SlideShare a Scribd company logo
1 of 9
Download to read offline
Mobile Web Security Bootstrap
A labs.ericsson.com enabler
http://labs.ericsson.com/apis/mobile-web-security-bootstrap/
Mobile Web Security Bootstrap
 The SIM is commonly used for getting cellular access,
 mobile connectivity and access to some mobile services

 The SIM proven security features can also be used for
 securing any mobile web applications

 This enabler provides an API for establishing a secret key
 between mobile web clients and web applications




                                                              2
Why?

 Security – As secure as SIM

 Standard – Based on industry standard

 Acceptance – Many standardized applications

 Convenience – Transparent to users

 Extensibility – Any applications can exploit the SIM




                                                        3
Main Features
 Based on 3GPP industry standard
 Generic Bootstrapping Architecture

 Client and server Web/Java APIs available and
 documented with examples

 HTTP interfaces

 Soft client available to allow focusing on the
 development of the network side of the web
 application




                                                  4
Overview
                                                               Mobile Web
                                                                  Network
                                                             Application Server
                                                                  Network
                                                                Application
 Ub interface – Mobile client uses
                                                                Application
 API to bootstrap a master secret
 key
                                                   Ua                             Zn
 Ua interface –Mobile Web Client
 uses API to derive application-                         *              HTTP
 specific master key

 Zn interface – Mobile Web                   Mobile
                                            Web Client                        Bootstrap
 Application Server uses API to
 obtain the corresponding                                       Ub             Server
 application-specific master key             Bootstrap
                                              Client           HTTP
 At the end of the API usage
                                                                                  Subscriber
 transactions the client and server
 share an application-specific secret-                                            Database
 key
                                         Mobile Web Client                    MWSB
                                                                           Mobile Web
                                                                         Security Bootstrap

                                                                                          5
Java Client API
 Soft Client API provided for focusing on server application

 Example showing how to establish a shared key

// Create soft client with user identity and permanent key
GbaClient softclient = new GbaClient(myID, myKey);

// Bootstrap client with master key. btid is the handler.
String btid = softclient.bootstrap();

// Derive application-specific key to be shared with app server
byte[] appKey = softclient.getKsNaf(app_Fqdn);

// Use the app key for HTTP Digest Authentication
boolean authResult = runUaHttpDigest(app_URL, btid, appKey);


                                                                  6
Java Server API
 API towards mobile client and API towards MWSB
 Servlet example showing how to establish a shared key
// Applicatin Servlet doGet()

// Create application context with Labs authorization API key
GbaNaf app = new GbaNaf(myFqdn, myApiKey)

// Parse GET authorization headers & fetch btid (key Handler)
Authorization authz = Authorization.parse(authorizationHeader);
String btid = authz.getUsername();

// Derive the application-specific key to be shared with client
appKey = app.getKsNaf(btid);

// Use the shared key to authenticate the mobile client
Digest.verify(authorization, appKey)

                                                                  7
Possible applications

                   Identity Management

 Authentication                          Single Sign On



       Integrity                         Confidentiality

                    Key Management


                                                           8
9

More Related Content

More from Tor Björn Minde

More from Tor Björn Minde (18)

Network Probe On Labs
Network Probe On LabsNetwork Probe On Labs
Network Probe On Labs
 
Mobile Sensor Actuator Gateway On Labs
Mobile Sensor Actuator Gateway On LabsMobile Sensor Actuator Gateway On Labs
Mobile Sensor Actuator Gateway On Labs
 
Ericsson Labs 100322
Ericsson Labs 100322Ericsson Labs 100322
Ericsson Labs 100322
 
Converting Media On Labs
Converting Media On LabsConverting Media On Labs
Converting Media On Labs
 
Event Source On Labs
Event Source On LabsEvent Source On Labs
Event Source On Labs
 
Mobile Identification On Labs
Mobile Identification On LabsMobile Identification On Labs
Mobile Identification On Labs
 
