P. 1
Identity Mobilized

Identity Mobilized

|Views: 3|Likes:
Published by Andy Zmolek

More info:

Published by: Andy Zmolek on Sep 18, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

04/15/2012

pdf

text

original

Identity: Mobilized

andy.zmolek@lge.com andy@zmolek.com

Mobile identity beyond the web 5. Cloud Service Provider 4. facebook Extend enterprise directory: AD. Open discussion . Mobile identity as paradigm extension • • • • • • • • Extend the web . The mobile paradigm 2. OS/Technology Supplier. Mobile identity platform opportunities 6. Cloud side: Operator. Lessons from the last paradigm shift 3.Today’s Journey 1.Consumer: Google. LDAP Mobile Virtualization Mobile Biometrics Near-Field Communications (NFC) Mobile Identity Databases (Neustar) Device-side: Hardware Supplier/OEM.

The Mobile Paradigm A device will replace everything in your wallet • It is your critical communications center • It’s a navigation and entertainment center • It knows more about you than your spouse • It contains your personal and work identities • It’s not a PC and won’t replace it entirely. PC-centric solutions won’t define the mobile experience Did 3270 terminal emulation define the PC experience? .

0 3. 2.Lessons from the Last Big Paradigm Shift Central Computing Personal Computing Mobile Computing 1. few old-paradigm leaders survive Value creation and profit shifts toward software and solutions . 2. 3.0 Consumers drive disruptive innovation. 5. 4. enterprise follows later Enterprise-oriented ecosystems appear in the new paradigm Eventually the enterprise must adapt or lose competitiveness New market leaders emerge.0 1.

Drilldown: Mobile Paradigm Changes Central Computing • • Enterprise owns and controls equipment Vendor selection by enterprise only • • Personal Computing Equipment owned by enterprise or consumer Vendor selection by enterprise or consumer • • Mobile Computing Equipment more often consumer-owned (trend) Consumer typically drives ve ndor selection • No consumer use • Limited consumer use of enterprise gear (and vice-versa) Some control of enterprise data • Consumer AND enterprise us e of same device Deep fear of losing control of enterprise data • Complete control of enterprise data • • • • • • Long sales and deployment cycles Duty cycle: 20 years Software: build-to-suit Locally-oriented • • • • Moderate sales and deployment cycles Duty cycle: 10 years Software: packaged LAN/WAN-oriented • • • • Short sales and deployment cycles Duty cycle: 3 years or less Software: cloud/app store Cloud-oriented .

but also SMB Can include web through SAML for example Active Directory and LDAP drive PC-centric enterprise identity today and are the default places to extend – Enterprise directory-centered identity .Mobile Identity as Paradigm Extension • First attempts to embrace a new paradigm start by extending the old ones – This doesn’t mean they will or won’t stick – New paradigms bring new dynamics into play • Two potential identity Paradigms to extend – Web-centric identity • • • Primarily consumer-oriented.

Extending the Web (Consumer) • OpenID is a perfect example of something that translates OK from PC to mobile • Google takes this further in Android – identity based on gmail account • Facebook does this on multiple platforms – Android also has explicit idendity. synch features • Both are well-positioned to create broad consumer mobile identity ecosystems .

not part of AD directly • Alternative: vendor-neutral directory via LDAP .Extending the Enterprise Directory • Active Directory has become the default place for the PC-centric enterprise to store identity – Microsoft has a huge vested interest in retaining the enterprise identity store – Yet Microsoft still sees mobile devices as an extension of the PC.

Mobile Identity Beyond the Web • Most smartphones serve two purposes: – Consumer device for private life – Enterprise device for business life • Mobile identity systems shouldn’t ignore this • Web-based identity sucks on a mobile device – Poor usability. passwords less than ideal – Mobile app paradigm exists outside web • There must be a better way (and there is)… .

two (or more) identities • Ensure privacy in the consumer experience – Keep personal calls and messages private – Install consumer applications without restriction – Maintain private personal cellular number • Protect business data and applications – – – – – Bring Your Own Phone (BYOP) to enterprise IT Potential to separate billing for enterprise usage IT in full control of enterprise OS. apps.Mobile Virtualization • One device. network Wipe business data without affecting consumer Extend enterprise UC services to mobile device .

easy to use – Delivered with the Motorola Atrix • Voice-based biometrics – Hands-free biometric easily run in smartphone – Higher equal-error rate than others (~10%) • Visual biometrics – facial recognition • Emerging: electrical field biometrics . different directions or fingers for different functions.Mobile Biometrics • Low-cost fingerprint scanner – Autentec sensor looks like a trackpad or button – Swipe in any direction.

contactless card & reader • Initialization and configuration of other wireless technologies as needed based on where you are and what you have Why it’s useful for identity • • • • • • Security credential based on where you are and what you have Very low power requirements. based on what you touch or how you gesture. ECMA and ISO/IEC . Tool for browsing the physical world Standardized by NFC Forum (nfc-forum.org). particularly in passive mode Minimal interference with other devices Context.Near-Field Communications What it is: simple information transfer • Very short range (nearly touching) .

