        J2ME (Opera Mini)
                                                                   90.0
 48.75

                                                                   67.5
 32.50

                                                                   45.0
 16.25

                                                                   22.5
    0
         2006            2008                 2010
                                                                      0
Smartphone penetration [%] in Europe and the
                                                                               2006                 2008               2010
Nordic
                                                                    Handset functionality in market share [%] for the Nordic market

                                     [“Mobile Phone Evolution”, Movation White paper, May 2007]
                                                                                                                                  8
                                Josef Noll, “Who owns the SIM?”, 5 June 2007
Mobile Services, incl. NFC
                                                                • NFC needs next
• Focus in 2008 on
                                                                  generation phones
  mobile web
                                                                      • S60, UIQ, ...
• Push content upcoming
                                                                      • Common Application
                                                                        development
                                                                      • Integrated
          SMS authentication           Mobile Web
          Push context                 NFC payment
60
                                                                        development
45

30

15

 0
  2006                    2008                         2010
 Expected customer usage [%] “have tried” of mobile
 services in the Nordic Market



                                 [“Mobile Phone Evolution”, Movation White paper, May 2007]
                                                                                              9
                            Josef Noll, “Who owns the SIM?”, 5 June 2007
One natural NFC player?
• Telecom Operators
    ✓ have established customer and content provider relation
    ✓ current business (content provider access) gets less important
    ✓ NFC is opportunity for new business
    – inhomogenous infrastructure at operators

• Bank, Mastercard, Visa,...
    ✓ natural choice for payment solutions
    – micro-payment and small transactions not successful
    – integration of content providers is new area, mobile is Telecom

• SIM card provider: Gemalto, G&D
    ✓ harmonised infrastructure
    – unknown for the customer, no trust relationship

• Handset manufacturers
    – global market players
No obvious NFC player, need Innovation partnership
                                                                        10
                   Josef Noll, “Who owns the SIM?”, 5 June 2007
Content
• NFC market actors
• I-centric vision - customer view
   – management
   – trust
• Business solution
  – Third party solution business model
  – Role of security element

• Challenges and benefits




                                                              11
               Josef Noll, “Who owns the SIM?”, 5 June 2007
Customer view
• Regulatory bodies
   – Following national laws
                                                                     Content
   – Customer protection (privacy)                                                    Content
                                                                     provider
                                                                                      provider
• Customer preferences                                                     Content
                                                                           provider
   – Trust relation
   – Clear value proposition (convenience)
                                                                           Content
   – Information/advertisement overload                                   aggregator
                                                                                   Customer care
                                                                                      provider
• Main duties for NFC players
                                                                                  Trust provider
   – Customer relation (paying the bill)                                          Privacy
                                                                                  Personalisation
   – Service integration
   – New business concepts
   – Customer protection (information
     overload)

 Convenient user services, covering trust, privacy, providing personalisation
                                                                                                    12
                      Josef Noll, “Who owns the SIM?”, 5 June 2007
Identity handling
• Identity is attributes of your persona
    – Social, Corporate and Private IDs

• Internet was built without an identity layer
    – Identity 2.0 stems from Web 2.0
    – People, information and software
    – More user-oriented (wikis, comments, tags)
    – More seamless web services (AJAX)

• Service related security
    – Provide just the information which is necessary


• Mobile challenges
– Traceability
– 24/7 availability




                  Josef Noll, “Who owns the SIM?”, 5 June 2007
Customer care
                    through Identity management
• User centric ID management                                         Identity
  – More like real life ID’s (passport, license)
  – Multiple ID’s (PID, SID, CID)
                                                                     Personal
  – Certificates and preferences
                                                                      (PID)
  – Choose attributes
    ~more privacy

• ID providers                                                            Corporate
                                                                 Social     (CID)
  – Multiple providers
                                                                 (SID)
  – Own certificates

• Mobile, and de-centralised
                                                                           Customer care
                                                                              provider
                                                                          Trust provider
                                                                          Privacy
                                                                          Personalisation




                  Josef Noll, “Who owns the SIM?”, 5 June 2007
Content
• NFC market actors

• I-centric vision - customer view


• Business solution
  – Third party solution business model
  – Role of security element


