Innovative Authentication method for boosting Mobile Connect global roll-out

Similar documents
Mobile Identity as key enabler for the Digital Consumer

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A NEW MODEL FOR AUTHENTICATION

New Paradigms of Digital Identity:

More than just being signed-in or signed-out. Parul Jain, Architect,

Authentication Technology for a Smart eid Infrastructure.

Kickstart. Overview. Oct 2017

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Safelayer's Adaptive Authentication: Increased security through context information

Single Sign-On. Introduction

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

Dissecting NIST Digital Identity Guidelines

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories

USE CASES. See how Polygon s Biometrid can be used in different usage settings

Singapore s National Digital Identity (NDI):

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Ouachita Baptist University. Identity Theft Policy and Program

How. Biometrics. Expand the Reach of Mobile Banking ENTER

Sales Presentation Case 2018 Dell EMC

Identity Theft Prevention Program. Effective beginning August 1, 2009

Five Reasons It s Time For Secure Single Sign-On

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Authentication (Strong Customer Authentication)

What is NPP, Osko and PayID?

Keep the Door Open for Users and Closed to Hackers

How Next Generation Trusted Identities Can Help Transform Your Business

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Business Online Banking & Bill Pay Guide to Getting Started

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.

Do I Really Need Another Account? External Identities for Campus Applications

Digitized Engineering Notebook

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP

Crash course in Azure Active Directory

Prof. Christos Xenakis

Product Brief. Circles of Trust.

Prof. Christos Xenakis

ETSY.COM - PRIVACY POLICY

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

DigitalPersona Altus. Solution Guide

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Samsung In-App Purchase v3.0 Development Preparations

Authentication and Fraud Detection Buyer s Guide

Cirius Secure Messaging Single Sign-On

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)

Next Generation Authentication

User-friendly mobile and web experience tools in Liferay DXP. Filipe Afonso Senior Consultant, Liferay

Overview of PBI-blockchain cooperation technology

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Use Cases for Argonaut Project -- DRAFT Page

Názov prezentácie. Logo partnera

Spree Privacy Policy

Access Management Handbook

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Put Identity at the Heart of Security

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Acceptable Use Policy

GTL E-App. User Guide. Available on any device!

Earthlink and Google Final Contract Chart. Recommended Privacy and 1st Amendment Protections. Earthlink (monthly charge) Google (no fee)

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Identity Management. Rolf Blom Ericsson Research

Elders Estates Privacy Notice

Accelerating growth and digital adoption with seamless identity trust

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Mobile Security / Mobile Payments

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Monitise. RSA Adaptive Authentication On-Premise Implementation Guide. Partner Information. Monitise Mobile Banking Solution

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Paystar Remittance Suite Tokenless Two-Factor Authentication

EMERGING TRENDS AROUND AUTHENTICATION

WHERE DID ALL THE MANAGEMENT ISSUES GO?

lifeid Foundation FAQ v.1

Single Sign-On. Introduction. Feature Sheet

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

SIMSme Management Cockpit Documentation

Consolidated Privacy Notice

The Digital Identity Revolution

WHITE PAPER. OAuth A new era in Identity Management and its Applications. Abstract

Mobile Banking Guide

Feature Guide. Sybase mbanking

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Whitepaper on AuthShield Two Factor Authentication with SAP

PKI Credentialing Handbook

Content. Privacy Policy

Smart Mobile Identity. Revolutionizing biometric identity verification

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Transcription:

Innovative Authentication method for boosting Mobile Connect global roll-out GB Patent Pending 1803719.2 US Patent Pending 15928348 IPification solution could very well be what is missing to 2018, Shanghai Mobile Connect to fulfil its mission Study predicts that esports will have more viewers than NFL football by 2020 Identity Innovation Labs

Biometrics are good, but not good enough! Fear of Privacy Breaches Poor Standards ID Unreliability Biometrics Alone Aren t Enough ID Theft

