SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Mobile Connect & FIDO
About  the  GSMA
The  GSMA  represents  the  interests  of  
mobile  operators  worldwide
Spanning  more  than  220  countries,  the  
GSMA  unites  nearly  800  of  the  world’s  
mobile  operators,  as  well  as  more  than  
230  companies  in  the  broader  mobile  
ecosystem
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect:  a  convenient  and  secure  alternative  to  
passwordsthat  also  Protects  consumers  privacy  
• Easy  to  use as  it  uses  the  mobile  phone  for  
authentication  (i.e.  no  passwords)
• Anonymous but  secure  log-­in  (no  passwords  to  
steal,  improved  user  experience,  reduce  friction)  
• Adds  trust  into  digital  transactions  (e.g.  by  
confirming  location,  user  identity,  usage)
• Protects  privacy  (operator  confirm  credentials,  
user  gives  consent  for  sharing)
• Reduce  SP  fraud through  assurance  that  there  
is  as  real  person  behind  the  account
• Simple  and  cost  effective  for  MNOs  to  deploy,  
leveraging  existing  operator  assets
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Something  I  
Know
Something  I  
Have
Something  I  Have
+
Something  I  
Know
Something  I  Have
+
Something  I  Am
Or
Mobile  Connect  and  FIDO  both  seek  to  replace  passwords
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ Both  FIDO  and  Mobile  Connect  are  addressing  the  same  problem:  easier,  safer  
online  authentication
¢ Both  FIDO  and  Mobile  Connect  leverage  the  mobile  phone  to  achieve  this
¢ Whilst  Mobile  Connect  uses  existing  MNO  services  for  authentication   (SMS,  USSD,  
SIM  Toolkit)
¢ …  FIDO  leverages  the  local  device  authentication   on  the  phone  itself
¢ In  doing  so,  both  provide  easy,  secure  two-­‐factor  authentication
¢ Both  also  provide  a  pluggable  framework  that  can  support  a  variety  of  security  
levels  as  well  as  supporting  new  authentication   methods  as  they  arise
FIDO  objectives  align  well  with  those  of  Mobile  Connect
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Synergistic  fit  using  FIDO  for  the  first  mile  of  Mobile  Connect
FIDO  UAF  protocol
Mobile  phone
with  FIDO  client AuthN server
MNO
Tablet/desktop
Service  access   request
Service  Provider
Authentication  
request
Identity  GW
First  mile
Second  mileSIM  applet  protocol  (CPAS8)
AuthN
server
SIM  
applet
A  key  difference  between  FIDO  and  
Mobile  Connect  is  that  FIDO  purposefully  
focuses  solely  on  the  first  mile  –
authentication  itself  – whilst  Mobile  
Connect  also  provides  a  federation  layer  
via  OpenID  Connect  
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
MNO
¢ Leveraging  FIDO  enables  users  to  authenticate  using  existing  
authentication  mechanisms  on  their  mobile  phone
¢ …including  biometrics  – the  user  
becomes  the  credential  (Something  I  am)
FIDO  can  be  integrated  into  Mobile  Connect  to  extend  the  range  of  
authenticators
Authentication
Mobile  phone
with  FIDO  client MFAS Identity  GW
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect  and  FIDO  UAF  integration:  White  Paper
¢ Main  objective:
– Overview  of  FIDO  Architecture  and  use  cases
– Integration  of  FIDO  UAF  authenticators  into  Mobile  Connect  arch
¢ Status:
– Co-­‐developed  between  GSMA,  MNOs  and  FIDO  members
– First  draft  finished  and  out  for  review  within  FIDO  Alliance  and  GSMA;  targeting  
publication  by  end  June
¢ Left  for  a  second  phase:
– UICC  based  FIDO  authenticator
– Use  of  UICC  to  enhance  FIDO  implementation  security
– FIDO  U2F  integration
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
Mobile  Connect  and  FIDO  UAF  integration  building  blocks
MNO
Server Side
User Mobile Phone
Client Side
FIDO Metadata Service
IdP
FIDO Server
Mobile Connect App
FIDO Client
ASM
FIDO Authenticator
Device Push Notification System
(ex. Android GCM)
FIDO%Authen,cator%
IDGW%
INT  1:  FIDO  Transport
Binding Protocol
INT  2:  Vendor dependent
interface
INT  3:  FIDO  defined (OS  
dependent)
INT  4:  Notification system
interface  (client-­side)
INT  5:  Notification system
interface  (server-­side)
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ Service  Providers  need  to  be  able  to  both  specify  and  receive  feedback  on  the  type  of  
authenticator  used  
¢ Mobile  Connect
– uses  Level  of  Assurance  (LoA)  values  (ISO  29115)  in  the  OIDC  request  acr_values
params,  so  the  SP  can  indicate  the  authenticator  class  that  should  be  used
¢ FIDO  
– uses  the  FIDO  Policy  to  describe  the  required  authenticator  characteristics  for  
accepted  authenticators
¢ Options:
– Expand  the  list  of  acr_values to  accommodate  additional  LoA/policies
– Capture  SP  requirements  at  registration  to  the  Mobile  Connect  service  and  
propagate  via  the  Mobile  Connect  federation
Matching  of  FIDO  policies  to  OpenID  Connect  ‘acr_values’  
©  GSMA   2014
All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy  
¢ GSMA  White  paper
– Continue  Working  on  open  issues  related   to  the  integration  of  
the  FIDO  authentication  framework  with  Mobile  Connect
– Improve  the  document  with  feedback  from  the  PoC
¢ FIDO/GSMA/MNO  PoC (June/July)
– Prototype  of  FIDO  integration  into  an  end-­‐end  Mobile  Connect  
implementation:  Telefonica   +  NokNok Labs
– Targeted  for  Mobile  World  Congress  Shanghai
¢ MNO/SP  beta  trial  (post  MWCS)
– Live  implementation   and  trial  of  FIDO  authenticators  within  a  
Mobile  Connect  service  provided  to  an  SP
Next  steps

