SlideShare a Scribd company logo
1 of 25
SECURING SERVICES IN A 
MOBILE FIRST WORLD 
JF Rubon, Strategy & Innovation 
05/11/2014
Mobile Corporate Badge 
AGENDA 
1 – GEMALTO : WHO WE ARE 
2 – THE SHIFT TO MOBILE 
3 – MOBILE CONNECT 
2 Mobile Corporate Badge
GEMALTO KEY FIGURES 
OUR COMPANY 
OUR CLIENTS 
OUR INNOVATION 
450 OPERATORS 
10/11/2014 
€2.4BN 
(2013) 
INVESTED IN R&D 
€177M 
(2012) 
NATIONALITIES 
190 
12,000 
REVENUES 
MOBILE NETWORK 
PATENTS & PATENT 
APPLICATIONS 
FINANCIAL 
INSTITUTIONS 
3,000+ 
4,300 
EMPLOYEES 
80 eGOVERNMENT 
PROGRAMS 
110 
DIGITAL 
1,700 ENGINEERS 
NEW INNOVATIONS 
FILED IN 2012 
3
Gemalto as a leader of Authentication 
4 10.11.14 
GARTNER’S MAGIC QUADRANT 
ON USER AUTHENTICATION 
(eBanking / Enterprise) 
Gemalto 
AUTHENTICATION SOLUTION 
95% 
of the authentication 
market covered 
by these players 
Safenet
+100M people using our Authentication solutions 
200CUSTOMERS 
CORPORATE 
5 LinqUs Mobile ID 10.11.14 
NATIONAL 
DEPLOYMENTS 
OF MobileID 
MNO 
+20 
Service Providers 
already connected 
our platform 
500 
on going deployments 
for 2014 
+5 
MOBILE eBANKING 
users protected by 
EZIO SOLUTIONS 
+90M 
WW 
MANY CUSTOMERS FROM 
FORTUNE 500 
employees WW use 
our eID solutions 
+7M
The shift to mobile 
Security needs, solutions
2.7 Bn people* frustrated by their digital journey… 
(source: ICT, number of Internet users in 2013) 
Username management nightmare 
Password fatigue and weaknesses 
Registration fatality 
Trust and privacy failure 
They need: Convenient online authentication, 
secure environment and mobility 
* Source: Fireclick – NorSIS Institute - Microsoft 
7 LinqUs Mobile ID 10.11.14
… impacting online service providers activities 
WEB AND E-MERCHANT SERVICES: 
 Security breaches, impacting brand image 
Low conversion / transformation rate 
BANKS: 
Customer service costs 
Clients growing mobility vs inconvenience to access ebanking 
ENTERPRISES: 
Securing cloud services access to enhance employees’ mobility 
Security breaches multiplying 
GOVERNMENTS: 
Reduce long time-frame and administrative costs 
Dematerialization regulation pressure 
They need: Trusted ecosystem and customer attraction 
 Revenue and/or  Costs 
8 LinqUs Mobile ID 10.11.14
Service providers need scalable authentication 
levels of assurance 
9 LinqUs Mobile ID 10.11.14
THE BIG 
SHIFT TO MOBILE 
50 BN 
1.36BN 
10 Gemalto Mobile 10.11.14 
SMARTPHONE 
SALES 
SOURCES: 
GEMALTO, GATNER, INFORMA, PUBLIC SUBSCRIBER DATA 
58.5BN 
(2012) 
CONNECTED 
DEVICES BY 
2020 
LTE SUBSCRIPTIONS 
BY 2018 
203BN 
(2020) 
OTT MESSAGES 
NFC- ENABLED 
SMARTPHONES 
USERS COVERED BY TSMs 
1 BN 
(2013) 
~25% 
300 M 
(2010) 
1.5BN
Existing hardware solutions for the PC world 
Smart Cards 
 May include user picture 
 Company logo 
 Physical access (badge) 
11 LinqUs Mobile ID 10.11.14 
Tokens 
 long battery lifetime 
Optional USB interface 
Company logo 
Can they still be used in the mobile world ?
Shift to mobile : 2 possible axis 
Keep a separate token 
Alongside the mobile devices 
12 Mobile Corporate Badge 
Use Mobile Device 
Hardware capabilities 
& 
Transfer the secure application & 
credentials into the device 
Use Built-in NFC capability 
Use an attached reader 
Sleeve 
USB readers 
Use a detached reader 
Bluetooth 
Bluetooth Smart (BLE) 
UICC 
μSD 
eSE 
TEE
MOBILE COMPATIBILITY 
13 Mobile Corporate Badge 
Secure 
Element 
Family 
Badge & NFC / BLE 
Connectivity Needed 
Large compatibility 
UICC 
Through MNOs 
Large compatibility 
microSD 
Slot Needed 
Fair compatibility 
Attached Reader 
Low user convenience 
Devices with external port 
eSE 
Fragmented market 
Soldered to the device 
TEE 
Selected devices only 
Major mobile makers
Compatibility with devices 
Without a reader 
