SlideShare a Scribd company logo
1 of 9
Download to read offline
Mobile Web Security Bootstrap
A labs.ericsson.com enabler
http://labs.ericsson.com/apis/mobile-web-security-bootstrap/
Mobile Web Security Bootstrap
 The SIM is commonly used for getting cellular access,
 mobile connectivity and access to some mobile services

 The SIM proven security features can also be used for
 securing any mobile web applications

 This enabler provides an API for establishing a secret key
 between mobile web clients and web applications




                                                              2
Why?

 Security – As secure as SIM

 Standard – Based on industry standard

 Acceptance – Many standardized applications

 Convenience – Transparent to users

 Extensibility – Any applications can exploit the SIM




                                                        3
Main Features
 Based on 3GPP industry standard
 Generic Bootstrapping Architecture

 Client and server Web/Java APIs available and
 documented with examples

 HTTP interfaces

 Soft client available to allow focusing on the
 development of the network side of the web
 application




                                                  4
Overview
                                                               Mobile Web
                                                                  Network
                                                             Application Server
                                                                  Network
                                                                Application
 Ub interface – Mobile client uses
                                                                Application
 API to bootstrap a master secret
 key
                                                   Ua                             Zn
 Ua interface –Mobile Web Client
 uses API to derive application-                         *              HTTP
 specific master key

 Zn interface – Mobile Web                   Mobile
                                            Web Client                        Bootstrap
 Application Server uses API to
 obtain the corresponding                                       Ub             Server
 application-specific master key             Bootstrap
                                              Client           HTTP
 At the end of the API usage
                                                                                  Subscriber
 transactions the client and server
 share an application-specific secret-                                            Database
 key
                                         Mobile Web Client                    MWSB
                                                                           Mobile Web
                                                                         Security Bootstrap

                                                                                          5
Java Client API
 Soft Client API provided for focusing on server application

 Example showing how to establish a shared key

// Create soft client with user identity and permanent key
GbaClient softclient = new GbaClient(myID, myKey);

// Bootstrap client with master key. btid is the handler.
String btid = softclient.bootstrap();

// Derive application-specific key to be shared with app server
byte[] appKey = softclient.getKsNaf(app_Fqdn);

// Use the app key for HTTP Digest Authentication
boolean authResult = runUaHttpDigest(app_URL, btid, appKey);


                                                                  6
Java Server API
 API towards mobile client and API towards MWSB
 Servlet example showing how to establish a shared key
// Applicatin Servlet doGet()

// Create application context with Labs authorization API key
GbaNaf app = new GbaNaf(myFqdn, myApiKey)

// Parse GET authorization headers & fetch btid (key Handler)
Authorization authz = Authorization.parse(authorizationHeader);
String btid = authz.getUsername();

// Derive the application-specific key to be shared with client
appKey = app.getKsNaf(btid);

// Use the shared key to authenticate the mobile client
Digest.verify(authorization, appKey)

                                                                  7
Possible applications

                   Identity Management

 Authentication                          Single Sign On



       Integrity                         Confidentiality

                    Key Management


                                                           8
9

More Related Content

More from Tor Björn Minde

More from Tor Björn Minde (18)

Network Probe On Labs
Network Probe On LabsNetwork Probe On Labs
Network Probe On Labs
 
Mobile Sensor Actuator Gateway On Labs
Mobile Sensor Actuator Gateway On LabsMobile Sensor Actuator Gateway On Labs
Mobile Sensor Actuator Gateway On Labs
 
Ericsson Labs 100322
Ericsson Labs 100322Ericsson Labs 100322
Ericsson Labs 100322
 
Converting Media On Labs
Converting Media On LabsConverting Media On Labs
Converting Media On Labs
 
Event Source On Labs
Event Source On LabsEvent Source On Labs
Event Source On Labs
 
Mobile Identification On Labs
Mobile Identification On LabsMobile Identification On Labs
Mobile Identification On Labs
 