Más contenido relacionado

La actualidad más candente

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Alliance
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong AuthenticationFIDO Alliance
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationFIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without PasswordsFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical OverviewFIDO Alliance
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionFIDO Alliance
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...FIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 

La actualidad más candente (20)

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer Authentication
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
Expected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social ApplicationsExpected Use Cases of FIDO Authentication for Social Applications
Expected Use Cases of FIDO Authentication for Social Applications
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 

Destacado

"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World CongressApigee | Google Cloud
 
Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012Nov Matake
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22Nov Matake
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO Alliance
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Alliance
 
MVNO for MNO
MVNO for MNOMVNO for MNO
MVNO for MNOmikerrr
 
Addressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO modelAddressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO modelDKAL
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect Nat Sakimura
 

Destacado (10)

WSO2 Telco MCX
WSO2 Telco MCXWSO2 Telco MCX
WSO2 Telco MCX
 
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
"The Power of One" - Apigee's Anurag Wadehra at Mobile World Congress
 
Account Chooser #idit2012
Account Chooser #idit2012Account Chooser #idit2012
Account Chooser #idit2012
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
MVNO for MNO
MVNO for MNOMVNO for MNO
MVNO for MNO
 
Addressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO modelAddressing the mobile market with the MVNO model
Addressing the mobile market with the MVNO model
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 

Similar a Mobile Connect and the FIDO standards

OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateOpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateMikeLeszcz
 
OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018Bjorn Hjelm
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateBjorn Hjelm
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...Bjorn Hjelm
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersmParticle
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...drctan
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectBjorn Hjelm
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaThibault Cantegrel
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forumkkvences
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
 

Similar a Mobile Connect and the FIDO standards (20)

OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateOpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
 
OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
 
BT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokersBT's guide to MiFIDII for financial advisers and brokers
BT's guide to MiFIDII for financial advisers and brokers
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
Securewify - Eximuis 2015
Securewify - Eximuis 2015Securewify - Eximuis 2015
Securewify - Eximuis 2015
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
DIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsmaDIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsma
 

Más de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 

Más de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Último

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Mobile Connect and the FIDO standards