• Challenges and benefits




                                                           15
            Josef Noll, “Who owns the SIM?”, 5 June 2007
Authentication provider



                                                     Seamless
                                                   authentication
                               Auth.
                              provider




                                                                       Content
Service             Physical                                        access, .mp3,
                                                         VPN
access              access                                              .jpg




          Josef Noll, “Who owns the SIM?”, 5 June 2007
ID, trust and
         personalisation provider
                                                      Who provides?
                                                  
                                                                                  Certifica
Remote services                                           ID provider               te
                                                      –

                                                      Where to store?
                                                  
                                                          Network
                                                      –
                                                          Phone
                                                      –

                                                      How to store/backup?
                                                  
                                                          long term, short term
                                                      –




                                       Proximity services




   Josef Noll, “Who owns the SIM?”, 5 June 2007
Third party business model
                                              • Media,
                                              • Banks, Service providers
        Content
        provider
                                              • Telecom, Corporate, Home

 Service      Payment
aggregator
                                             • Service aggregator
              provider

                                                   •     Convenient interfaces
                                                   •     Ease of use
     Identity and
    personalisation
                                             • Identity and personalisation
       provider
                                               provider
                      Customer
     Authentication
                        care
      and Access                                   •     Convenience
        provider
                                                   •     Trust


                                                                                 18
                         Josef Noll, “Who owns the SIM?”, 5 June 2007
The secure element:
                            SIM card

                                                       Identity and
                                                      personalisation              Service
                Authentication
                                                         provider                 aggregator
                 and Access
                   provider
                                    Send key and                   Send info to
• SIM is secure                     credentials                    recipient

  element                                 NFC
                                      communication
                                                                                       Send service to
                                          unit
 • controlled environment                                                              phone
                                    NFC2SIM
 • over-the-air update
 • open for applications
                                      SIM
                               Smartcard interfaces
                                 ISO/IEC 7816


• SIM will be owned
  by user
 • managed by trusted
   third party



                    Josef Noll, “Who owns the SIM?”, 5 June 2007
Challenges and Benefits


200                                                                               Convenience
                           How insecure is the
                                                                                    of usage
                                 Internet?
                        Will the phone be the only
                              secure element?
150

                                                                 Visa and Mastercard
100                                                         enable convenient small amount
                                                                     purchases
        Are facebook and flickr more
      trusted than telecom operators?
 50
                                                          Dynamic service environment?
                                                          On-the-fly creation of services?
  0
   2006                                       2008                                       2010
               Telco favourite                                   Third party favourite          20
                  Josef Noll, “Who owns the SIM?”, 5 June 2007
Conclusions
• The user is always connected to services using
  multiple networks
• Service related information
  – privacy (just what is needed)
  – application security

• Personalisation is based on Identity management
  – Identity provision from public authorities, banks, mobile operators, …
  – using preferences, keys and certificates

• Operators have to face a dynamic service
  landscape
  – Content provider access (CPA) becomes less important
  – Convenience and user focus are key issues
  – Open co-operation (SIM, handset, operator, content provider) is key
    to success

                   Movation - Open Innovation Arena
                 Josef Noll, “Who owns the SIM?”, 5 June 2007

More Related Content

What's hot

238784 633884955717278750
238784 633884955717278750238784 633884955717278750
238784 633884955717278750Furkan Pehlivan
 
ROPE Formula in Public Relations / HTC
ROPE Formula in Public Relations / HTCROPE Formula in Public Relations / HTC
ROPE Formula in Public Relations / HTCBerk SARICA
 
Hungry Mobile Euro Mobile Media
Hungry Mobile Euro Mobile MediaHungry Mobile Euro Mobile Media
Hungry Mobile Euro Mobile MediaJan Rezab
 
Barcelona Steeplechase: Takeaways From MWC'09
Barcelona Steeplechase: Takeaways From MWC'09Barcelona Steeplechase: Takeaways From MWC'09
Barcelona Steeplechase: Takeaways From MWC'09Ronald Gruia
 
Mobile Invisible Revolution
Mobile Invisible RevolutionMobile Invisible Revolution
Mobile Invisible RevolutionBenjamin Joffe
 
