170 likes | 326 Views
SIM-card enabled Seamless Access in Mobile and Broadband Access Networks. Josef Noll 1,2 , Juan Carlos Lopez Calvet 2 , 1 UniK, N-2027 Kjeller 2 Telenor R&D, , N-1331 Fornebu josef@unik.no, juan.calvet@telenor.com. Agenda. Upcoming digital world – need for seamless authentication To networks
E N D
SIM-card enabled Seamless Access in Mobile and Broadband Access Networks Josef Noll1,2, Juan Carlos Lopez Calvet2, 1UniK, N-2027 Kjeller2Telenor R&D, , N-1331 Fornebujosef@unik.no, juan.calvet@telenor.com WWRF#15, Seamless Access
Agenda • Upcoming digital world – need for seamless authentication • To networks • To personalised services • The role of the mobile • Mobile phone as authentication to networks and services • Access based on roles – ”Federation of Identity” • Status and Focus • Conclusions WWRF#15, Seamless Access
Real world: see and/or talk Voice Face Virtual world: email, web Username, password SIM PKI Service world (between providers) Identity management Service level agreement (SLA) Trust relation Need for an identifier WWRF#15, Seamless Access
Mobile Advantages Always online Potential for seamless personalisation “In-build” eCommerce Read when you have a quiet moment Small screen Email attachments Mobile is a better PC Internet usage How to • Filter/adapt/personalise content? • Create Mobile specific content? • Support lifestyle? WWRF#15, Seamless Access
Enable simple communications to people (voice, SMS, MMS, email, …) to services (seamless authentication, …) People communicate Services People People My communication portal WWRF#15, Seamless Access
* RFID, SIM & PKI Examples: & mHandel,VPN Haveto know Security Requirement * Needto know RFID & SIM passwd Intranet, email,Admittance & * & RFID (& SIM) Network access Nice to know My security infrastructure *Patent pending WWRF#15, Seamless Access
The only thing you need: Your Mobile Phone SIM with RFID & PKI WWRF#15, Seamless Access
Seamless Access to Networks and Services • Seamless authentication from mobile phone • SIM card identification in GSM/UMTS network • Bluetooth to PC (EAP-SIM) in WLAN networks • Near field communication (NFC) for dedicated authentication • Access to buildings • Access to PC, TV and other inventory (using the phone is better than fingerprint) • Supports roles • Provides privacy • Updates through SMS • Access to other inventory • Service access • Gateway/Identity information to service provider • VPN based on authentication WWRF#15, Seamless Access
WLAN UMTS fixed Motorola EAP-SIM demo: Mobil-2-PC-WLANOBAN WS, 6.6.2005 Personalised and broadband services Supported by seamless authentication based on the Mobile Phone Keep customers:Enable the Open Access Network Postulation:Beyond 3G (or 4G) is the integration of access, and higher bandwidths access speed Open access network GSM/GPRS + Subscribers’fixed lines Millions of fixed lines function asfeeder lines for open pico-base stations WWRF#15, Seamless Access
Seamless authentication Service access Home access, .mp3, .jpg Physical access VPN WWRF#15, Seamless Access
Service A Seamless service access – Operator as Identity provider Seamless service access Seamless authentication Service B + Fed. User-A + Fed. User-B + Term. Info + Fed. User-C Service C WAP gateway/Traffic analyser Fed. UserID Billing records Billing system Federated identity: Customers ID not distributed WWRF#15, Seamless Access
Based on RFID technology at 13.56 MHz Typical operating distance 10 cm Compatible with RFID Data rate today up to 424 kbit/s Philips and Sony Near field communication (NFC) • ECMA-340, ISO/IEC 18092 & ECMA-352, …standards • Powered and non-self powered devices WWRF#15, Seamless Access
NFC Applications • Touch and GoAccess control, transport/event ticketing • Touch and ConfirmMobile payment with or without PIN • Touch and ConnectLinking two NFC-enabled devices, exchange of PIM information • Touch and ExploreCapabilities of NFC devices, functionalities and services WWRF#15, Seamless Access
NFC changes the role of the mobile operator • The mobile operator is the communication provider • Everybody has a mobile phone • People know that they can reach me – and not my parents • Companies have identified the value of personal phones and change their infrastructure • The phone carries all my contacts • Connected 24/7 (all the time, not just 4 h a day) • From access to communication • Provide communication: voice, SMS, MMS, IM, email,…. • Seamless login (wap.telenormobil.no) – my email, last 10 visited • Provide presence and community services • Provide authentication and security WWRF#15, Seamless Access
Our focus ECMA: NFC work items & future plans Work items • ECMA-356: RF interface tests for ECMA-340 devices • ECMA-362: Protocol Test Methods Future working items • A mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth • Advanced Logical Link Control with addressing and segmentation support • Support for Data Link and end-to-end security and key management • Air-to-wired interface specification • Application extensions in NFCIP-1 • Power control as an example application extension WWRF#15, Seamless Access
Payment on coffee machine RFID card in 2005 Tests in OSL and Arlanda RFID cards Think RFID payment usage coffee machines in Telenor R&D • Planned Q1.2006, Univ. Tromsø (N) • Payment • Entrance • Electronic access (VPN) - Telenor WWRF#15, Seamless Access
Conclusions • “The last time we were connected by a wire was at birth!” [Motorola] • No cable, that’s the challenge • Various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, … • Limitations: battery, integration • All services from your mobile • Your mobile is the authentication centre • Telecom as authentication provider WWRF#15, Seamless Access