  • 2. About  the  GSMA The  GSMA  represents  the  interests  of   mobile  operators  worldwide Spanning  more  than  220  countries,  the   GSMA  unites  nearly  800  of  the  world’s   mobile  operators,  as  well  as  more  than   230  companies  in  the  broader  mobile   ecosystem
  • 3. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect:  a  convenient  and  secure  alternative  to   passwordsthat  also  Protects  consumers  privacy   • Easy  to  use as  it  uses  the  mobile  phone  for   authentication  (i.e.  no  passwords) • Anonymous but  secure  log-­in  (no  passwords  to   steal,  improved  user  experience,  reduce  friction)   • Adds  trust  into  digital  transactions  (e.g.  by   confirming  location,  user  identity,  usage) • Protects  privacy  (operator  confirm  credentials,   user  gives  consent  for  sharing) • Reduce  SP  fraud through  assurance  that  there   is  as  real  person  behind  the  account • Simple  and  cost  effective  for  MNOs  to  deploy,   leveraging  existing  operator  assets
  • 4. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Something  I   Know Something  I   Have Something  I  Have + Something  I   Know Something  I  Have + Something  I  Am Or Mobile  Connect  and  FIDO  both  seek  to  replace  passwords
  • 5. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ Both  FIDO  and  Mobile  Connect  are  addressing  the  same  problem:  easier,  safer   online  authentication ¢ Both  FIDO  and  Mobile  Connect  leverage  the  mobile  phone  to  achieve  this ¢ Whilst  Mobile  Connect  uses  existing  MNO  services  for  authentication   (SMS,  USSD,   SIM  Toolkit) ¢ …  FIDO  leverages  the  local  device  authentication   on  the  phone  itself ¢ In  doing  so,  both  provide  easy,  secure  two-­‐factor  authentication ¢ Both  also  provide  a  pluggable  framework  that  can  support  a  variety  of  security   levels  as  well  as  supporting  new  authentication   methods  as  they  arise FIDO  objectives  align  well  with  those  of  Mobile  Connect
  • 6. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Synergistic  fit  using  FIDO  for  the  first  mile  of  Mobile  Connect FIDO  UAF  protocol Mobile  phone with  FIDO  client AuthN server MNO Tablet/desktop Service  access   request Service  Provider Authentication   request Identity  GW First  mile Second  mileSIM  applet  protocol  (CPAS8) AuthN server SIM   applet A  key  difference  between  FIDO  and   Mobile  Connect  is  that  FIDO  purposefully   focuses  solely  on  the  first  mile  – authentication  itself  – whilst  Mobile   Connect  also  provides  a  federation  layer   via  OpenID  Connect  
  • 7. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   MNO ¢ Leveraging  FIDO  enables  users  to  authenticate  using  existing   authentication  mechanisms  on  their  mobile  phone ¢ …including  biometrics  – the  user   becomes  the  credential  (Something  I  am) FIDO  can  be  integrated  into  Mobile  Connect  to  extend  the  range  of   authenticators Authentication Mobile  phone with  FIDO  client MFAS Identity  GW
  • 8. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect  and  FIDO  UAF  integration:  White  Paper ¢ Main  objective: – Overview  of  FIDO  Architecture  and  use  cases – Integration  of  FIDO  UAF  authenticators  into  Mobile  Connect  arch ¢ Status: – Co-­‐developed  between  GSMA,  MNOs  and  FIDO  members – First  draft  finished  and  out  for  review  within  FIDO  Alliance  and  GSMA;  targeting   publication  by  end  June ¢ Left  for  a  second  phase: – UICC  based  FIDO  authenticator – Use  of  UICC  to  enhance  FIDO  implementation  security – FIDO  U2F  integration
  • 9. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   Mobile  Connect  and  FIDO  UAF  integration  building  blocks MNO Server Side User Mobile Phone Client Side FIDO Metadata Service IdP FIDO Server Mobile Connect App FIDO Client ASM FIDO Authenticator Device Push Notification System (ex. Android GCM) FIDO%Authen,cator% IDGW% INT  1:  FIDO  Transport Binding Protocol INT  2:  Vendor dependent interface INT  3:  FIDO  defined (OS   dependent) INT  4:  Notification system interface  (client-­side) INT  5:  Notification system interface  (server-­side)
  • 10. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ Service  Providers  need  to  be  able  to  both  specify  and  receive  feedback  on  the  type  of   authenticator  used   ¢ Mobile  Connect – uses  Level  of  Assurance  (LoA)  values  (ISO  29115)  in  the  OIDC  request  acr_values params,  so  the  SP  can  indicate  the  authenticator  class  that  should  be  used ¢ FIDO   – uses  the  FIDO  Policy  to  describe  the  required  authenticator  characteristics  for   accepted  authenticators ¢ Options: – Expand  the  list  of  acr_values to  accommodate  additional  LoA/policies – Capture  SP  requirements  at  registration  to  the  Mobile  Connect  service  and   propagate  via  the  Mobile  Connect  federation Matching  of  FIDO  policies  to  OpenID  Connect  ‘acr_values’  
  • 11. ©  GSMA   2014 All   GSMA   meetings   are   conducted   in   full   compliance   with   the  GSMA’s   anti-­trust   compliance   policy   ¢ GSMA  White  paper – Continue  Working  on  open  issues  related   to  the  integration  of   the  FIDO  authentication  framework  with  Mobile  Connect – Improve  the  document  with  feedback  from  the  PoC ¢ FIDO/GSMA/MNO  PoC (June/July) – Prototype  of  FIDO  integration  into  an  end-­‐end  Mobile  Connect   implementation:  Telefonica   +  NokNok Labs – Targeted  for  Mobile  World  Congress  Shanghai ¢ MNO/SP  beta  trial  (post  MWCS) – Live  implementation   and  trial  of  FIDO  authenticators  within  a   Mobile  Connect  service  provided  to  an  SP Next  steps