SlideShare a Scribd company logo
1 of 18
Download to read offline
GSMA
N O R D I C I A M C O N F E R E N C E 2 0 1 8
Marta Ienco, Head of Governments and Regulatory Affairs, Identity Programme
EIDAS-MOBILE CONNECT PILOT:
How To Combine Cross-border eID Recognition With
Convenience For Users And Online Services
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
What is the GSMA?
49
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
1. Digital is everywhere – and mobile is everything;
valuable services are turning digital (and mobile) -
globally
2. Security in the digital world is not up the task but
alternatives are growing – increasingly require
trusted identities
3. Major regulatory changes underway
• Europe: eIDAS, PSD2, GDPR, 5G Networks and
IOT
• US: NIST recommendations 800-63
• UNCITRAL: Legal issues for IdM and trust
services
Major market trends are driving the need for secure mobile identity
• 5bn mobile subscribers
globally, with Asia
representing 60%1
• Mobile identity industry is
estimated to be worth 87.9bn
by 20201.
• Average cost of security is
$141 per record stolen2.
• Businesses have lost up to
40% of their revenue in
customer churn due to
negative brand reputation3.
[1] GSMA Intelligence, 2017.
[2] IBM Global Report – cost of data breaches. SOURCE: https://www.ibm.com/security/data-breach/
[3] http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html
Identity– Mobile Connect50
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
• Simple, secure and convenient access to online services
• Combines the user’s unique mobile number, optional PIN and
multi-factor authentication to:
• Authenticate users online
• Authorise digital transactions and payments
• Verify identity
• Confirm attributes about user or device
• Strong positive user feedback on usefulness and user
experience resulting in significant take-up
Mobile Connect strengthens Operators’ end-user relationship
and secures a key position in digital services
A mobile operator facilitated global digital identity solution
Identity– Mobile ConnectIdentity– Mobile Connect51
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
eIDAS addressable market: Mobile Identity and Mobile Connect
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.53
A multi-stakeholders public and private sector cooperation employing the requirements of a
commercially viable, government backed solution, demonstrating how mobile operators can
support via Mobile Connect the deployment and scaling of eIDAS within two or more
European countries, positioning
Mobile Connect as the first private-sector cross-border service authentication solution that
meets the technical requirements of eIDAS.
Key outcomes
1. Deployed Mobile Connect authentication process and validation of the citizen’s digital identity across
France, Norway and Sweden via the eIDAS framework.
2. Developed and tested eIDAS Reference architecture to demonstrate the interoperability of Mobile
Connect and private sector service providers with eIDAS nodes integration requirements in a test
environment.
3. Showcased a owner centric approach to test Mobile Connect secure authentication and eIDAS identity
services to access healthcare private sector services in a Internet of Things application environment.
eIDAS and Mobile Connect cross-border pilot
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.56 Identity– Mobile Connect
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity– Mobile Connect57
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
eIDAS and Mobile Connect
leverage the synergies between robust
and secure remote identity proofing
technologies with the security and
convenience of strong authentication
in a mobile environment for both
public and private sector use cases
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
The use case: eHealth cross-border services
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity – Mobile Connect60
eIDAS pilot endorsement
• Report published on gsma.com
resources page
• Announcement posted on
European Commission website
• News article written by the
European Commission about the
eIDAS pilot
• Report hosted on European
Commission website
• eIDAS blog posted on
gsma.com/identity
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Mobile Connect is being deployed for government services
France – French government with Orange France on accessing government services
using Mobile Connect
Spain – Use of Mobile Connect to log into digital public services in Catalonia
UK – user identity verification service to confirm identity for e-Government services
EU – CEF funded project on transferring identity cross-border to open bank account
(eIDAS)
US – National Institute of Standards and Technology – proof of concepts using Mobile
Connect for authentication, identification and attribute verification (financial services, consumer
goods, health, e-Government)
EU – eIDAS Phase I European-wide solution for log-in to government services
EU – eIDAS Phase II European-wide solution for public and private online healthcare
services
Identity– Mobile Connect61
If you would like more information, please contact the GSMA via:
mobileconnect@gsma.com
+44 (0) 20 7356 0600
www.gsma.com/identity
Follow the GSMA on Twitter: @GSMA
GSMA London Office
The Walbrook Building, 25 Walbrook, London EC4N 8AF
Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
Thank-you
Marta Ienco: mienco@gsma.com
END OF PRESENTATION
COFFEE BREAK

More Related Content

What's hot

The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020OpenID Foundation Japan
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID - itsme
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital idCapgemini
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)CM.com
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Secure Identity Alliance
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011kantarainitiative
 

What's hot (20)

The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020The Future of Identity - OpenID Summit 2020
The Future of Identity - OpenID Summit 2020
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
 
Social research mobile id march 2017
Social research mobile id march 2017Social research mobile id march 2017
Social research mobile id march 2017
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital id
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Loqr
LoqrLoqr
Loqr
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 

Similar to GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services

[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile ConnectFIDO Alliance
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO Alliance
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...drctan
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsPrayukth K V
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?O2 Business UK
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaThibault Cantegrel
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsFIDO Alliance
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfMatthew Allen
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificOrange Business Services
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013Alix Murphy
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2CMR WORLD TECH
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
Mobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River CrossingMobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River Crossingjapie swanepoel
 

Similar to GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services (20)

