SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
MARKET STUDIES
MOBILE AUTHENTICATION
Rajiv Dholakia| VP Products| rajiv@noknok.com
© 2017 Nok Nok Labs 1CONFIDENTIAL – DO NOT DISTRIBUTE
ScalingAhighlyconnectedworld
2
Everything
Authenticates
50 Billion
Connected Devices by 2020:
Internet of Things
People Devices Ecosystems
+ +
Corporate Networks
Mobile Commerce
Mobile Payments
Social Networks
eHealth
Consumer Use Cases
Enterprise Use Cases
NOK NOK LABS, PRIVATE & CONFIDENTIAL
Device Integrity
Layered
Security
Models
NOK NOK LABS 3
Device Keys &
Certificates
Crypto Engines
Trusted Execution Environments
Ç√
Secure Elements
Trustlet Trustlet Trustlet
Rich Operating System (e.g. Android)
OS Partition
User Partition
App
Sandbox
User
Partition
App
Sandbox
App
Sandbox
Overlay Services
App Stores
OS Integrity Services (e.g. Android
Safety Net)
Site and App Reputation/Integrity
Device and Cloud Data Managers
Filter what gets on
the device…
Isolate the apps…
Harden the device…
A Unique Opportunity
4
Hardware Integrity
OS Integrity
App Integrity
Network Integrity
User Integrity
Re-Architect Computing
Using Hardware-Based
Trust
Chain of Trust
Trusted Platform for Authentication
NOK NOK LABS
Nok Nok Labs | @NokNokLabs| info@noknok.com
JANUARY 19, 2018
Nok Nok Labs Customer Case Study Summary
SAMPLE VIDEO CLIPS
Nok Nok Labs Deployments – what we help our customers
achieve:
- NTT DOCOMO Demo Videos:
• https://www.youtube.com/watch?v=QzM4PpXEqP8
• https://www.youtube.com/watch?t=2&v=UP0DyYk5IXc
- Nok Nok Labs - How it Works
• https://www.youtube.com/watch?v=YcfGlLrSzQw
PRIVATE & CONFIDENTIAL 6NOK NOK LABS
NOK NOK LABS7
Solutions for Financial Services
• Founding Member of the FIDO Alliance
• 29% of payments made on the Mobile Device
Replacing passwords with biometrics for
Login • Transaction Confirmation • Mobile Commerce
With Nok Nok, we have seen lower fraud
rates and increasing spend. We are
seeing more spend, around 5 to 10%, with
no increase in fraud.
-- PayPal (internal)
NOK NOK LABS
Business Problem
• ID cards can be stolen, shared or copied. A more effective
method of validation for entry needs to be developed and
deployed to our global customer user base.
Must Haves
• Eliminate the replacement cost of lost or stolen cards
• Remote provisioning, allowing access to be set up in advance
of a user visiting a site
• Optional two-factor authentication for added security (PIN or
fingerprint)
• Reducing expenses with a subscription that allows for reissued
credentials.
Results
• Customers can use a mobile device just like an access card.
• They can store credentials for multiple sites.
• The have long range access with Bluetooth wireless technology
• PINs and fingerprints are stored on the mobile device, privately
and securely using FIDO.
https://security.gallagher.com/products/mobile-connect-app
Solutions for the IoT Industry
NOK NOK LABS9
Solutions for the IoT Industry
Integrating biometrics into physical access control points.
Replacing cards & badges with apps & smartphones.
• Global leader in Physical Access Security
• Over 1,000 employees worldwide
• Customers in 130 countries
• First FIDO engagement in the IoT Space
Gallagher customers require powerful access control
solutions. We’ve developed this strategic partnership
with Nok Nok Labs because of their deep roots in the
authentication landscape and their first-to-market
FIDO-based solution. This state-of-the-art, standards-
based platform will deliver a tremendous user
experience.
- Steve Bell, Chief Technology Officer at Gallagher
GSMA – Mobile Connect Use Cases with Nok Nok Labs
Showcased at MWC 2017
IoT Beverage Dispenser, VISA POS terminal, EMS Service Health Record Access
© 2017 Nok Nok Labs 10
BENEFIT of a FIDO FRAMEWORK
Enabling Multifactor Authentication
Easy for developer, IT & END-USER
RIGHT LEVEL OF ABSTRACTION
11NOK NOK LABS
Something
I Know
Something
I Have
Something I Have
+
Something I Know
Or
Something I Have,
Who I am
…
Or
[Something I
Have, Who I am]
x2
…
TapTouch
SAME DEVELOPER API, SAME BACKEND, DIFFERENT POLICY
“Gold Server” Supports ALL (U2F, UAF, FIDO2)
protocols for maximum coverage of use cases
Common Themes
• User Experience design
• Understanding the threat model for the authenticator
• Designing communication to customer & internal support teams
• Phone as Second-Factor to PCs, TVs, Kiosks etc.
• Wearables as Second-Factor for Phones
• Accounting for lifecycle interactions
• Security Benefits (Shorter Session Tokens)
© 2017 Nok Nok Labs 12
Conclusions – Mobile Authentication
• Mobile is a great glue between users, devices and clouds
• Consumer behaviors are being shaped around mobile devices
• Wearables are in their early days but could come strong in the next 3+
years
• Mobile devices present great foundation for building high
assurance authentication
• FIDO gives you a great framework to put this foundation to work for
you to achieve simplicity, security and scalability
• Deployed at – carrier-grade, internet-scale to billions of users
© 2017 Nok Nok Labs 13
Thank you
© 2017 Nok Nok Labs 14CONFIDENTIAL – DO NOT DISTRIBUTE
DRAFT

