Login for the Mobile Internet – What new Challenges arise from Mobile Internet Usage?
The steadily growing demand to use internet services also “on the move” pushes the market penetration of mobile devices (such as iPhone, Nexus One) as well as of mobile applications.
All service offerings require a user identifcation to be offered in personalized form. A main success factor for the mobile usage is the usability, as the user just wants to use the services “on the move” without special login effort and without any additional registration need. In many cases, new mobile service offerings are also a result of the clever combination of various services from different providers (= mash-ups) to create new, functional applications. Therefore also the option of obtaining services from other providers on behalf of the customer is required.
There are many possibilites to provide personalized services and mash-ups “on the move”. But what are the pros and what are the cons of either using existing or arising technologies.
Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity
Digital Identity has grown separately in IMS and Internet. While the one offers walled garden services the other is focused on openness and third party integration. However, for future Telco-business an inter-working of IMS and Internet is needed. A methodology where real use cases are used shows the benefits for operators, SPs and end-users by bridging these two worlds. These use cases cover the exposure of IMS authentication to Web services, exposure of Web federations to IMS networks and exposure of IMS resources to Web 3rd parties. In an IMS domain, for SSO, SAML assertions are conveyed in SIP messages. In a multi-domain world, the SSO solution is based on a GAA/GBA solution. For attribute sharing, LAP ID-WSF messages are used. When a Web Service Provider (WSP) exposes user data being retrieved from the IMS a resolution of the mapping between the SAML identifier and the IMPU is needed. The working assumption is that the user experience should be seamless while keeping attention to security and privacy. The main findings and conclusions is that no new technologies are needed. It is enough for IMS and DigId technologies to complement each other.