[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 
Future of telecom in the era of Internet of Things
Future of telecom in the era of Internet of ThingsFuture of telecom in the era of Internet of Things
Future of telecom in the era of Internet of Things
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
M commerce
M commerceM commerce
M commerce
 
Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?Is your IT infrastructure keeping up?
Is your IT infrastructure keeping up?
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standards
 
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfSoftware Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdf
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Mobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River CrossingMobile First: 22 may 2019, River Crossing
Mobile First: 22 may 2019, River Crossing
 

More from Ubisecure

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use CasesUbisecure
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-OnUbisecure
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-ServiceUbisecure
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business IdentitiesUbisecure
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of AuthorityUbisecure
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectUbisecure
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Ubisecure
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMUbisecure
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessUbisecure
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!Ubisecure
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationUbisecure
 

More from Ubisecure (16)

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business Identities
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
 

Recently uploaded

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

GSMA - How To Combine Cross-border eID Recognition With Convenience For Users And Online Services

  • 1. GSMA N O R D I C I A M C O N F E R E N C E 2 0 1 8
  • 2. Marta Ienco, Head of Governments and Regulatory Affairs, Identity Programme EIDAS-MOBILE CONNECT PILOT: How To Combine Cross-border eID Recognition With Convenience For Users And Online Services
  • 3. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. What is the GSMA? 49
  • 4. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. 1. Digital is everywhere – and mobile is everything; valuable services are turning digital (and mobile) - globally 2. Security in the digital world is not up the task but alternatives are growing – increasingly require trusted identities 3. Major regulatory changes underway • Europe: eIDAS, PSD2, GDPR, 5G Networks and IOT • US: NIST recommendations 800-63 • UNCITRAL: Legal issues for IdM and trust services Major market trends are driving the need for secure mobile identity • 5bn mobile subscribers globally, with Asia representing 60%1 • Mobile identity industry is estimated to be worth 87.9bn by 20201. • Average cost of security is $141 per record stolen2. • Businesses have lost up to 40% of their revenue in customer churn due to negative brand reputation3. [1] GSMA Intelligence, 2017. [2] IBM Global Report – cost of data breaches. SOURCE: https://www.ibm.com/security/data-breach/ [3] http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html Identity– Mobile Connect50
  • 5. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. • Simple, secure and convenient access to online services • Combines the user’s unique mobile number, optional PIN and multi-factor authentication to: • Authenticate users online • Authorise digital transactions and payments • Verify identity • Confirm attributes about user or device • Strong positive user feedback on usefulness and user experience resulting in significant take-up Mobile Connect strengthens Operators’ end-user relationship and secures a key position in digital services A mobile operator facilitated global digital identity solution Identity– Mobile ConnectIdentity– Mobile Connect51
  • 6. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. eIDAS addressable market: Mobile Identity and Mobile Connect
  • 7. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.53 A multi-stakeholders public and private sector cooperation employing the requirements of a commercially viable, government backed solution, demonstrating how mobile operators can support via Mobile Connect the deployment and scaling of eIDAS within two or more European countries, positioning Mobile Connect as the first private-sector cross-border service authentication solution that meets the technical requirements of eIDAS. Key outcomes 1. Deployed Mobile Connect authentication process and validation of the citizen’s digital identity across France, Norway and Sweden via the eIDAS framework. 2. Developed and tested eIDAS Reference architecture to demonstrate the interoperability of Mobile Connect and private sector service providers with eIDAS nodes integration requirements in a test environment. 3. Showcased a owner centric approach to test Mobile Connect secure authentication and eIDAS identity services to access healthcare private sector services in a Internet of Things application environment. eIDAS and Mobile Connect cross-border pilot
  • 8. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
  • 9. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.
  • 10. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.56 Identity– Mobile Connect
  • 11. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity– Mobile Connect57
  • 12. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. eIDAS and Mobile Connect leverage the synergies between robust and secure remote identity proofing technologies with the security and convenience of strong authentication in a mobile environment for both public and private sector use cases
  • 13. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. The use case: eHealth cross-border services
  • 14. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA.Identity – Mobile Connect60 eIDAS pilot endorsement • Report published on gsma.com resources page • Announcement posted on European Commission website • News article written by the European Commission about the eIDAS pilot • Report hosted on European Commission website • eIDAS blog posted on gsma.com/identity
  • 15. Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. Mobile Connect is being deployed for government services France – French government with Orange France on accessing government services using Mobile Connect Spain – Use of Mobile Connect to log into digital public services in Catalonia UK – user identity verification service to confirm identity for e-Government services EU – CEF funded project on transferring identity cross-border to open bank account (eIDAS) US – National Institute of Standards and Technology – proof of concepts using Mobile Connect for authentication, identification and attribute verification (financial services, consumer goods, health, e-Government) EU – eIDAS Phase I European-wide solution for log-in to government services EU – eIDAS Phase II European-wide solution for public and private online healthcare services Identity– Mobile Connect61
  • 16. If you would like more information, please contact the GSMA via: mobileconnect@gsma.com +44 (0) 20 7356 0600 www.gsma.com/identity Follow the GSMA on Twitter: @GSMA GSMA London Office The Walbrook Building, 25 Walbrook, London EC4N 8AF Copyright © 2017 GSMA. The Mobile Connect logo is a trade mark registered and owned by the GSMA. Thank-you Marta Ienco: mienco@gsma.com