Presentation on nokia overall started
Presentation on nokia overall startedPresentation on nokia overall started
Presentation on nokia overall startedANSHU TIWARI
 
Finland & nokia
Finland & nokiaFinland & nokia
Finland & nokiaAffaf86
 
Nokia: About the Company
Nokia: About the CompanyNokia: About the Company
Nokia: About the Companypooja sonakiya
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of NokiaAayush Kar
 
Orbitz mobile & travel industry - for distribution
Orbitz   mobile & travel industry - for distributionOrbitz   mobile & travel industry - for distribution
Orbitz mobile & travel industry - for distributionMobileAnthem
 
238784 633884955717278750
238784 633884955717278750238784 633884955717278750
238784 633884955717278750marytkachenko
 
Nokia's Supply Chain Management - Case Study
Nokia's Supply Chain Management - Case StudyNokia's Supply Chain Management - Case Study
Nokia's Supply Chain Management - Case StudyNamrata Chatterjee
 

What's hot (20)

238784 633884955717278750
238784 633884955717278750238784 633884955717278750
238784 633884955717278750
 
ROPE Formula in Public Relations / HTC
ROPE Formula in Public Relations / HTCROPE Formula in Public Relations / HTC
ROPE Formula in Public Relations / HTC
 
Hungry Mobile Euro Mobile Media
Hungry Mobile Euro Mobile MediaHungry Mobile Euro Mobile Media
Hungry Mobile Euro Mobile Media
 
Case Study on Nokia
Case Study on NokiaCase Study on Nokia
Case Study on Nokia
 
Barcelona Steeplechase: Takeaways From MWC'09
Barcelona Steeplechase: Takeaways From MWC'09Barcelona Steeplechase: Takeaways From MWC'09
Barcelona Steeplechase: Takeaways From MWC'09
 
Ppt on nokia
Ppt on nokiaPpt on nokia
Ppt on nokia
 
Mobile Invisible Revolution
Mobile Invisible RevolutionMobile Invisible Revolution
Mobile Invisible Revolution
 
Presentation on nokia overall started
Presentation on nokia overall startedPresentation on nokia overall started
Presentation on nokia overall started
 
Finland & nokia
Finland & nokiaFinland & nokia
Finland & nokia
 
Nokia: About the Company
Nokia: About the CompanyNokia: About the Company
Nokia: About the Company
 
Nokia ppt
Nokia pptNokia ppt
Nokia ppt
 
Swot Analysis of Nokia
Swot Analysis of NokiaSwot Analysis of Nokia
Swot Analysis of Nokia
 
Nokia latest
Nokia   latestNokia   latest
Nokia latest
 
Mobile Software Global Trends 050109
Mobile Software Global Trends 050109Mobile Software Global Trends 050109
Mobile Software Global Trends 050109
 
Orbitz mobile & travel industry - for distribution
Orbitz   mobile & travel industry - for distributionOrbitz   mobile & travel industry - for distribution
Orbitz mobile & travel industry - for distribution
 
238784 633884955717278750
238784 633884955717278750238784 633884955717278750
238784 633884955717278750
 
Wireless overview impressico
Wireless overview   impressicoWireless overview   impressico
Wireless overview impressico
 
Nokia
NokiaNokia
Nokia
 
Nokia
NokiaNokia
Nokia
 
Nokia's Supply Chain Management - Case Study
Nokia's Supply Chain Management - Case StudyNokia's Supply Chain Management - Case Study
Nokia's Supply Chain Management - Case Study
 

Similar to Who ownes the SIM? a user-centric view on future networks

The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...Josef Noll
 
Infoservi.it - The Mobile Society - Reloaded
Infoservi.it  - The Mobile Society - ReloadedInfoservi.it  - The Mobile Society - Reloaded
Infoservi.it - The Mobile Society - ReloadedAlberto D'Ottavi
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europekevin han
 
Strategic management Nokia
Strategic management NokiaStrategic management Nokia
Strategic management NokiaMahesh Karane
 
Mobilemonday Global Summit KL Bruno Bensaid 20080519
Mobilemonday Global Summit KL Bruno Bensaid 20080519Mobilemonday Global Summit KL Bruno Bensaid 20080519
Mobilemonday Global Summit KL Bruno Bensaid 20080519Bruno Bensaid
 
