SlideShare a Scribd company logo
Security, Identity, Mobility
Secure element architects for today’s generation
What UICC Means for
NFC & Security
JF RUBON
SIMalliance
IRM Summit
Phoenix, AZ
06/05/14
Securing the future of mobile services 2
Security, Identity, Mobility
SIMalliance: Who we are
SIMalliance members represent 86% of the global SIM market and deliver
the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM).
Securing the future of mobile services 3
Security, Identity, Mobility
What we do…
SIMalliance is the global, non-profit industry association which simplifies
secure element (SE) implementation to drive the creation, deployment
and management of secure mobile services.
SIMalliance:
> Promotes the essential role of the secure element (SE) in delivering secure mobile
applications and services across all devices that can access wireless networks
> Identifies and addresses SE-related technical issues, and clarifies and recommends
existing technical standards relevant to SE implementation
> Promotes an open SE ecosystem to facilitate and accelerate delivery of secure
mobile applications globally
> Monitors the market and produces market data reports
Securing the future of mobile services 4
Security, Identity, Mobility
SIMalliance Latest Delicerables
> Secure Element Deployment & Host Card Emulation v1.0
– Introduction to Android's Host Card Emulation (HCE) and explores its value to the NFC ecosystem relative to the
Secure Element (SE)
– Technology remains immature, un-standardised and, relative to SE-based deployments, vulnerable to malicious
attack.
> UICC LTE Profile
– A collection of requirements for optimal support of LTE/EPS networks by UICC.
– Widely utilised by North American MNOs.
> UICC Device Implementation Guidelines
– Outline fundamental and optional UICC features device vendors need to support to optimise UICC
interoperability in future devices.
> Stepping Stones Documents
– Best practices for development of interoperable applications (USIM, NFC, SE).
> General SIM Security Guidelines
– Ensure that a SIM's security levels are optimally maintained.
Securing the future of mobile services 5
Security, Identity, Mobility
SIMalliance: Creating Opportunities for Market Growth
> Open Mobile API
– Standardised way to connect mobile apps with all SEs on a
device (SE form factor neutral) including a service layer to
provide a more intuitive interface and increasingly powerful
functionality.
– Enables delivery of highly secure business and consumer
mobile applications across all SE form factors.
– Referenced by GSMA (NFC Handset & APIs Requirements
and Test Book).
– Open Source implementation (Seek-for-Android).
– Implemented in more than 150 models of Android (NFC)
Smartphones
Open Mobile
API
A
P
P
Securing the future of mobile services 6
Security, Identity, Mobility
A Secure Element (SE) for Each Business Model
> An SE is a tamper resistant component
which is used in a device to provide the
security, confidentiality, and multiple
application environments required to
support various business models
> An SE resides in extremely secure chips
and may exist in a variety of form factors
> The SE should provide separate memory
for each application without interactions
between them
> SIMalliance considers true SEs to be a
combination between software and
dedicated hardware
UICC (SIM)
> Includes the application that authenticates the
user in the network
> Controlled by the mobile network operator
(MNO)
Embedded SE (eSE)
> SE embedded in the mobile at the time of
manufacturing
> Controlled by the device maker (OEM)
Secure MicroSD
> SE embedded in µSD form factor and featuring
large memory
> Controlled by the service provider (SP)
Securing the future of mobile services 7
Security, Identity, Mobility
Memory
MNO BANK
1
BANK
2
SP
Global Platform compliant OS
Certified Secured Hardware &
Software
The UICC is a SE Providing a Safe Execution
Environment for Applications
> Highly Secured (Certifications: EMVCO, Common
Criteria up to EAL5, CAST)
> Highly customisable multi-services platform (Java &
GlobalPlatform OS)
> Connected: NFC (SWP) & remotely manageable
(OTA & OTI)
> Multi-party manageable: Secured domains managed
independently by each entity +dynamic security
domains creation
> Standardised (ISO/IEC, ETSI, 3GPP, …)
> Interoperable for mobile devices, for services hosting
& management (trusted service manager compliant)
> Proven and mature technology – NFC ready
7
Securing the future of mobile services 8
Security, Identity, Mobility
Strong NFC Foundation in Place for Use by Service Providers
124m NFC SIM
shipments in
3 years
2014: 416m NFC
phones to be
shipped*
2017: 53% of NFC-
ready PoS
globally*
In 2013 : 78m NFC SIM
shipped (SIMalliance):
+159%
Japan/Korea:
37m
North America:
24m
Europe:
14m
*Forecast
Securing the future of mobile services 9
Security, Identity, Mobility
Securing Digital Services with SEs is Convenient and
Provides an Enhanced User Experience
Smartphones
With OpenMobileAPI
User
Experience
Universal
with SIM toolkit
(simple UI)
Smartphone
apps with
OpenMobileAPI
Interface to the
physical world
with NFC
Simplified
‘passwords’ with
certificates and
single-sign-on
Securing the future of mobile services 10
Security, Identity, Mobility
Appropriate Utilization of SE in NFC
Securing the future of mobile services 11
Security, Identity, Mobility
Conclusion
> Identity applications, strong authentication & digital signature services
support trust in digital services.
> These services rely on SEs to store and manage user credentials, to
counter security threats and meet certification requirements
> SEs provide a smooth user experience in mobile applications with NFC and
Smartphone API
> Technology options enable service providers to support the identity service
best adapted to their business model using:
– SIM cards
– Micro-SD
– Embedded SEs
Thanks!
Visit www.simalliance.org for
more information

