SlideShare a Scribd company logo
FIDO & THE MOBILE 
NETWORK OPERATOR 
Alan Goode, Managing Director, 
Goode Intelligence 
Jamie Cowper, Senior Director, 
Nok Nok Labs
THE AUTHENTICATION CHALLENGE: 
HOW DO WE KNOW WHO YOU ARE? 
2 
?
MODERN AUTHENTICATION NEEDS 
3 
COST 
PRIVACY 
SECURITY 
USABILITY 
INFRASTRUCTURE: 
EXISTING 
TECHNOLOGY 
AUTHENTICATION 
LEGACY
LATEST RESEARCH 
4 
• What is the current Standard 
landscape for Authentication & 
identity? 
• What are the integration points 
between Identity & 
Authentication 
• How can MNO’s take advantage 
of the new opportunities in 
Authentication
THE MOBILE NETWORK 
OPERATORS AND THE FUTURE 
OF AUTHENTICATION 
11 November 2014 
Alan Goode - Goode Intelligence
1 
• Two inter-connected megatrends: 
• The rise of mobile computing 
• Cloud and SaaS 
• Mobile & Cloud – legacy authentication not fit for 
purpose 
• Failure of traditional of monolithic authentication 
solutions: 
• Passwords 
• Siloed 2FA 
• The need to support legacy IT
2 
• Putting the mobile at the heart of authentication and 
identity 
• Industry standards and initiatives facilitating 
emergence of intelligent mobile-based 
authentication 
• OpenID Connect 
• SAML 
• GSMA Mobile Connect 
• FIDO 
• Leverage the security of the SIM and built-in 
features of mobile for authentication
3 
• The first mile = using a mobile device as an 
authenticator 
• Leveraging native capabilities including 
biometrics 
• The second mile = connections to wider risk and 
fraud management and authorisation services 
• Importance of Identity Federation services 
• Authenticate once & then access multiple 
services 
• Vital to smoothly connect first and second miles 
• Seamless user experience
4 
• GSMA Mobile Connect provides a framework for 
MNOs to deliver mobile-based authentication 
services 
• Opportunity to become a central part of modern 
authentication ecosystem 
• MNOs are logical owners of mobile authentication 
and can leverage existing components and 
infrastructure: 
• SIM 
• Subscriber Data
5 
• First-to-market for FIDO Ready™ 
Authentication with S3 
Authentication Suite 
• Powers fingerprint biometric 
authentication for Alipay and 
Paypal 
• Reference model for mobile-based 
authentication using FIDO 
standards 
• Leverages mobile device secure 
hardware
Thank you. 
alan.goode@goodeintelligence.com 
www.goodeintelligence.com 
Twitter: @goodeintel
THE FIDO APPROACH 
ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. 
12 
Standardized Protocols 
Local authentication 
unlocks app specific key 
Key used to authenticate 
to server
FIDO ECOSYSTEM MOMENTUM 
13
MARKET DRIVERS FOR FIDO 
• Reduce 
transaction 
abandonment 
- Lower friction 
• Reduce 
transaction time 
• Reduce fraud 
• Increase trust in 
provider 
• Increase adoption 
of stronger 
adoption 
• Risk appropriate 
• Unified 
framework 
- Any device 
- Any 
authenticator 
• Future-proof 
architecture 
14 
Usability Security Cost
BROAD UTILITY FOR BETTER AUTHENTICATION 
15 
Enables innovation and revenue across B2C, B2B, B2B2C Ecosystems 
Strong FIDO Authentication is the 
eHealth 
gateway to… 
Federated Identity Services 
Home Automation 
Mobile / Retail Commerce and 
Payments 
The Internet of ThingsNew Cloud Services 
Much, much more... 
Ecosystems
FINGERPRINT SENSOR UPTAKE 
16 
iPhone 5s 
Galaxy S5 & Mini 
Galaxy Tab S 
iPhone 6 
“By 2017 there will over 990 million mobile devices (smart phones, phablets and 
tablets) with fingerprint sensors. This number is set to increase further by the 
following year when there will be well over one billion mobile devices – making 
fingerprint sensors a common feature in mobile devices.” 
Goode Intelligence, December 2013
MANY AUTHENTICATORS, MANY DEVICES… 
17
AUTHENTICATION IS THE GATEWAY 
TO USER EXPERIENCE 
Benefits 
• Service & Product Differentiation 
• Increased Brand Loyalty 
• Expanded Customer Revenue 
• New Partnership Opportunities 
Current Innovation Examples 
• Google – Personal Unlocking 
• Apple – TouchID + iTunes 
• PayPal – “Swipe to Pay” on Samsung S5, Tab S 
Lessons Learned 
• NFC + Softcard Wallet 
18 
Simpler, Faster, and Contextual Authentication 
Increases User Engagement and Satisfaction
NOK NOK’S S3 SUITE ARCHITECTURE 
19 
NOK NOK LABS 
3RD PARTY
DEPLOYED TODAY 
20 
Devices Customers 
S5 & Mini 
Tab S 
Pat 
Johnson 
pat@example.com 
Note 4
PARTNERS 
21 
Device 
Authenticator 
Secure Hardware
GSMA ‘MOBILE CONNECT’
HOW FIDO FITS INTO MOBILE CONNECT 
FIDO client in a 
TEE/SIM based 
config 
FIDO server 
hosted by 
MNO
MNO/IDP INFRASTRUCTURE 
NNL server 
MNO DEPLOYMENT 
Web Browser 
24 
FEDERATION INTEGRATION MODEL 
USER’S DEVICE 
RELYING PARTY’S INFRASTRUCTURE 
HTML 
Javascript 
Browser Extension 
NNL client 
Web Application 
Session 
Management 
Infrastructure 
Relying Party 
FIDO 
3rd party 
Federation Gateway 
(SAML, OpenID, etc.) 
IDP Adapter Plugin 
Authen4ca4on 
Registra4on
SECURE AUTHENTICATOR 
IMPLEMENTATION MODELS 
Trusted Execution Environment (TEE) 
FIDO Authenticator as Trusted Application (TA) 
User 
Verification / 
Presence 
Trusted 
UI 
eSE/SIM 
Attestation Key 
Authentication Key(s) 
Biometric Template(s) 
Implemented with NXP, 
Infineon & Oberthur 
Implemented with 
Trustonic
EXTENSIBLE AND FUTURE PROOF 
ARCHITECTURE 
New Authenticators 
New Devices 
New Use Cases 
Internet of Things 
Home Automation 
and more…
CONSUMER PREFERENCES 
PRIVATE & CONFIDENTIAL 
27
Q&A 
28