Más contenido relacionado

La actualidad más candente

FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Alliance
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APACFIDO Alliance
 
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User ExperienceFIDO Alliance
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond PasswordsFIDO Alliance
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO Alliance
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyFIDO Alliance
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO Alliance
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in EducationFIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO Alliance
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Alliance
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali OWASP Delhi
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without PasswordsFIDO Alliance
 

La actualidad más candente (20)

FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile Network
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 

Similar a Market Study on Mobile Authentication

Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solutionJavier Gonzalez
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu France
 
Why WSO2 for Digital Transformation?
Why WSO2 for Digital Transformation? Why WSO2 for Digital Transformation?
Why WSO2 for Digital Transformation? WSO2
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...Pôle Systematic Paris-Region
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of ThingsEricsson
 

Similar a Market Study on Mobile Authentication (20)

Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
Fujitsu IT Future 2013 : Le futur du poste de travail avec Intel par Fabien E...
 
Why WSO2 for Digital Transformation?
Why WSO2 for Digital Transformation? Why WSO2 for Digital Transformation?
Why WSO2 for Digital Transformation?
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
 

Más de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 

Más de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Market Study on Mobile Authentication

  • 1. MARKET STUDIES MOBILE AUTHENTICATION Rajiv Dholakia| VP Products| rajiv@noknok.com © 2017 Nok Nok Labs 1CONFIDENTIAL – DO NOT DISTRIBUTE
  • 2. ScalingAhighlyconnectedworld 2 Everything Authenticates 50 Billion Connected Devices by 2020: Internet of Things People Devices Ecosystems + + Corporate Networks Mobile Commerce Mobile Payments Social Networks eHealth Consumer Use Cases Enterprise Use Cases NOK NOK LABS, PRIVATE & CONFIDENTIAL
  • 3. Device Integrity Layered Security Models NOK NOK LABS 3 Device Keys & Certificates Crypto Engines Trusted Execution Environments Ç√ Secure Elements Trustlet Trustlet Trustlet Rich Operating System (e.g. Android) OS Partition User Partition App Sandbox User Partition App Sandbox App Sandbox Overlay Services App Stores OS Integrity Services (e.g. Android Safety Net) Site and App Reputation/Integrity Device and Cloud Data Managers Filter what gets on the device… Isolate the apps… Harden the device…
  • 4. A Unique Opportunity 4 Hardware Integrity OS Integrity App Integrity Network Integrity User Integrity Re-Architect Computing Using Hardware-Based Trust Chain of Trust Trusted Platform for Authentication NOK NOK LABS
  • 5. Nok Nok Labs | @NokNokLabs| info@noknok.com JANUARY 19, 2018 Nok Nok Labs Customer Case Study Summary
  • 6. SAMPLE VIDEO CLIPS Nok Nok Labs Deployments – what we help our customers achieve: - NTT DOCOMO Demo Videos: • https://www.youtube.com/watch?v=QzM4PpXEqP8 • https://www.youtube.com/watch?t=2&v=UP0DyYk5IXc - Nok Nok Labs - How it Works • https://www.youtube.com/watch?v=YcfGlLrSzQw PRIVATE & CONFIDENTIAL 6NOK NOK LABS