Detached readers 
Attached readers 
14 
Dual Interface Card 
Bluetooth reader 
Standard or proprietary port 
( only)
UICC 
The most universal secure element 
Highly secure & certified 
Fully standardized 
Each Service Provider has dedicated secure 
‘space’ on SIM 
Remotely manageable 
Service platform (Java Card™) 
Existing deployment processes 
Issued by the MNOs 
SHIPMENTS OF SIM CARDS 
IN 2013 4.2BN 
15 Gemalto Mobile 10.11.14 
Memory 
MNO BANK 
1 
BANK 
2 
SP 
Global Platform compliant OS 
Certified Secured Hardware & 
Software
EMBEDDED SECURE ELEMENT 
A second highly secure chip in the handset 
Inherits security from the UICC 
Easy to integrate into any device 
in multiple form factors 
Remotely manageable 
Enabling innovative secure use cases 
Also suitable for new consumer devices 
(wearables, tablets, consoles) 
16 Gemalto Mobile 10.11.14
TRUSTED EXECUTION ENVIRONMENT 
Relies on hardware processor features 
Remotely manageable 
Secure interaction between user, 
services & peripherals (screen, touch..) 
Secure storage of code & data 
Integrated into the main processor 
17 Gemalto Mobile 10.11.14 
Application Processor 
LOGO COLOR VERSIONS 
OPERATING SYSTEM 
(e.g Android) 
TEE OS 
LOGO 
LOGO IN BLACK 
TRUSTZONE™ 
SYSTEM-ON-CHIP 
LOGO ON BLACK
GSMA Mobile Connect 
Mobile Operators as identity providers
GSMA Mobile Connect 
“Develop an innovative new service that will allow 
consumers to securely access a wide range of 
digital services using their mobile phone number 
for authentication.” Source: GSMA Mobile Connect press release – 24/02/2014 
19 LinqUs Mobile ID 10.11.14 
$5B 
revenue per year 
when mobile ID 
market is mature 
Source: Greenwich Consulting 
for GSMA
The goal is to fulfill service providers’ 
ID management needs… 
MOBILE OPERATORS 
to provide all service providers with a common identity 
solution leveraging convenient, strong SIM-based 
Mobile Connect service 
Light 
Authentication 
Medium to Strong 
Authentication 
20 LinqUs Mobile ID 10.11.14 
Strong 
Authentication 
Medium to Strong 
Authentication 
Improving end-user 
journey for more 
transactions 
Adding customer 
channels without 
security breach 
Reducing 
administration costs 
and time-frame 
Leveraging cloud 
services and making 
their workforce mobile
…bringing a diversity of services 
Entry-level ID, 
similar to Facebook 
Connect, low level 
of security 
Use mobile as 
second factor 
overlay 
21 LinqUs Mobile ID 10.11.14 
Use mobile as 
a replacement 
for legally binding 
‘wet’ signature 
MNO becomes 
ID custodian: 
certifies users’ 
details to SPs 
FEDERATED 
IDENTITY 
2ND FACTOR 
AUTHENTICATION 
MOBILE DIGITAL 
SIGNATURE 
IDENTITY 
BROKERAGE 
Single Sign On 
Solutions 
OTP, PKI, NFC, 
biometrics… 
solutions 
Mobile PKI 
Solutions IdM Solutions 
Web access 
granted!
Trusted Service Manager (TSM) solution 
to support a complex ecosystem 
Service Providers Mobile Operators 
MNO-TSM 
To give access to the MNO subscribers base 
while ensuring quality of access 
© 2014 Gemalto 
SP-TSM 
To securely deploy & manage SP 
applications on any wireless network 
MNO 1 
MNO 2 
MNO 3 
22 
SP-TSM MNO-TSM
Providing the simplest user experience 
23 LinqUs Mobile ID 10.11.14
3 key deployment challenges 
SECURITY 
No “one fits all” solution 
24 LinqUs Mobile ID 10.11.14 
Secure access 
Secured communication 
Corporate data protection 
Fraud Management 
CONVENIENCE 
No convenience, no adoption 
Enrolment and usage 
Need to stick to smartphone user 
experience 
REACH 
Address fragmented 
technical platforms: 
multiple devices, 
multiple SE 
In different countries : 
Legal, regulation, … 
To consumers, 
civil servants, 
employees, 
citizens 
CHALLENGE 
REACH 
CONVENIENCE 
SECURITY
Thank you ! 
JF Rubon