2007 Nokia Analysis
2007 Nokia Analysis2007 Nokia Analysis
2007 Nokia AnalysisJin Lee
 
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...A reality check on mobile payments. Humble beginnings, big ambitions, and a c...
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...Georg Fasching
 
Mobile Software Global Trends St. Petersburg 1 161208
Mobile Software Global Trends St. Petersburg 1 161208Mobile Software Global Trends St. Petersburg 1 161208
Mobile Software Global Trends St. Petersburg 1 161208Gian-Luca Cioletti
 
Nokia's start to end
Nokia's start to endNokia's start to end
Nokia's start to endVinu Praveenz
 
Game of Thrones in the ICT Universe
Game of Thrones in the ICT UniverseGame of Thrones in the ICT Universe
Game of Thrones in the ICT UniversePetri Rouvinen
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and paymentJosef Noll
 
Marketing assignment: Nokia (2007)
Marketing assignment: Nokia (2007)Marketing assignment: Nokia (2007)
Marketing assignment: Nokia (2007)Mai Duc Ha
 
Tech@Peripheria Mobile Monday Sum 02 03 2009
Tech@Peripheria Mobile Monday Sum 02 03 2009Tech@Peripheria Mobile Monday Sum 02 03 2009
Tech@Peripheria Mobile Monday Sum 02 03 2009Andre Marquet
 
Cleverwood friday session_23rd april
Cleverwood friday session_23rd aprilCleverwood friday session_23rd april
Cleverwood friday session_23rd aprilCleverwood Belgium
 

Similar to Who ownes the SIM? a user-centric view on future networks (20)

The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...
 
Infoservi.it - The Mobile Society - Reloaded
Infoservi.it  - The Mobile Society - ReloadedInfoservi.it  - The Mobile Society - Reloaded
Infoservi.it - The Mobile Society - Reloaded
 
Mobile Web Content And Services In Europe
Mobile Web Content And Services In EuropeMobile Web Content And Services In Europe
Mobile Web Content And Services In Europe
 
Nokia- PPT
Nokia- PPTNokia- PPT
Nokia- PPT
 
Strategic management Nokia
Strategic management NokiaStrategic management Nokia
Strategic management Nokia
 
Mobilemonday Global Summit KL Bruno Bensaid 20080519
Mobilemonday Global Summit KL Bruno Bensaid 20080519Mobilemonday Global Summit KL Bruno Bensaid 20080519
Mobilemonday Global Summit KL Bruno Bensaid 20080519
 
Leadership In Innovation
Leadership In InnovationLeadership In Innovation
Leadership In Innovation
 
2007 Nokia Analysis
2007 Nokia Analysis2007 Nokia Analysis
2007 Nokia Analysis
 
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...A reality check on mobile payments. Humble beginnings, big ambitions, and a c...
A reality check on mobile payments. Humble beginnings, big ambitions, and a c...
 
Mobile Software Global Trends St. Petersburg 1 161208
Mobile Software Global Trends St. Petersburg 1 161208Mobile Software Global Trends St. Petersburg 1 161208
Mobile Software Global Trends St. Petersburg 1 161208
 
Nokia's start to end
Nokia's start to endNokia's start to end
Nokia's start to end
 
Brand dossier - Nokia
Brand dossier - NokiaBrand dossier - Nokia
Brand dossier - Nokia
 
The Mobile Society
The Mobile SocietyThe Mobile Society
The Mobile Society
 
Game of Thrones in the ICT Universe
Game of Thrones in the ICT UniverseGame of Thrones in the ICT Universe
Game of Thrones in the ICT Universe
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Nokia
NokiaNokia
Nokia
 
Marketing assignment: Nokia (2007)
Marketing assignment: Nokia (2007)Marketing assignment: Nokia (2007)
Marketing assignment: Nokia (2007)
 
Tech@Peripheria Mobile Monday Sum 02 03 2009
Tech@Peripheria Mobile Monday Sum 02 03 2009Tech@Peripheria Mobile Monday Sum 02 03 2009
Tech@Peripheria Mobile Monday Sum 02 03 2009
 