More Related Content

What's hot

IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test Bed
Cellnetrix
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
Rahul Wagh
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
Nehul Gupta
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Innovative biometric voice verification system for mobile devices
Innovative biometric voice verification system for mobile devicesInnovative biometric voice verification system for mobile devices
Innovative biometric voice verification system for mobile devices
Defence and Security Accelerator
 
Samsung SDS FIDO for Government
Samsung SDS FIDO for GovernmentSamsung SDS FIDO for Government
Samsung SDS FIDO for Government
Samsung SDS America
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Block Armour
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
Rivetz
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
 
A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentClarity Thinker
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Block Armour
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
IBM Security
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
Derek Cassidy
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
Block Armour
 
Rivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauceRivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauce
Rivetz
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 

What's hot (20)

IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test Bed
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Innovative biometric voice verification system for mobile devices
Innovative biometric voice verification system for mobile devicesInnovative biometric voice verification system for mobile devices
Innovative biometric voice verification system for mobile devices
 
Samsung SDS FIDO for Government
Samsung SDS FIDO for GovernmentSamsung SDS FIDO for Government
Samsung SDS FIDO for Government
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a Patent
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
Rivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauceRivetz - A blockchain smartphone's secret sauce
Rivetz - A blockchain smartphone's secret sauce
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 

Similar to What UICC Means for NFC & Security

2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
Infineon Technologies AG
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
Ade Okuboyejo
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
PositiveTechnologies
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
Endeavour Software Technologies
 
Prezentare 1 - LTM
Prezentare 1 - LTMPrezentare 1 - LTM
Prezentare 1 - LTM
danielnastase
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
ijngnjournal
 
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
josephjonse
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
Cellnetrix
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
PositiveTechnologies
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
mfrancis
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
Ericsson
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
Samsung Business USA
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
Avinash Birnale
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
NFC Forum
 

Similar to What UICC Means for NFC & Security (20)

2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
50320140501003
5032014050100350320140501003
50320140501003
 
Prezentare 1 - LTM
Prezentare 1 - LTMPrezentare 1 - LTM
Prezentare 1 - LTM
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
 
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, NokiaThe Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
The Future of Mobile Java and Mobility Middleware - Jon Bostrom, Nokia
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 

Recently uploaded (20)

Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 

What UICC Means for NFC & Security

  • 1. Security, Identity, Mobility Secure element architects for today’s generation What UICC Means for NFC & Security JF RUBON SIMalliance IRM Summit Phoenix, AZ 06/05/14
  • 2. Securing the future of mobile services 2 Security, Identity, Mobility SIMalliance: Who we are SIMalliance members represent 86% of the global SIM market and deliver the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM).
  • 3. Securing the future of mobile services 3 Security, Identity, Mobility What we do… SIMalliance is the global, non-profit industry association which simplifies secure element (SE) implementation to drive the creation, deployment and management of secure mobile services. SIMalliance: > Promotes the essential role of the secure element (SE) in delivering secure mobile applications and services across all devices that can access wireless networks > Identifies and addresses SE-related technical issues, and clarifies and recommends existing technical standards relevant to SE implementation > Promotes an open SE ecosystem to facilitate and accelerate delivery of secure mobile applications globally > Monitors the market and produces market data reports
  • 4. Securing the future of mobile services 4 Security, Identity, Mobility SIMalliance Latest Delicerables > Secure Element Deployment & Host Card Emulation v1.0 – Introduction to Android's Host Card Emulation (HCE) and explores its value to the NFC ecosystem relative to the Secure Element (SE) – Technology remains immature, un-standardised and, relative to SE-based deployments, vulnerable to malicious attack. > UICC LTE Profile – A collection of requirements for optimal support of LTE/EPS networks by UICC. – Widely utilised by North American MNOs. > UICC Device Implementation Guidelines – Outline fundamental and optional UICC features device vendors need to support to optimise UICC interoperability in future devices. > Stepping Stones Documents – Best practices for development of interoperable applications (USIM, NFC, SE). > General SIM Security Guidelines – Ensure that a SIM's security levels are optimally maintained.
  • 5. Securing the future of mobile services 5 Security, Identity, Mobility SIMalliance: Creating Opportunities for Market Growth > Open Mobile API – Standardised way to connect mobile apps with all SEs on a device (SE form factor neutral) including a service layer to provide a more intuitive interface and increasingly powerful functionality. – Enables delivery of highly secure business and consumer mobile applications across all SE form factors. – Referenced by GSMA (NFC Handset & APIs Requirements and Test Book). – Open Source implementation (Seek-for-Android). – Implemented in more than 150 models of Android (NFC) Smartphones Open Mobile API A P P
  • 6. Securing the future of mobile services 6 Security, Identity, Mobility A Secure Element (SE) for Each Business Model > An SE is a tamper resistant component which is used in a device to provide the security, confidentiality, and multiple application environments required to support various business models > An SE resides in extremely secure chips and may exist in a variety of form factors > The SE should provide separate memory for each application without interactions between them > SIMalliance considers true SEs to be a combination between software and dedicated hardware UICC (SIM) > Includes the application that authenticates the user in the network > Controlled by the mobile network operator (MNO) Embedded SE (eSE) > SE embedded in the mobile at the time of manufacturing > Controlled by the device maker (OEM) Secure MicroSD > SE embedded in µSD form factor and featuring large memory > Controlled by the service provider (SP)
  • 7. Securing the future of mobile services 7 Security, Identity, Mobility Memory MNO BANK 1 BANK 2 SP Global Platform compliant OS Certified Secured Hardware & Software The UICC is a SE Providing a Safe Execution Environment for Applications > Highly Secured (Certifications: EMVCO, Common Criteria up to EAL5, CAST) > Highly customisable multi-services platform (Java & GlobalPlatform OS) > Connected: NFC (SWP) & remotely manageable (OTA & OTI) > Multi-party manageable: Secured domains managed independently by each entity +dynamic security domains creation > Standardised (ISO/IEC, ETSI, 3GPP, …) > Interoperable for mobile devices, for services hosting & management (trusted service manager compliant) > Proven and mature technology – NFC ready 7
  • 8. Securing the future of mobile services 8 Security, Identity, Mobility Strong NFC Foundation in Place for Use by Service Providers 124m NFC SIM shipments in 3 years 2014: 416m NFC phones to be shipped* 2017: 53% of NFC- ready PoS globally* In 2013 : 78m NFC SIM shipped (SIMalliance): +159% Japan/Korea: 37m North America: 24m Europe: 14m *Forecast
  • 9. Securing the future of mobile services 9 Security, Identity, Mobility Securing Digital Services with SEs is Convenient and Provides an Enhanced User Experience Smartphones With OpenMobileAPI User Experience Universal with SIM toolkit (simple UI) Smartphone apps with OpenMobileAPI Interface to the physical world with NFC Simplified ‘passwords’ with certificates and single-sign-on
  • 10. Securing the future of mobile services 10 Security, Identity, Mobility Appropriate Utilization of SE in NFC
  • 11. Securing the future of mobile services 11 Security, Identity, Mobility Conclusion > Identity applications, strong authentication & digital signature services support trust in digital services. > These services rely on SEs to store and manage user credentials, to counter security threats and meet certification requirements > SEs provide a smooth user experience in mobile applications with NFC and Smartphone API > Technology options enable service providers to support the identity service best adapted to their business model using: – SIM cards – Micro-SD – Embedded SEs