More Related Content

What's hot

Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices reviewMTKDMI
 
Target NFC HCE 3.0 - digital bank - 2015 Ukraine
Target NFC HCE 3.0 - digital bank - 2015 UkraineTarget NFC HCE 3.0 - digital bank - 2015 Ukraine
Target NFC HCE 3.0 - digital bank - 2015 UkraineSergey Skabelkin
 
Near Field Communications Technology Overview
Near Field Communications Technology OverviewNear Field Communications Technology Overview
Near Field Communications Technology OverviewChris Anderson
 
The Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionThe Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionPaula Hunter
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
An Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsAn Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsEricsson Labs
 
GSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive
 
Internet of Things (IoT) Investment Insights from Patents
Internet of Things (IoT) Investment Insights from PatentsInternet of Things (IoT) Investment Insights from Patents
Internet of Things (IoT) Investment Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the UnbankedVeridium
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc servicesBoni
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital idCapgemini
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2
 

What's hot (19)

Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
 
Company profile
Company profileCompany profile
Company profile
 
Target NFC HCE 3.0 - digital bank - 2015 Ukraine
Target NFC HCE 3.0 - digital bank - 2015 UkraineTarget NFC HCE 3.0 - digital bank - 2015 Ukraine
Target NFC HCE 3.0 - digital bank - 2015 Ukraine
 
Near Field Communications Technology Overview
Near Field Communications Technology OverviewNear Field Communications Technology Overview
Near Field Communications Technology Overview
 
The Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionThe Impact of HCE on NFC Adoption
The Impact of HCE on NFC Adoption
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
 
An Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsAn Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIs
 
GSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch PresentationGSMA OneAPI Gateway Launch Presentation
GSMA OneAPI Gateway Launch Presentation
 
Mobile Innovation Vision 2020
Mobile Innovation Vision 2020Mobile Innovation Vision 2020
Mobile Innovation Vision 2020
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
 
Internet of Things (IoT) Investment Insights from Patents
Internet of Things (IoT) Investment Insights from PatentsInternet of Things (IoT) Investment Insights from Patents
Internet of Things (IoT) Investment Insights from Patents
 
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital id
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 

Similar to Securing Services in a Mobile First World with GSMA Mobile Connect

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)Andrea Colombetti
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc servicesBoni
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suitewatsongallery
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycleTelecomValley
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaThibault Cantegrel
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionPaul Van Doorn
 

Similar to Securing Services in a Mobile First World with GSMA Mobile Connect (20)

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
M commerce
M commerceM commerce
M commerce
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services
 
Mobile Commerce
Mobile CommerceMobile Commerce
Mobile Commerce
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 

Recently uploaded (20)

Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 

Securing Services in a Mobile First World with GSMA Mobile Connect

  • 1. SECURING SERVICES IN A MOBILE FIRST WORLD JF Rubon, Strategy & Innovation 05/11/2014
  • 2. Mobile Corporate Badge AGENDA 1 – GEMALTO : WHO WE ARE 2 – THE SHIFT TO MOBILE 3 – MOBILE CONNECT 2 Mobile Corporate Badge
  • 3. GEMALTO KEY FIGURES OUR COMPANY OUR CLIENTS OUR INNOVATION 450 OPERATORS 10/11/2014 €2.4BN (2013) INVESTED IN R&D €177M (2012) NATIONALITIES 190 12,000 REVENUES MOBILE NETWORK PATENTS & PATENT APPLICATIONS FINANCIAL INSTITUTIONS 3,000+ 4,300 EMPLOYEES 80 eGOVERNMENT PROGRAMS 110 DIGITAL 1,700 ENGINEERS NEW INNOVATIONS FILED IN 2012 3
  • 4. Gemalto as a leader of Authentication 4 10.11.14 GARTNER’S MAGIC QUADRANT ON USER AUTHENTICATION (eBanking / Enterprise) Gemalto AUTHENTICATION SOLUTION 95% of the authentication market covered by these players Safenet
  • 5. +100M people using our Authentication solutions 200CUSTOMERS CORPORATE 5 LinqUs Mobile ID 10.11.14 NATIONAL DEPLOYMENTS OF MobileID MNO +20 Service Providers already connected our platform 500 on going deployments for 2014 +5 MOBILE eBANKING users protected by EZIO SOLUTIONS +90M WW MANY CUSTOMERS FROM FORTUNE 500 employees WW use our eID solutions +7M
  • 6. The shift to mobile Security needs, solutions
  • 7. 2.7 Bn people* frustrated by their digital journey… (source: ICT, number of Internet users in 2013) Username management nightmare Password fatigue and weaknesses Registration fatality Trust and privacy failure They need: Convenient online authentication, secure environment and mobility * Source: Fireclick – NorSIS Institute - Microsoft 7 LinqUs Mobile ID 10.11.14
  • 8. … impacting online service providers activities WEB AND E-MERCHANT SERVICES:  Security breaches, impacting brand image Low conversion / transformation rate BANKS: Customer service costs Clients growing mobility vs inconvenience to access ebanking ENTERPRISES: Securing cloud services access to enhance employees’ mobility Security breaches multiplying GOVERNMENTS: Reduce long time-frame and administrative costs Dematerialization regulation pressure They need: Trusted ecosystem and customer attraction  Revenue and/or  Costs 8 LinqUs Mobile ID 10.11.14
  • 9. Service providers need scalable authentication levels of assurance 9 LinqUs Mobile ID 10.11.14
  • 10. THE BIG SHIFT TO MOBILE 50 BN 1.36BN 10 Gemalto Mobile 10.11.14 SMARTPHONE SALES SOURCES: GEMALTO, GATNER, INFORMA, PUBLIC SUBSCRIBER DATA 58.5BN (2012) CONNECTED DEVICES BY 2020 LTE SUBSCRIPTIONS BY 2018 203BN (2020) OTT MESSAGES NFC- ENABLED SMARTPHONES USERS COVERED BY TSMs 1 BN (2013) ~25% 300 M (2010) 1.5BN
  • 11. Existing hardware solutions for the PC world Smart Cards  May include user picture  Company logo  Physical access (badge) 11 LinqUs Mobile ID 10.11.14 Tokens  long battery lifetime Optional USB interface Company logo Can they still be used in the mobile world ?
  • 12. Shift to mobile : 2 possible axis Keep a separate token Alongside the mobile devices 12 Mobile Corporate Badge Use Mobile Device Hardware capabilities & Transfer the secure application & credentials into the device Use Built-in NFC capability Use an attached reader Sleeve USB readers Use a detached reader Bluetooth Bluetooth Smart (BLE) UICC μSD eSE TEE
  • 13. MOBILE COMPATIBILITY 13 Mobile Corporate Badge Secure Element Family Badge & NFC / BLE Connectivity Needed Large compatibility UICC Through MNOs Large compatibility microSD Slot Needed Fair compatibility Attached Reader Low user convenience Devices with external port eSE Fragmented market Soldered to the device TEE Selected devices only Major mobile makers
  • 14. Compatibility with devices Without a reader Detached readers Attached readers 14 Dual Interface Card Bluetooth reader Standard or proprietary port ( only)
  • 15. UICC The most universal secure element Highly secure & certified Fully standardized Each Service Provider has dedicated secure ‘space’ on SIM Remotely manageable Service platform (Java Card™) Existing deployment processes Issued by the MNOs SHIPMENTS OF SIM CARDS IN 2013 4.2BN 15 Gemalto Mobile 10.11.14 Memory MNO BANK 1 BANK 2 SP Global Platform compliant OS Certified Secured Hardware & Software
  • 16. EMBEDDED SECURE ELEMENT A second highly secure chip in the handset Inherits security from the UICC Easy to integrate into any device in multiple form factors Remotely manageable Enabling innovative secure use cases Also suitable for new consumer devices (wearables, tablets, consoles) 16 Gemalto Mobile 10.11.14
  • 17. TRUSTED EXECUTION ENVIRONMENT Relies on hardware processor features Remotely manageable Secure interaction between user, services & peripherals (screen, touch..) Secure storage of code & data Integrated into the main processor 17 Gemalto Mobile 10.11.14 Application Processor LOGO COLOR VERSIONS OPERATING SYSTEM (e.g Android) TEE OS LOGO LOGO IN BLACK TRUSTZONE™ SYSTEM-ON-CHIP LOGO ON BLACK
  • 18. GSMA Mobile Connect Mobile Operators as identity providers
  • 19. GSMA Mobile Connect “Develop an innovative new service that will allow consumers to securely access a wide range of digital services using their mobile phone number for authentication.” Source: GSMA Mobile Connect press release – 24/02/2014 19 LinqUs Mobile ID 10.11.14 $5B revenue per year when mobile ID market is mature Source: Greenwich Consulting for GSMA
  • 20. The goal is to fulfill service providers’ ID management needs… MOBILE OPERATORS to provide all service providers with a common identity solution leveraging convenient, strong SIM-based Mobile Connect service Light Authentication Medium to Strong Authentication 20 LinqUs Mobile ID 10.11.14 Strong Authentication Medium to Strong Authentication Improving end-user journey for more transactions Adding customer channels without security breach Reducing administration costs and time-frame Leveraging cloud services and making their workforce mobile
  • 21. …bringing a diversity of services Entry-level ID, similar to Facebook Connect, low level of security Use mobile as second factor overlay 21 LinqUs Mobile ID 10.11.14 Use mobile as a replacement for legally binding ‘wet’ signature MNO becomes ID custodian: certifies users’ details to SPs FEDERATED IDENTITY 2ND FACTOR AUTHENTICATION MOBILE DIGITAL SIGNATURE IDENTITY BROKERAGE Single Sign On Solutions OTP, PKI, NFC, biometrics… solutions Mobile PKI Solutions IdM Solutions Web access granted!
  • 22. Trusted Service Manager (TSM) solution to support a complex ecosystem Service Providers Mobile Operators MNO-TSM To give access to the MNO subscribers base while ensuring quality of access © 2014 Gemalto SP-TSM To securely deploy & manage SP applications on any wireless network MNO 1 MNO 2 MNO 3 22 SP-TSM MNO-TSM
  • 23. Providing the simplest user experience 23 LinqUs Mobile ID 10.11.14
  • 24. 3 key deployment challenges SECURITY No “one fits all” solution 24 LinqUs Mobile ID 10.11.14 Secure access Secured communication Corporate data protection Fraud Management CONVENIENCE No convenience, no adoption Enrolment and usage Need to stick to smartphone user experience REACH Address fragmented technical platforms: multiple devices, multiple SE In different countries : Legal, regulation, … To consumers, civil servants, employees, citizens CHALLENGE REACH CONVENIENCE SECURITY
  • 25. Thank you ! JF Rubon