Cleverwood friday session_23rd april
Cleverwood friday session_23rd aprilCleverwood friday session_23rd april
Cleverwood friday session_23rd april
 
Nic Print
Nic PrintNic Print
Nic Print
 

More from Josef Noll

Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Josef Noll
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Josef Noll
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKJosef Noll
 
Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksJosef Noll
 
Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile SystemsJosef Noll
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationJosef Noll
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessJosef Noll
 
Towards Global Mobility
Towards Global MobilityTowards Global Mobility
Towards Global MobilityJosef Noll
 
What is Semantic Service provisioning
What is Semantic Service provisioningWhat is Semantic Service provisioning
What is Semantic Service provisioningJosef Noll
 
Semantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersSemantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersJosef Noll
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environmentsJosef Noll
 
Introduction to Personalisation
Introduction to PersonalisationIntroduction to Personalisation
Introduction to PersonalisationJosef Noll
 

More from Josef Noll (12)

Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIK
 
Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile Networks
 
Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile Systems
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptation
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
 
Towards Global Mobility
Towards Global MobilityTowards Global Mobility
Towards Global Mobility
 
What is Semantic Service provisioning
What is Semantic Service provisioningWhat is Semantic Service provisioning
What is Semantic Service provisioning
 
Semantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersSemantic Service Creation for Mobile Users
Semantic Service Creation for Mobile Users
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environments
 
Introduction to Personalisation
Introduction to PersonalisationIntroduction to Personalisation
Introduction to Personalisation
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Who ownes the SIM? a user-centric view on future networks