Mobile Identity Databases (Neustar) • Neustar keeps a lot of critical databases for both landline and wireless service providers • In some cases these databases are also legally mandated – E-911 location databases – Number portability databases – North American Numbering Plan Assignment (NANPA) • All mobile device operators send subscriber data to Neustar that links mobile E.164 (telephone) number to subscriber name with network data .

but a strong contender exists – Apple iOS platform is playing the Mac-equivalent – ARM/Android positioning Google to win – No better alternative is thriving at this point • Huge push to avoid commoditization on the device and cloud sides of the equation .Mobile Identity Platform Opportunities • Mobile platform itself hasn’t got a WinTel equivalent yet.

“just add software” • OS/Technology Supplier – OS mobile identity framework is best included in the OS – Expose APIs to enterprise app developers to seed market – Ride the coattails of NFC mobile payments initiatives . – Smartphone OEM now has many now-cost options to integrate into their device. etc. NFC.Device-Side Opportunities • Hardware Supplier/OEM – Hardware to exploit: Multi-core ARM chipsets with strong security features: ARM A15 with virtualization extensions. sensors.

Cloud-Side Opportunities • Operator-based identity services – Natural extension of existing subscriber identity – Also a natural adjacency to NFC-based mobile payments – Could follow consortium model used by ISIS • Cloud Service Provider: Mobile Identity-Plus – Standalone mobile identity provider – not so sure • What would the funding model be? – Or mobile identity PLUS: mobile presence aggregation/distribution. or mobile payments and affinity program tracking. or mobile social networking services .

Thank You OPEN DISCUSSION .

  9ff –¯. ° .

f°– ¾ .

°f .

¯½°– W W W ° ½¾ °¾f°  n°¾ ½¯ ° I ° ¾  n°  ° ½¾ ° -n°¾¯ ¾ W W W 9 ¾°f .

¯½°– ½¯ °°   ° ½¾ n°¾¯  I ° ¾  n°  ° ½¾ n°¾¯  ¯ n°¾¯ ¾ € ° ½¾ – f %f° n  ¾f% ¯ n°€ ° ½¾  ff .  . ° W W W . f ¾f ¾ f° ½¯ °nn ¾ nn  f¾ €f ½fnf– -$J.

¯½°– ½¯ °¯ € ° n°¾¯  ° % ° % .

°¾¯  ½nf  ¾ ° ¾  n° .

°¾¯ - ° ½¾ ¾ €¾f¯  n  ½ € f€¾°–n°€ ° ½¾  ff ¾f ¾f° ½¯ °nn ¾ nn  f¾ ¾¾ €f n $f½½¾ .

  ° W W W W W .

¯½  n°€ ° ½¾  ff °–¾f ¾f° ½¯ °nn ¾ nn  f¾ €f    ¾ nf  ° W W W W W W W W W W .

° ½¾   n n °   ° .   °f¾9ff –¯ °¾° W ¾f ¯½¾ ¯ fn f° ½ff –¯¾f   ° °–  ° ¾ @¾  ¾°#¯ f° °#¾n - ½ff –¯¾ °–°  °f¯n¾°½f W @½ °f °9ff –¯¾  ° J n °n ° W W W 9¯fn°¾¯   °  f¾..

€ f¯½ n  nf° 9  9.f°°n  –.

n °n ° ½¾   ° ff° f   €f½fn ¾  ° .

 ° °– J %.

°¾¯ % W ½ ° ¾f½ € n f¯½ €¾¯ °–f f°¾f ¾€¯9.

¯   W – f ¾¾€ °°   ° f¾ °–¯f fnn° W fn   ¾¾°¯½ ½f€¯¾ °  f¾f¾ ½n °  ¾°n€ f ¾ W f   ½¾° n f  f  n°¾¯ ¯   ° n¾¾ ¯¾ .

 ° °– ° ½¾  n W n  nf¾ n¯   €f½fn  € 9.

n¾€¾¾ ¾¯   n ¾f¾f°  °¾°€ 9.n¾€f¾f–  ¾ °  ¾° f°°–   ° ½¾  °¾  . n °n ° ½¾ ¾  ° .