Face Detector On Labs
Face Detector On LabsFace Detector On Labs
Face Detector On Labs
 
Web Connectivity On Labs
Web Connectivity On LabsWeb Connectivity On Labs
Web Connectivity On Labs
 
3D Landscape on Labs
3D Landscape on Labs3D Landscape on Labs
3D Landscape on Labs
 
Mobile Location On Labs
Mobile Location On LabsMobile Location On Labs
Mobile Location On Labs
 
Streaming Media On Labs
Streaming Media On LabsStreaming Media On Labs
Streaming Media On Labs
 
Ericsson Labs OTA09 090925
Ericsson Labs OTA09 090925Ericsson Labs OTA09 090925
Ericsson Labs OTA09 090925
 
Web Location On Labs
Web Location On LabsWeb Location On Labs
Web Location On Labs
 
Ericsson Labs 090702
Ericsson Labs 090702Ericsson Labs 090702
Ericsson Labs 090702
 
Mobile Maps On Labs
Mobile Maps On LabsMobile Maps On Labs
Mobile Maps On Labs
 
SMS On Labs
SMS On LabsSMS On Labs
SMS On Labs
 
Mobile Java Push On Labs
Mobile Java Push On LabsMobile Java Push On Labs
Mobile Java Push On Labs
 
IMS framework On Labs
IMS framework On LabsIMS framework On Labs
IMS framework On Labs
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Mobile Web Security Bootstrap On Labs

  • 1. Mobile Web Security Bootstrap A labs.ericsson.com enabler http://labs.ericsson.com/apis/mobile-web-security-bootstrap/
  • 2. Mobile Web Security Bootstrap The SIM is commonly used for getting cellular access, mobile connectivity and access to some mobile services The SIM proven security features can also be used for securing any mobile web applications This enabler provides an API for establishing a secret key between mobile web clients and web applications 2
  • 3. Why? Security – As secure as SIM Standard – Based on industry standard Acceptance – Many standardized applications Convenience – Transparent to users Extensibility – Any applications can exploit the SIM 3
  • 4. Main Features Based on 3GPP industry standard Generic Bootstrapping Architecture Client and server Web/Java APIs available and documented with examples HTTP interfaces Soft client available to allow focusing on the development of the network side of the web application 4
  • 5. Overview Mobile Web Network Application Server Network Application Ub interface – Mobile client uses Application API to bootstrap a master secret key Ua Zn Ua interface –Mobile Web Client uses API to derive application- * HTTP specific master key Zn interface – Mobile Web Mobile Web Client Bootstrap Application Server uses API to obtain the corresponding Ub Server application-specific master key Bootstrap Client HTTP At the end of the API usage Subscriber transactions the client and server share an application-specific secret- Database key Mobile Web Client MWSB Mobile Web Security Bootstrap 5
  • 6. Java Client API Soft Client API provided for focusing on server application Example showing how to establish a shared key // Create soft client with user identity and permanent key GbaClient softclient = new GbaClient(myID, myKey); // Bootstrap client with master key. btid is the handler. String btid = softclient.bootstrap(); // Derive application-specific key to be shared with app server byte[] appKey = softclient.getKsNaf(app_Fqdn); // Use the app key for HTTP Digest Authentication boolean authResult = runUaHttpDigest(app_URL, btid, appKey); 6
  • 7. Java Server API API towards mobile client and API towards MWSB Servlet example showing how to establish a shared key // Applicatin Servlet doGet() // Create application context with Labs authorization API key GbaNaf app = new GbaNaf(myFqdn, myApiKey) // Parse GET authorization headers & fetch btid (key Handler) Authorization authz = Authorization.parse(authorizationHeader); String btid = authz.getUsername(); // Derive the application-specific key to be shared with client appKey = app.getKsNaf(btid); // Use the shared key to authenticate the mobile client Digest.verify(authorization, appKey) 7
  • 8. Possible applications Identity Management Authentication Single Sign On Integrity Confidentiality Key Management 8
  • 9. 9