  • 1. Who owns the SIM card? - The Trusted Third Party Control of the Secure Element 5 June 2007 Josef Noll Senior Advisor, Movation AS josef.noll@movation.no, +47 9083 8066 Prof. stip., UniK/University of Oslo josef.noll@unik.no MOVATION – A competitive advantage for ALL invited companies and for Norwegian Innovation 1 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 2. e best ome of th rwegian where s e No initiative o build th iting selves t ery exc tion is a v mit them ation” quot;Mova om Norway c technology innov es in compani y, Abelia less m in wire aul Chaffe tea –P national “Innovation by Design” 2 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 3. Movation’s Open Innovation Arena Mobile Services Arena innovator mentor innovator core research partnership research mentor Innovation in an open network, supported by mentors and innovators 3 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 4. Movation owners 4 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 5. Our owners - SmartConnect – Seamless connectivity - Web miner, Music Search - (Mobile) Search Platform - Mobile browser, desktop, Opera Mini - Indoor location, Wireless equipment - Worldwide operator > 120 Mio customers - Satellite phones and communications at sea and on land. Mobile services with an international perspective 5 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 6. Movation focus areas • Mobile Landing Pads – Mobile Semantic Web: Service world on the mobile • Personalised Mobile – personalised services on the mobile – learning and adaptation • Mobile Marketing – personalised and context related services • Mobile Security – Security platform for Internet banking, service access, mobile content handling -> Attila.no • Convenience • using Domain Names instead of numbers Innovative services for the mobile world – from Movation and Partners 6 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 7. Content • NFC market actors – Telecom Operators, SIM card provider, Equipment manufacturers – Bank, Mastercard, Visa, – Regulatory bodies, customers • I-centric vision - customer view – management, trust – new roles in NFC business • Business solution – third party business model – role of secure element • Challenges and benefits 7 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 8. Mobile Market • 2006: • Mobile workforce: 40-70 % of a group in • 1020 million mobiles different locations • 209 million PCs • 90 % of the employees • 4 Billion people with mobile in 2009 away from HQ • Q4/2006: > 30 % smartphones in Norway • 20-30 % smartphones by 2009. Nordic European 65.00 Opera Desktop Adobe Flash J2ME (Opera Mini) 90.0 48.75 67.5 32.50 45.0 16.25 22.5 0 2006 2008 2010 0 Smartphone penetration [%] in Europe and the 2006 2008 2010 Nordic Handset functionality in market share [%] for the Nordic market [“Mobile Phone Evolution”, Movation White paper, May 2007] 8 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 9. Mobile Services, incl. NFC • NFC needs next • Focus in 2008 on generation phones mobile web • S60, UIQ, ... • Push content upcoming • Common Application development • Integrated SMS authentication Mobile Web Push context NFC payment 60 development 45 30 15 0 2006 2008 2010 Expected customer usage [%] “have tried” of mobile services in the Nordic Market [“Mobile Phone Evolution”, Movation White paper, May 2007] 9 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 10. One natural NFC player? • Telecom Operators ✓ have established customer and content provider relation ✓ current business (content provider access) gets less important ✓ NFC is opportunity for new business – inhomogenous infrastructure at operators • Bank, Mastercard, Visa,... ✓ natural choice for payment solutions – micro-payment and small transactions not successful – integration of content providers is new area, mobile is Telecom • SIM card provider: Gemalto, G&D ✓ harmonised infrastructure – unknown for the customer, no trust relationship • Handset manufacturers – global market players No obvious NFC player, need Innovation partnership 10 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 11. Content • NFC market actors • I-centric vision - customer view – management – trust • Business solution – Third party solution business model – Role of security element • Challenges and benefits 11 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 12. Customer view • Regulatory bodies – Following national laws Content – Customer protection (privacy) Content provider provider • Customer preferences Content provider – Trust relation – Clear value proposition (convenience) Content – Information/advertisement overload aggregator Customer care provider • Main duties for NFC players Trust provider – Customer relation (paying the bill) Privacy Personalisation – Service integration – New business concepts – Customer protection (information overload) Convenient user services, covering trust, privacy, providing personalisation 12 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 13. Identity handling • Identity is attributes of your persona – Social, Corporate and Private IDs • Internet was built without an identity layer – Identity 2.0 stems from Web 2.0 – People, information and software – More user-oriented (wikis, comments, tags) – More seamless web services (AJAX) • Service related security – Provide just the information which is necessary • Mobile challenges – Traceability – 24/7 availability Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 14. Customer care through Identity management • User centric ID management Identity – More like real life ID’s (passport, license) – Multiple ID’s (PID, SID, CID) Personal – Certificates and preferences (PID) – Choose attributes ~more privacy • ID providers Corporate Social (CID) – Multiple providers (SID) – Own certificates • Mobile, and de-centralised Customer care provider Trust provider Privacy Personalisation Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 15. Content • NFC market actors • I-centric vision - customer view • Business solution – Third party solution business model – Role of security element • Challenges and benefits 15 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 16. Authentication provider Seamless authentication Auth. provider Content Service Physical access, .mp3, VPN access access .jpg Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 17. ID, trust and personalisation provider Who provides?  Certifica Remote services ID provider te – Where to store?  Network – Phone – How to store/backup?  long term, short term – Proximity services Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 18. Third party business model • Media, • Banks, Service providers Content provider • Telecom, Corporate, Home Service Payment aggregator • Service aggregator provider • Convenient interfaces • Ease of use Identity and personalisation • Identity and personalisation provider provider Customer Authentication care and Access • Convenience provider • Trust 18 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 19. The secure element: SIM card Identity and personalisation Service Authentication provider aggregator and Access provider Send key and Send info to • SIM is secure credentials recipient element NFC communication Send service to unit • controlled environment phone NFC2SIM • over-the-air update • open for applications SIM Smartcard interfaces ISO/IEC 7816 • SIM will be owned by user • managed by trusted third party Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 20. Challenges and Benefits 200 Convenience How insecure is the of usage Internet? Will the phone be the only secure element? 150 Visa and Mastercard 100 enable convenient small amount purchases Are facebook and flickr more trusted than telecom operators? 50 Dynamic service environment? On-the-fly creation of services? 0 2006 2008 2010 Telco favourite Third party favourite 20 Josef Noll, “Who owns the SIM?”, 5 June 2007
  • 21. Conclusions • The user is always connected to services using multiple networks • Service related information – privacy (just what is needed) – application security • Personalisation is based on Identity management – Identity provision from public authorities, banks, mobile operators, … – using preferences, keys and certificates • Operators have to face a dynamic service landscape – Content provider access (CPA) becomes less important – Convenience and user focus are key issues – Open co-operation (SIM, handset, operator, content provider) is key to success Movation - Open Innovation Arena Josef Noll, “Who owns the SIM?”, 5 June 2007