More Related Content

What's hot

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance
 
Business Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO AuthenticationBusiness Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO Authentication
FIDO Alliance
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
FIDO Alliance
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
FIDO Alliance
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
FIDO Alliance
 
Worldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of SaleWorldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of Sale
FIDO Alliance
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
FIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
FIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
 
Fido and Touch ID
Fido and Touch IDFido and Touch ID
Fido and Touch ID
Steve Sidner
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
FIDO Alliance
 

What's hot (20)

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Business Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO AuthenticationBusiness Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO Authentication
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Worldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of SaleWorldpay – FIDO-enabled Point of Sale
Worldpay – FIDO-enabled Point of Sale
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Fido and Touch ID
Fido and Touch IDFido and Touch ID
Fido and Touch ID
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
 

Similar to FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs

Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
Ivona M
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
Singtel
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
Bjorn Hjelm
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan Mårtensson
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC Forum
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
WSO2
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Joseph Pindar
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
Matteo Masi
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
Symantec
 
Apps for everything Alec Saunders, QNX
Apps for everything   Alec Saunders, QNXApps for everything   Alec Saunders, QNX
Apps for everything Alec Saunders, QNX
appbackr
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
 

Similar to FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs (20)

Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
 
Mature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT successMature connections: 6 stages to IoT success
Mature connections: 6 stages to IoT success
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
Cloud Foundry HSM x Gemalto - Webinar 2 June 2016
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Apps for everything Alec Saunders, QNX
Apps for everything   Alec Saunders, QNXApps for everything   Alec Saunders, QNX
Apps for everything Alec Saunders, QNX
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs

