20012WWRF-SIG2-Noll-Calvet
Download
Report
Transcript 20012WWRF-SIG2-Noll-Calvet
SIM-card enabled Seamless Access
in Mobile and Broadband Access
Networks
Josef Noll1,2, Juan Carlos Lopez Calvet2,
1UniK, N-2027 Kjeller
2Telenor R&D, , N-1331 Fornebu
[email protected], [email protected]
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
1
Agenda
Upcoming digital world – need for seamless authentication
– To networks
– To personalised services
The role of the mobile
Mobile phone as authentication to networks and services
Access based on roles – ”Federation of Identity”
Status and Focus
Conclusions
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
2
Need for an identifier
Virtual world: email,
web
Real world: see
and/or talk
Voice
Face
Username, password
SIM
PKI
Service world
(between
providers)
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
3
Identity management
Service level
agreement (SLA)
Trust relation
Mobile is a better PC
Internet
usage
Mobile Advantages
+
+
+
+
–
–
Always online
Potential for seamless
personalisation
“In-build” eCommerce
Read when you have a quiet
moment
Small screen
Email attachments
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
How to
Filter/adapt/personalise
content?
Create Mobile specific
content?
Support lifestyle?
4
My communication portal
People
communicate
Services
People
People
Josef Noll, 9.12.2005
Enable simple communications
to people (voice, SMS, MMS, email, …)
to services (seamless authentication, …)
WWRF#15, Seamless Access
5
My security infrastructure
Examples:
Security Requirement
RFID,
SIM & PKI
*
&
Have
to know
Need
to know
mHandel,
VPN
Intranet, email,
Admittance
*
&
Nice to know
Josef Noll, 9.12.2005
Network access
WWRF#15, Seamless Access
6
*&
RFID &
SIM
passwd
RFID
(& SIM)
*Patent pending
The only thing you need:
Your Mobile Phone
SIM with
RFID & PKI
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
7
Seamless Access to Networks and
Services
Seamless authentication from mobile phone
– SIM card identification in GSM/UMTS network
– Bluetooth to PC (EAP-SIM) in WLAN networks
Near field communication (NFC) for dedicated authentication
– Access to buildings
– Access to PC, TV and other inventory
(using the phone is better than fingerprint)
• Supports roles
• Provides privacy
• Updates through SMS
– Access to other inventory
Service access
– Gateway/Identity information to service provider
– VPN based on authentication
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
8
Keep customers:
Postulation:
Enable the Open Access Network
Beyond 3G (or 4G) is the integration of access, and higher bandwidths access
speed
Open access network
WLAN
GSM/GPRS
+
UMTS
Subscribers’
fixed lines
fixed
Millions
of fixed
lines function
Motorola
EAP-SIM
demo: as
feeder Mobil-2-PC-WLAN
lines for open pico-base
stations
OBAN WS, 6.6.2005
Personalised and broadband services
Supported by seamless authentication
based on the Mobile Phone
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
9
Seamless
authentication
Service
access
Josef Noll, 9.12.2005
Physical
access
WWRF#15, Seamless Access
VPN
10
Home access,
.mp3, .jpg
Seamless service access –
Operator as Identity provider
Service A
Seamless service
access
Seamless
authentication
Service B
WAP gateway/
Traffic analyser
Service C
Billing system
WWRF#15, Seamless Access
11
Federated
identity: Customers
ID not distributed
Josef Noll, 9.12.2005
Near field communication (NFC)
Based on RFID technology at 13.56
MHz
Typical operating distance 10 cm
Compatible with RFID
Data rate today up to 424 kbit/s
Philips and Sony
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
12
ECMA-340, ISO/IEC 18092 &
ECMA-352, …standards
Powered and non-self powered
devices
NFC Applications
Touch
and Go
Access control, transport/event ticketing
Touch
and Confirm
Mobile payment with or without PIN
Touch
and Connect
Linking two NFC-enabled devices,
exchange of PIM information
Touch
and Explore
Capabilities of NFC devices,
functionalities and services
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
13
NFC changes the role of the mobile
operator
The mobile operator is the communication provider
– Everybody has a mobile phone
– People know that they can reach me – and not my parents
– Companies have identified the value of personal phones and change their
infrastructure
– The phone carries all my contacts
– Connected 24/7 (all the time, not just 4 h a day)
From access to communication
– Provide communication: voice, SMS, MMS, IM,
email,….
– Seamless login (wap.telenormobil.no) – my
email, last 10 visited
Provide presence and community services
Provide authentication and security
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
14
ECMA: NFC work items & future plans
Work items
ECMA-356: RF interface tests for ECMA-340 devices
ECMA-362: Protocol Test Methods
Future working items
A mapping of NFC to other communication protocols including
the Internet Protocol (IP), GSM and Bluetooth
– Advanced Logical Link Control with addressing and segmentation support
Support for Data Link and end-to-end security and key
management
Our focus
Air-to-wired interface specification
Application extensions in NFCIP-1
– Power control as an example application extension
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
15
RFID payment usage
coffee machines in Telenor R&D
Payment on coffee machine
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
RFID card in 2005
Tests in OSL and
Arlanda
RFID cards
Think
Planned Q1.2006, Univ. Tromsø (N)
Payment
Entrance
Electronic access (VPN) - Telenor
16
Conclusions
“The last time we were
connected by a wire was at
birth!” [Motorola]
No cable, that’s the
challenge
– Various radio systems: GSM,
UMTS; WLAN, Bluetooth,
DVB, …
– Limitations: battery,
integration
All services from your
mobile
Your mobile is the
authentication centre
Telecom as authentication
provider
Josef Noll, 9.12.2005
WWRF#15, Seamless Access
17