  • 7. NOK NOK LABS7 Solutions for Financial Services • Founding Member of the FIDO Alliance • 29% of payments made on the Mobile Device Replacing passwords with biometrics for Login • Transaction Confirmation • Mobile Commerce With Nok Nok, we have seen lower fraud rates and increasing spend. We are seeing more spend, around 5 to 10%, with no increase in fraud. -- PayPal (internal)
  • 8. NOK NOK LABS Business Problem • ID cards can be stolen, shared or copied. A more effective method of validation for entry needs to be developed and deployed to our global customer user base. Must Haves • Eliminate the replacement cost of lost or stolen cards • Remote provisioning, allowing access to be set up in advance of a user visiting a site • Optional two-factor authentication for added security (PIN or fingerprint) • Reducing expenses with a subscription that allows for reissued credentials. Results • Customers can use a mobile device just like an access card. • They can store credentials for multiple sites. • The have long range access with Bluetooth wireless technology • PINs and fingerprints are stored on the mobile device, privately and securely using FIDO. https://security.gallagher.com/products/mobile-connect-app Solutions for the IoT Industry
  • 9. NOK NOK LABS9 Solutions for the IoT Industry Integrating biometrics into physical access control points. Replacing cards & badges with apps & smartphones. • Global leader in Physical Access Security • Over 1,000 employees worldwide • Customers in 130 countries • First FIDO engagement in the IoT Space Gallagher customers require powerful access control solutions. We’ve developed this strategic partnership with Nok Nok Labs because of their deep roots in the authentication landscape and their first-to-market FIDO-based solution. This state-of-the-art, standards- based platform will deliver a tremendous user experience. - Steve Bell, Chief Technology Officer at Gallagher
  • 10. GSMA – Mobile Connect Use Cases with Nok Nok Labs Showcased at MWC 2017 IoT Beverage Dispenser, VISA POS terminal, EMS Service Health Record Access © 2017 Nok Nok Labs 10
  • 11. BENEFIT of a FIDO FRAMEWORK Enabling Multifactor Authentication Easy for developer, IT & END-USER RIGHT LEVEL OF ABSTRACTION 11NOK NOK LABS Something I Know Something I Have Something I Have + Something I Know Or Something I Have, Who I am … Or [Something I Have, Who I am] x2 … TapTouch SAME DEVELOPER API, SAME BACKEND, DIFFERENT POLICY “Gold Server” Supports ALL (U2F, UAF, FIDO2) protocols for maximum coverage of use cases
  • 12. Common Themes • User Experience design • Understanding the threat model for the authenticator • Designing communication to customer & internal support teams • Phone as Second-Factor to PCs, TVs, Kiosks etc. • Wearables as Second-Factor for Phones • Accounting for lifecycle interactions • Security Benefits (Shorter Session Tokens) © 2017 Nok Nok Labs 12
  • 13. Conclusions – Mobile Authentication • Mobile is a great glue between users, devices and clouds • Consumer behaviors are being shaped around mobile devices • Wearables are in their early days but could come strong in the next 3+ years • Mobile devices present great foundation for building high assurance authentication • FIDO gives you a great framework to put this foundation to work for you to achieve simplicity, security and scalability • Deployed at – carrier-grade, internet-scale to billions of users © 2017 Nok Nok Labs 13
  • 14. Thank you © 2017 Nok Nok Labs 14CONFIDENTIAL – DO NOT DISTRIBUTE DRAFT