Face Detector On Labs
Face Detector On LabsFace Detector On Labs
Face Detector On Labs
 
Web Connectivity On Labs
Web Connectivity On LabsWeb Connectivity On Labs
Web Connectivity On Labs
 
3D Landscape on Labs
3D Landscape on Labs3D Landscape on Labs
3D Landscape on Labs
 
Mobile Location On Labs
Mobile Location On LabsMobile Location On Labs
Mobile Location On Labs
 
Streaming Media On Labs
Streaming Media On LabsStreaming Media On Labs
Streaming Media On Labs
 
Ericsson Labs OTA09 090925
Ericsson Labs OTA09 090925Ericsson Labs OTA09 090925
Ericsson Labs OTA09 090925
 
Web Location On Labs
Web Location On LabsWeb Location On Labs
Web Location On Labs
 
Ericsson Labs 090702
Ericsson Labs 090702Ericsson Labs 090702
Ericsson Labs 090702
 
Mobile Maps On Labs
Mobile Maps On LabsMobile Maps On Labs
Mobile Maps On Labs
 
SMS On Labs
SMS On LabsSMS On Labs
SMS On Labs
 
Mobile Java Push On Labs
Mobile Java Push On LabsMobile Java Push On Labs
Mobile Java Push On Labs
 
IMS framework On Labs
IMS framework On LabsIMS framework On Labs
IMS framework On Labs
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Mobile Web Security Bootstrap On Labs

  • 1. Mobile Web Security Bootstrap A labs.ericsson.com enabler http://labs.ericsson.com/apis/mobile-web-security-bootstrap/
  • 2. Mobile Web Security Bootstrap The SIM is commonly used for getting cellular access, mobile connectivity and access to some mobile services The SIM proven security features can also be used for securing any mobile web applications This enabler provides an API for establishing a secret key between mobile web clients and web applications 2
  • 3. Why? Security – As secure as SIM Standard – Based on industry standard Acceptance – Many standardized applications Convenience – Transparent to users Extensibility – Any applications can exploit the SIM 3
  • 4. Main Features Based on 3GPP industry standard Generic Bootstrapping Architecture Client and server Web/Java APIs available and documented with examples HTTP interfaces Soft client available to allow focusing on the development of the network side of the web application 4
  • 5. Overview Mobile Web Network Application Server Network Application Ub interface – Mobile client uses Application API to bootstrap a master secret key Ua Zn Ua interface –Mobile Web Client uses API to derive application- * HTTP specific master key Zn interface – Mobile Web Mobile Web Client Bootstrap Application Server uses API to obtain the corresponding Ub Server application-specific master key Bootstrap Client HTTP At the end of the API usage Subscriber transactions the client and server share an application-specific secret- Database key Mobile Web Client MWSB Mobile Web Security Bootstrap 5
  • 6. Java Client API Soft Client API provided for focusing on server application Example showing how to establish a shared key // Create soft client with user identity and permanent key GbaClient softclient = new GbaClient(myID, myKey); // Bootstrap client with master key. btid is the handler. String btid = softclient.bootstrap(); // Derive application-specific key to be shared with app server byte[] appKey = softclient.getKsNaf(app_Fqdn); // Use the app key for HTTP Digest Authentication boolean authResult = runUaHttpDigest(app_URL, btid, appKey); 6
  • 7. Java Server API API towards mobile client and API towards MWSB Servlet example showing how to establish a shared key // Applicatin Servlet doGet() // Create application context with Labs authorization API key GbaNaf app = new GbaNaf(myFqdn, myApiKey) // Parse GET authorization headers & fetch btid (key Handler) Authorization authz = Authorization.parse(authorizationHeader); String btid = authz.getUsername(); // Derive the application-specific key to be shared with client appKey = app.getKsNaf(btid); // Use the shared key to authenticate the mobile client Digest.verify(authorization, appKey) 7
  • 8. Possible applications Identity Management Authentication Single Sign On Integrity Confidentiality Key Management 8
  • 9. 9