  • 1. FIDO & THE MOBILE NETWORK OPERATOR Alan Goode, Managing Director, Goode Intelligence Jamie Cowper, Senior Director, Nok Nok Labs
  • 2. THE AUTHENTICATION CHALLENGE: HOW DO WE KNOW WHO YOU ARE? 2 ?
  • 3. MODERN AUTHENTICATION NEEDS 3 COST PRIVACY SECURITY USABILITY INFRASTRUCTURE: EXISTING TECHNOLOGY AUTHENTICATION LEGACY
  • 4. LATEST RESEARCH 4 • What is the current Standard landscape for Authentication & identity? • What are the integration points between Identity & Authentication • How can MNO’s take advantage of the new opportunities in Authentication
  • 5. THE MOBILE NETWORK OPERATORS AND THE FUTURE OF AUTHENTICATION 11 November 2014 Alan Goode - Goode Intelligence
  • 6. 1 • Two inter-connected megatrends: • The rise of mobile computing • Cloud and SaaS • Mobile & Cloud – legacy authentication not fit for purpose • Failure of traditional of monolithic authentication solutions: • Passwords • Siloed 2FA • The need to support legacy IT
  • 7. 2 • Putting the mobile at the heart of authentication and identity • Industry standards and initiatives facilitating emergence of intelligent mobile-based authentication • OpenID Connect • SAML • GSMA Mobile Connect • FIDO • Leverage the security of the SIM and built-in features of mobile for authentication
  • 8. 3 • The first mile = using a mobile device as an authenticator • Leveraging native capabilities including biometrics • The second mile = connections to wider risk and fraud management and authorisation services • Importance of Identity Federation services • Authenticate once & then access multiple services • Vital to smoothly connect first and second miles • Seamless user experience
  • 9. 4 • GSMA Mobile Connect provides a framework for MNOs to deliver mobile-based authentication services • Opportunity to become a central part of modern authentication ecosystem • MNOs are logical owners of mobile authentication and can leverage existing components and infrastructure: • SIM • Subscriber Data
  • 10. 5 • First-to-market for FIDO Ready™ Authentication with S3 Authentication Suite • Powers fingerprint biometric authentication for Alipay and Paypal • Reference model for mobile-based authentication using FIDO standards • Leverages mobile device secure hardware
  • 11. Thank you. alan.goode@goodeintelligence.com www.goodeintelligence.com Twitter: @goodeintel
  • 12. THE FIDO APPROACH ANY DEVICE. ANY APPLICATION. ANY AUTHENTICATOR. 12 Standardized Protocols Local authentication unlocks app specific key Key used to authenticate to server
  • 14. MARKET DRIVERS FOR FIDO • Reduce transaction abandonment - Lower friction • Reduce transaction time • Reduce fraud • Increase trust in provider • Increase adoption of stronger adoption • Risk appropriate • Unified framework - Any device - Any authenticator • Future-proof architecture 14 Usability Security Cost
  • 15. BROAD UTILITY FOR BETTER AUTHENTICATION 15 Enables innovation and revenue across B2C, B2B, B2B2C Ecosystems Strong FIDO Authentication is the eHealth gateway to… Federated Identity Services Home Automation Mobile / Retail Commerce and Payments The Internet of ThingsNew Cloud Services Much, much more... Ecosystems
  • 16. FINGERPRINT SENSOR UPTAKE 16 iPhone 5s Galaxy S5 & Mini Galaxy Tab S iPhone 6 “By 2017 there will over 990 million mobile devices (smart phones, phablets and tablets) with fingerprint sensors. This number is set to increase further by the following year when there will be well over one billion mobile devices – making fingerprint sensors a common feature in mobile devices.” Goode Intelligence, December 2013
  • 17. MANY AUTHENTICATORS, MANY DEVICES… 17
  • 18. AUTHENTICATION IS THE GATEWAY TO USER EXPERIENCE Benefits • Service & Product Differentiation • Increased Brand Loyalty • Expanded Customer Revenue • New Partnership Opportunities Current Innovation Examples • Google – Personal Unlocking • Apple – TouchID + iTunes • PayPal – “Swipe to Pay” on Samsung S5, Tab S Lessons Learned • NFC + Softcard Wallet 18 Simpler, Faster, and Contextual Authentication Increases User Engagement and Satisfaction
  • 19. NOK NOK’S S3 SUITE ARCHITECTURE 19 NOK NOK LABS 3RD PARTY
  • 20. DEPLOYED TODAY 20 Devices Customers S5 & Mini Tab S Pat Johnson pat@example.com Note 4
  • 21. PARTNERS 21 Device Authenticator Secure Hardware
  • 23. HOW FIDO FITS INTO MOBILE CONNECT FIDO client in a TEE/SIM based config FIDO server hosted by MNO
  • 24. MNO/IDP INFRASTRUCTURE NNL server MNO DEPLOYMENT Web Browser 24 FEDERATION INTEGRATION MODEL USER’S DEVICE RELYING PARTY’S INFRASTRUCTURE HTML Javascript Browser Extension NNL client Web Application Session Management Infrastructure Relying Party FIDO 3rd party Federation Gateway (SAML, OpenID, etc.) IDP Adapter Plugin Authen4ca4on Registra4on
  • 25. SECURE AUTHENTICATOR IMPLEMENTATION MODELS Trusted Execution Environment (TEE) FIDO Authenticator as Trusted Application (TA) User Verification / Presence Trusted UI eSE/SIM Attestation Key Authentication Key(s) Biometric Template(s) Implemented with NXP, Infineon & Oberthur Implemented with Trustonic
  • 26. EXTENSIBLE AND FUTURE PROOF ARCHITECTURE New Authenticators New Devices New Use Cases Internet of Things Home Automation and more…
  • 27. CONSUMER PREFERENCES PRIVATE & CONFIDENTIAL 27