Editor's Notes

  1. We can split the offer in 2 distinct categories: 1- Some customers which already have a corporate badge wants to reuse it on mobility use case - The first option is to directly use the NFC corporate badge on a NFC mobile device - The second possibility is to use a sleeve or a USB reader to connect the smartcard to the mobile - The last option is to use a detached reader (standard Bluetooth or Bluetooth Smart (low energy / BLE)) 2- Some customers wants the same level of security without the need to carry the badge. For this purpose we are able to deploy the same applet use on our corporate badge in others secure elements: - eSE (Embedded secure element) - UICC - uSD - TEE (Roadmap)
  2. This slide represents all the possible hardware secure elements where the solution can run: - badges: readerless / attached reader / detached reader (Compatible with NFC use cases) - eSE (Embedded secure element): it’s a SE managed by the device manufacturer (Compatible with NFC use cases) - UICC: SE managed by the MNO (Compatible with NFC use cases) - uSD: SE managed by the enterprise - TEE (Roadmap): SE managed by the TEE provider. This SE is not heavily deployed yet.
  3. On smartphone, the NFC option is definitely the best one. Please take note that the user experience of a NFC badge on a tablet is not so great. On the reader side: detached readers are more appealing today compared to attached reader. Gemalto is only doing buy & resell on connected readers The detached reader strategy is not comparable: a standard Bluetooth reader has been added to the catalogue (from Feitan) to propose a product but 3 new products will be directly produced by Gemalto: - A Bluetooth Smart Badge Holder / reader - A Bluetooth Smart reader with integrated PIN pad (the PIN don’t have to transit over the Bluetooth connection) - A Bluetooth Smart Token