Blockchain in Mobile Identity: It s still some years away Self-Sovereign ID? Who Are you? "It's unreal how careless we are with data that's worth more than gold." Harry Cheung Consumer Usability

Unlocking the true potential of midentity Mobile phone numbers are increasingly the most widely used unique user identifier Mobile Connect is one of the biggest frameworks for Telco enablement in digital identity space By simplifying the authentication and authorization processes, IPification can help lower the cost of doing business, helping to receive larger acceptance and Digital consumer inclusions thus making it more effective for Mobile Apps & Websites

- EASE OF USE + Digital Authentication options The potential for fraud is always a risk that cannot be ignored when it comes to conducting transactions or access information. In person, an individual could present forged or altered documents that attest to an identity that does not belong to him/her. Online, an individual could also misrepresent his or her identity in a similar manner using someone else s credentials without their permission. Here is where online user authentication is able to attest to a person or entity s identity and ensure the validity of a transaction. SMS One-Time Password Mobile ID Facebook Log-in Online Registration Log in forms Smart Card One-time Password - LEVEL OF SECURITY +

Technical flow and API requirements Technical flow Integration USING MOBILE APP/WEB C2S API MOBILE ID REQUEST MOBILE USER NATIVE APP DEVELOPERS MOBILE ID box MOBILE WEBSITES TELCOS

User flow example Android (example Play Movies app) Mobile ID is the form of identification provided by your Network Operator. It represents convenient and secure way for easier login.

User flow example ios (example Play Movies app) Mobile ID Login Do you want to use your Mobile ID to login? By typing YES you are accepting Terms of Service No Yes

User flow example Mobile Web https://api.ipification.com https://api.ipification.com/auth

Comparing current authentication options Solution User Experience Security Cost Availability Email & Password Email & Password & SMS (2FA) Phone Number & SMS

Enhancing Mobile Connect DISCOVERY User-level AUTHENTICATION SECURITY Based on OAuth2 & Open ID Connect Up to 6FA based on SIM/Network/Device data Not using SMS or HE in any of the flows USER EXPERIENCE No previous Registration Single click for Service Connect (user consent, asking for previous credentials if user is not already logged in) Silent Login BUSINESS MODEL Per successful API call (Authentication)

Benefits for Service Providers 1 For all online service providers, device manufacturers, and many others More transactions thanks to simpler user journey; increase of conversion rates; easy and fast login. 2 For all Corporations: match employees mobility and data security; make workforce mobile; trusted remote access to working tools, have strong authentication yet allow mobility. MERCHANTS BANKS 3 For all banks: promotion of online and mobile sales channels, enhanced security, financial transactions validation, strong authentication. 4 Reduce administration costs and time frame, enable digital identity and digital signature. Introduce e-government. CORPORATE GOVERNMENTS

Benefits for End-users Anonymous Log In Strong Authentication Identity Confirmation Payment Confirmation Sign Up Privacy Protected = Piece of Mind Highest level of Security= Trust Convenience=Adoption

A NATION OF GAMERS AND DEVELOPERS IPification is the future of Gamers identity! No need for extensive login & registration forms Gamers do care about their privacy Gaming experience is of the utmost importance Top notch security for Gamers piece of mind

A NATION OF GAMERS AND DEVELOPERS Credential-less login & authentication effects: Increased Conversion rates on average there are 20-30% of Gamers dropout when asked to register after game play Better user Experience seamless login and registration method, as well as transaction processing improves Gamers UX Enhanced Security strong authentication option re-assures security features inside the app and make Gamers feel safe about their accounts

About IPification (BVL)

Meet the Team OSCAR CHIM Strategic Partner HARRY CHEUNG Founder & President JOHN TSANG Chairman PAUL TSE Chief Strategy Officer SERGEY SCHOLOM Strategic Partner

Thank you for your attention! partnership@bvantage.com.hk