13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

eing included in Ericsson's mobile e-<strong>com</strong>mercesolutions. Designed primarily for financialservices, such as banking and trading,Ericsson's security systems enable the<strong>com</strong>pletion of high-security transactionsfrom a mobile phone. These transactions caninclude account balance inquiries, the transferof money between accounts, billing services,and stock trading.End-to-end security in the system meansthat the user's personal identification number(PIN), which is used to authenticate thegeneration of a digital signature, offers thenecessary authentication and data integrityrequired to verify banking transactions.Each authentication is unique and does notrely on intermediary network functionality.The system also supports established techniquesfor data integrity and encryption, includingwireless public key infrastructure(WPKI). The system can thus be integratedinto existing IT infrastructure and securityfeatures.WPKI, which consists of protocol extensionsand software and hardware additionsto terminals and networks that expand traditionalPKI to wireless networks, is intendedto enable the implementation of scalablesecurity solutions that are independentof the application, network, and supplier.PKI is an application-independent securityinfrastructure that is based on publickey cryptography services for data integrity,confidentiality, authentication and nonrepudiation.Using applied cryptography,PKIs govern the distribution and managementof cryptographic keys and digital certificatesthat allow users to take advantageof several fundamental features.• Confidentiality of information ensuresthat user <strong>com</strong>munications are safe and cansolely be read by the intended recipient.Message encryption using digital certificatesguarantees confidentiality.• Integrity of data guarantees that messagecontents are not altered during transmissionbetween the originator and the recipient.PKIs provide digital signaturesto ensure the integrity of all transmittedinformation.• User authentication enables systems andapplications to verify that users are whothey claim to be and that they have beenauthorized to access resources. PKIs usedigital signatures and user certificates toguarantee the authentication of all end entitiesand system resources.• Non-repudiation prevents users of thePKI from falsely denying that they haveparticipated in a transaction or sent a messageto another user or resource. With alegitimate digital signature in hand and alegitimate digital certificate to ac<strong>com</strong>panyit, the chances of a message being forgedor originating elsewhere are next to nil.Security features and optional packagesMobile e-Pay offers flexible packages of securityfeatures suitable for high- and lowvaluetransactions.• Two-zone (PIN) security. SSL is used toverify the identity of the parties and to encryptthe connection from the Mobile e-Pay node to the connected Internet node.In GSM, native network security is usedfor authenticating end-users. This schemeis enhanced with user pass-code schemes,which require end-users to know andinput a pass code (a specific e-<strong>com</strong>mercePIN) to approve ttansactions.• Two-zone PKI security. Using aPKI/RSA digital signature, Mobile e-Paysigns a contract after having presented itto the end-user. The digital signature istriggered when the end-user enters a staticpass code to confirm a purchase. Thisfeature, which does not require SIM applicationtoolkit (SAT) support, can beused to receive and sign contracts from- WAP 1.1 terminals; or- plain SMS.• End-to-end triple digital encryption standard(3DES) SAT security. End-users canauthorize digital contracts with SAT-enabledphones. On a <strong>com</strong>bined WAP1.1/SAT phone, this means that messageauthentication code (MAC) authenticationcan be used to verify that the enduserapproves the transaction. The 3DESkey is stored in the SAT application. AnySAT phone—including non-WAPphones—can be used for push paymentsthat are initiated from another terminal.• End-to-end WPKI SAT security. Theend-user can sign a digital contract usinga SAT-enabled phone. RSA asymmetricalkeys are supported. The private key isstored in the SIM, which enables the useof true end-to-end RSA keys with nonrepudiation.Any SAT phone—includingnon-WAP phones—can be used for pushpayments that are initiated from anotherterminal.For end-to-end SAT security schemes, theSAT applications are also protected by a personalPIN on the SIM. This protects endusersagainst misuse by persons who find orsteal an authenticated GSM phone.Ericsson Review No. 2, 2000 89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!