20012WWRF-SIG2-Noll-Calvet

Download Report

Transcript 20012WWRF-SIG2-Noll-Calvet

SIM-card enabled Seamless Access
in Mobile and Broadband Access
Networks
Josef Noll1,2, Juan Carlos Lopez Calvet2,
1UniK, N-2027 Kjeller
2Telenor R&D, , N-1331 Fornebu
[email protected], [email protected]
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
1
Agenda

Upcoming digital world – need for seamless authentication
– To networks
– To personalised services

The role of the mobile

Mobile phone as authentication to networks and services

Access based on roles – ”Federation of Identity”

Status and Focus

Conclusions
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
2
Need for an identifier
Virtual world: email,
web
Real world: see
and/or talk




Voice
Face

Username, password
SIM
PKI
Service world
(between
providers)



Josef Noll, 9.12.2005
WWRF#15, Seamless Access
3
Identity management
Service level
agreement (SLA)
Trust relation
Mobile is a better PC
Internet
usage
Mobile Advantages
+
+
+
+
–
–
Always online
Potential for seamless
personalisation
“In-build” eCommerce
Read when you have a quiet
moment
Small screen
Email attachments
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
How to
 Filter/adapt/personalise
content?
 Create Mobile specific
content?
 Support lifestyle?
4
My communication portal
People
communicate
Services
People
People
Josef Noll, 9.12.2005
Enable simple communications
 to people (voice, SMS, MMS, email, …)
 to services (seamless authentication, …)
WWRF#15, Seamless Access
5
My security infrastructure
Examples:
Security Requirement
RFID,
SIM & PKI
*
&
Have
to know
Need
to know
mHandel,
VPN
Intranet, email,
Admittance
*
&
Nice to know
Josef Noll, 9.12.2005
Network access
WWRF#15, Seamless Access
6
*&
RFID &
SIM
passwd
RFID
(& SIM)
*Patent pending
The only thing you need:
Your Mobile Phone
SIM with
RFID & PKI
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
7
Seamless Access to Networks and
Services

Seamless authentication from mobile phone
– SIM card identification in GSM/UMTS network
– Bluetooth to PC (EAP-SIM) in WLAN networks

Near field communication (NFC) for dedicated authentication
– Access to buildings
– Access to PC, TV and other inventory
(using the phone is better than fingerprint)
• Supports roles
• Provides privacy
• Updates through SMS
– Access to other inventory

Service access
– Gateway/Identity information to service provider
– VPN based on authentication
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
8
Keep customers:
Postulation:
Enable the Open Access Network
Beyond 3G (or 4G) is the integration of access, and higher bandwidths access
speed
Open access network
WLAN
GSM/GPRS
+
UMTS
Subscribers’
fixed lines
fixed
Millions
of fixed
lines function
Motorola
EAP-SIM
demo: as
feeder Mobil-2-PC-WLAN
lines for open pico-base
stations
OBAN WS, 6.6.2005
Personalised and broadband services
Supported by seamless authentication
based on the Mobile Phone
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
9
Seamless
authentication
Service
access
Josef Noll, 9.12.2005
Physical
access
WWRF#15, Seamless Access
VPN
10
Home access,
.mp3, .jpg
Seamless service access –
Operator as Identity provider
Service A
Seamless service
access
Seamless
authentication
Service B
WAP gateway/
Traffic analyser
Service C
Billing system
WWRF#15, Seamless Access
11
Federated
identity: Customers
ID not distributed
Josef Noll, 9.12.2005
Near field communication (NFC)





Based on RFID technology at 13.56
MHz
Typical operating distance 10 cm
Compatible with RFID
Data rate today up to 424 kbit/s
Philips and Sony
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
12


ECMA-340, ISO/IEC 18092 &
ECMA-352, …standards
Powered and non-self powered
devices
NFC Applications
 Touch
and Go
Access control, transport/event ticketing
 Touch
and Confirm
Mobile payment with or without PIN
 Touch
and Connect
Linking two NFC-enabled devices,
exchange of PIM information
 Touch
and Explore
Capabilities of NFC devices,
functionalities and services
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
13
NFC changes the role of the mobile
operator

The mobile operator is the communication provider
– Everybody has a mobile phone
– People know that they can reach me – and not my parents
– Companies have identified the value of personal phones and change their
infrastructure
– The phone carries all my contacts
– Connected 24/7 (all the time, not just 4 h a day)

From access to communication
– Provide communication: voice, SMS, MMS, IM,
email,….
– Seamless login (wap.telenormobil.no) – my
email, last 10 visited
 Provide presence and community services
 Provide authentication and security
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
14
ECMA: NFC work items & future plans
Work items
ECMA-356: RF interface tests for ECMA-340 devices
 ECMA-362: Protocol Test Methods

Future working items

A mapping of NFC to other communication protocols including
the Internet Protocol (IP), GSM and Bluetooth
– Advanced Logical Link Control with addressing and segmentation support
Support for Data Link and end-to-end security and key
management
Our focus
 Air-to-wired interface specification
 Application extensions in NFCIP-1

– Power control as an example application extension
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
15
RFID payment usage
coffee machines in Telenor R&D

Payment on coffee machine




Josef Noll, 9.12.2005
WWRF#15, Seamless Access

RFID card in 2005

Tests in OSL and
Arlanda

RFID cards

Think
Planned Q1.2006, Univ. Tromsø (N)
Payment
Entrance
Electronic access (VPN) - Telenor
16
Conclusions
“The last time we were
connected by a wire was at
birth!” [Motorola]
 No cable, that’s the
challenge

– Various radio systems: GSM,
UMTS; WLAN, Bluetooth,
DVB, …
– Limitations: battery,
integration
All services from your
mobile
 Your mobile is the
authentication centre
 Telecom as authentication
provider

Josef Noll, 9.12.2005
WWRF#15, Seamless Access
17