sim-card enabled seamless access in mobile and broadband access networks
Post on 18-Jan-2016
33 Views
Preview:
DESCRIPTION
TRANSCRIPT
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 1
SIM-card enabled Seamless Access in Mobile and Broadband Access Networks
Josef Noll1,2, Juan Carlos Lopez Calvet2, 1UniK, N-2027 Kjeller2Telenor R&D, , N-1331 Fornebujosef@unik.no, juan.calvet@telenor.com
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 2
Agenda Upcoming digital world – need for seamless authentication
– To networks
– To personalised services
The role of the mobile
Mobile phone as authentication to networks and services
Access based on roles – ”Federation of Identity”
Status and Focus
Conclusions
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 3
Need for an identifier
Real world: see and/or talk
Voice Face
Virtual world: email, web
Username, password SIM PKI
Service world (between providers)
Identity management Service level
agreement (SLA) Trust relation
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 4
Mobile is a better PC
Mobile Advantages+ Always online+ Potential for seamless
personalisation+ “In-build” eCommerce+ Read when you have a quiet
moment– Small screen– Email attachments
How to Filter/adapt/personalise
content? Create Mobile specific
content? Support lifestyle?
Internet usage
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 5
My communication portal
Enable simple communications to people (voice, SMS, MMS, email, …)
to services (seamless authentication, …)
Servicescommunicate
People
People
People
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 6
My security infrastructure S
ecur
ity R
equi
rem
ent
Nice to know
Needto know
Haveto know
Examples:
mHandel,VPN
Intranet, email,Admittance
Network access
*Patent pending
&* RFID (& SIM)
&
* RFID & SIM passwd
*
&
RFID, SIM & PKI
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 7
The only thing you need: Your Mobile Phone
SIM with RFID & PKI
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 8
Seamless Access to Networks and Services Seamless authentication from mobile phone
– SIM card identification in GSM/UMTS network
– Bluetooth to PC (EAP-SIM) in WLAN networks
Near field communication (NFC) for dedicated authentication– Access to buildings
– Access to PC, TV and other inventory (using the phone is better than fingerprint)
• Supports roles• Provides privacy• Updates through SMS
– Access to other inventory
Service access– Gateway/Identity information to service provider
– VPN based on authentication
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 9
Keep customers:Enable the Open Access Network
Millions of fixed lines function as
feeder lines for open pico-base stations
fixed
Subscribers’fixed lines
UMTS
GSM/GPRS
Open access network
+
Supported by seamless authentication based on the Mobile Phone
Personalised and broadband services
Motorola EAP-SIM demo: Mobil-2-PC-WLAN
OBAN WS, 6.6.2005
WLAN
Postulation:Beyond 3G (or 4G) is the integration of access, and higher bandwidths access
speed
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 10
Service access
Seamless authentication
Physical access
VPNHome access,
.mp3, .jpg
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 11
Seamless service access – Operator as Identity provider
Seamless service access
Seamless authentication
WAP gateway/Traffic analyser
Billing system
Service A
+ Fed. User-B + Term. Info
Billing records
Federated identity: Customers ID not distributed
Service B
Service C
+ Fed. Use
r-A
+ Fed. User-C
Fed. UserID
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 12
Near field communication (NFC) Based on RFID technology at 13.56
MHz Typical operating distance 10 cm Compatible with RFID Data rate today up to 424 kbit/s Philips and Sony
ECMA-340, ISO/IEC 18092 & ECMA-352, …standards
Powered and non-self powered devices
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 13
NFC Applications
Touch and GoAccess control, transport/event ticketing
Touch and ConfirmMobile payment with or without PIN
Touch and ConnectLinking two NFC-enabled devices, exchange of PIM information
Touch and ExploreCapabilities of NFC devices, functionalities and services
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 14
NFC changes the role of the mobile operator The mobile operator is the communication provider
– Everybody has a mobile phone
– People know that they can reach me – and not my parents
– Companies have identified the value of personal phones and change their infrastructure
– The phone carries all my contacts
– Connected 24/7 (all the time, not just 4 h a day)
From access to communication– Provide communication: voice, SMS, MMS, IM,
email,….
– Seamless login (wap.telenormobil.no) – my email, last 10 visited
Provide presence and community services Provide authentication and security
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 15
ECMA: NFC work items & future plans
Work items ECMA-356: RF interface tests for ECMA-340 devices ECMA-362: Protocol Test Methods
Future working items A mapping of NFC to other communication protocols including
the Internet Protocol (IP), GSM and Bluetooth– Advanced Logical Link Control with addressing and segmentation support
Support for Data Link and end-to-end security and key management
Air-to-wired interface specification Application extensions in NFCIP-1
– Power control as an example application extension
Our focus
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 16
RFID payment usage coffee machines in Telenor R&D
Payment on coffee machine
RFID card in 2005
Tests in OSL and Arlanda
RFID cards
Think
Planned Q1.2006, Univ. Tromsø (N) Payment Entrance Electronic access (VPN) - Telenor
Josef Noll, 9.12.2005 WWRF#15, Seamless Access 17
Conclusions “The last time we were
connected by a wire was at birth!” [Motorola]
No cable, that’s the challenge
– Various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, …
– Limitations: battery, integration
All services from your mobile
Your mobile is the authentication centre
Telecom as authentication provider
top related