°½f€  n W  °f  °  ° f  nf9 .

.   ° °  J W .¾¾¯f½° ¾¾  ½½¾ ¾ .

  f½½½ff –¯ ¾¾¾   W @  ¯¾ f  f%f°   ¾% .°¾¯  n €½f € ° ½¾  n € ¾° ¾¾€ W .   °¾¾ ¯¾¾ °#–° ¾ W J f¾  °¾n¾°f¯   n 9¾f  ½f¾¾ ¾ ¾¾f° f .

f°f°½f ½ ¾°fn f°¯  W 9 n ¾° ¾¾ fff° f½½nf°¾ °–°9° % 9% ° ½¾ @ 9 °f¾ ½ff  °–€ ° ½¾ ¾f– @°€n°€ ° ½¾  f½½¾ °  J½  ¾° ¾¾ fff€€ n°–n°¾¯   °  ° ½¾ D.  Iff° W °  n %¯ % ° ¾ W °¾ ½fn° n°¾¯  ½  °n  ½½ ¾°fnf¾f° ¯ ¾¾f– ¾½f °¾fn°¾¯ f½½nf°¾ ¾n° ..

¾ n ¾¯   n .

   ¯ n¾ W  n¾€°– ½°¾nf°°   ° n ¾ °¾¾ ffn½f  ° ½ °f°  n°  €€  °  n°¾€°– ¾ € €€  °€°n°¾  f¾¾     .f W In f¾  ¯ n¾ f° ¾ €  ¯ n f¾°°¾¯f½° –  f f f° ¾%  % W I¾f ¯ n¾ €fnf n–°° W ¯ –°–   nnf€   ¯ n¾ ..

- f   .

°¯f° €  °n   n ¾ .¯¯°nf°¾ Jf¾ ¾¯½ °€¯f°f°¾€  W I ¾f°– %° fn°–% n°fn ¾¾nf   f  W °ff°f° n°€–f°€   ¾¾ n°– ¾ f¾°  f¾ °  f f° ff J#¾¾ €€ ° W W W W W W  nn °f f¾ °  f f° ff I ½   ¯ °¾ ½fnf°½f¾¾ ¯ .

°   f¾ °fn– ¾  @€ ¾°– ½¾nf f° f   -.

¯%°€n €¯ –% .

f° $..

.

   °ff f¾ ¾%- ¾f% W - ¾f  ½¾f€nnf ff f¾ ¾€  f° ° f°   ¾¾¾ n ½ ¾ W °¾¯ nf¾ ¾ ¾  ff f¾ ¾f f¾ –f ¯f° f  nf° ff f¾ ¾ -¯ ½f  ff f¾ ¾ -¯ nf°-¯ °–9f°¾¾–°¯ °%--9% W ¯   n ½ f¾¾ ° ¾ ¾n  ff - ¾f f°¾¯   %  ½° % °¯ ¾ ¾n °f¯ °  ff ..

$°  ½¾°°–– ° -  f °f ¾°–f¾½° W – ½¾f n¯¯ f°°  n f° n ¾ ¾€  f° .  ½f€¯¾ €f¾°#–fJ°@  f °   f¾°–n° °  ¾¾ ½½  ½f€¯¾½f°– .   °9f€¯½½° ¾ W .fn f ° ..

 n . n  ½½° ¾ W f f ½½ $. f f  ½ .n½¾ ¾ ¾°–¾ n € f ¾ . ff°  °¾°¾ ¾ °¾¾ -.

°f¾¯f°° n¾½°¾ ° –f °  n #©¾f ¾€f # W $@ n°–½½  ¯   °€f¯ ¾ ¾°n °  ½¾ 9¾ ° ½¾ f½½  ½ ¾¾ ¯f    nff¾€-.  n ¯f½° .

¯  ½f¯ °¾°f ¾ .

.

  ½½° ¾ W ½ f f¾  °¾ n ¾ -ff  °¾°€ ¾°–¾ ¾n  ° ¾f°fff ©fn °n-.

f¾ ¯  ½f¯ °¾ .

 €n°¾¯¯ ¾   W .

  n 9  .   ° 9¾ f° f° ¯   °½  °¾¾ W Jf  €° °–¯  " ¯   °9D ¯  ½ ¾ °n f–– –f°$ ¾ °  ¯  ½f¯ °¾f° f€€°½–f¯fn°–  ¯  ¾nf° °–¾ n ¾ .

@f° 9-.

D- .

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->