throbber
1
`
`Service Interaction through Role based Identity
`
`Mohammad M. R. Chowdhury1 and Josef Noll1, 2
`
`1UniK, N-2027 Kjeller, Norway, Telenor R&D, N-1331 Fornebu, Norway 2
`
`
`
`mohammad@unik.no, josef@unik.no
`
`Abstract— A critical issue in the digital world is the simple
`and hassle free interaction of services through an identity of
`individual without using large number of physical identities
`and usernames/passwords. Such an identity system is expected,
`from where, people can retrieve any of the identities necessary
`to access every available service with adequate security.
`Success of such identity depends on its usability in the current
`and probable future wireless technology. Authentication is
`another important issue for acceptance of this system.
`This paper proposes a concept of identity mechanism
`through which individuals can exercise exactly the similar real
`world roles in the digital world. The concept enhances the
`privacy of individual by minimum disclosure of identifying
`information. It focuses on the possible use of widely accepted
`mobile phone technology to authenticate user to such identity
`system and to interact services through it.
`
`Index Terms— Authentication mechanism, role based
`identity, service interaction.
`
`INTRODUCTION
`I.
`Identification is necessary to access various value added
`services from service providers. Interactions of these
`services are required to play certain roles of human being in
`life. Physical identities cannot be used while accessing
`services in the digital world. Moreover, different types of
`services require different types and forms of identifications.
`To make the service access simple, easy and hassle-free, a
`unique identity entity is required from where user can
`retrieve the appropriate type of identification. Mobile phone
`penetration is expected to reach 100% in many of the
`European countries [1]. It has become a foremost electronic
`device for communication worldwide because of
`its
`mobility and seamless and secure access provision to
`networks. Therefore, we focus on accessing the proposed
`identity
`and hence,
`services
`through SIM
`card
`authentication. The proposed identity mechanism has the
`potential to replace all the present physical identities,
`usernames and passwords.
`The paper will first postulate the need for a role based
`identity and illustrate its proposed generic architecture. It
`will then address the security aspect of this identity and
`justify why mobile phone has the potential to serve as an
`identifier. The next section will discuss how service
`interactions through role based identity will be realized. The
`paper will provide a critical analysis on different aspects of
`proposed role based identity concept and conclude with the
`review of main points and comments on future research.
`
`II. HUMAN ROLES IN LIFE
`Every human being plays numerous roles in life to live.
`As a student, we are attending an education institute; as a
`researcher or engineer, we are working in a company; as a
`consumer, we are buying things with cash or credits; we are
`maintaining social relationships with family, relatives,
`neighbors and colleagues. While exercising these roles in
`life, we are interacting with many service providers to
`receive different
`types of services. Analyzing
`these
`scenarios, it can be said that every human being plays roles
`basically in three different areas, personal, professional and
`social areas. Therefore in reality, leading everyday life is
`nothing but playing some personal roles, professional roles
`and social roles.
`
`III. FROM REAL WORLD TO DIGITAL WORLD
`To carry out these personal, professional and social roles,
`an individual needs to interact with many other people and
`many interfaces of numerous service points in the real
`world. During these interactions, we need to present our
`identifications to others that represent our identity in this
`world. Now-a-days, people are carrying a good number of
`physical identities, for example, passport/personal ID, credit
`cards, bank cards, student card, office ID, driving license
`etc. with them. In addition to these, a bunch of usernames
`and passwords are used everyday for identification to access
`many web sites and other electronic services which is very
`troublesome. Everyday, more and more real life services are
`available digitally. So, we are heading into an extremely
`worrisome world of identification. A unique identity
`mechanism needs to be developed in the digital realm where
`individuals would be able to control and manage their
`various digital profiles, assigning the appropriate attributes
`to each according to their context. In real world, it is
`difficult to selectively verify or reveal portions of one's
`identity: most
`forms of
`identification contain more
`information than is needed for any transaction. The identity
`system must disclose the least identifying information
`possible, as it ensures the least possible damage in the event
`of a breach. It needs to be addressed while designing a
`unique identity mechanism. We are now thinking of such a
`system where every real life services are available digitally
`and can be accessed from anywhere by using digital
`identifications. Individuals need to practice the similar roles
`in the digital world that they are currently practicing in the
`
`CARDWARE EXHIBIT 2031, Page 1 of 5
`SAMSUNG V. CARDWARE PGR2023-00013
`
`

`

`phone SIM card, will possess our proposed identity. To
`enhance the security for service interactions, like, financial
`transactions, SIM card will hold some of the identifiers that
`require stringent security requirements. Therefore, SIM card
`is also a part of “Mydigital identity” only to interact some
`specific services. We are proposing that “My digital
`identity” can be accessed either by our very personal mobile
`phone (priority) or by our PC through fixed internet
`connection (optional). SIM card of the mobile phone will
`automatically identify us as the owner of “My digital
`identity”.
`
`V. SECURITY ASPECTS
`
`Ensuring security to these identities (especially while
`doing financial transactions) is a burning issue, considering
`the fact that we are proposing to place part of this identity
`repository in the network that is vulnerable to electronic
`attack. It has been proposed in this paper that our mobile
`phone will act as the primary device to access “My digital
`identity”. In addition to this, a part of the identity will be
`stored in mobile phone SIM card. Here, it is assumed that
`the user has the provision for ‘always-on’ facility in his/her
`mobile phone. Fig.2 illustrates different levels of security
`against their security requirements.
`Through a nice to know[3] authentication mechanism,
`user can access “My digital identity” and, through a need to
`
`Services
`
`Bank transactions
`
`Messenger, email,
`Intranet
`
`Network access
`
` A
`
`to
`know \
`
`Need to
`know
`
`Requirements
`
`
`
`
`
`real world. Therefore, a role based digital
`proposedin this contribution.
`
`identity is
`
`IV. GENERIC ARCHITECTURE OF ROLE BASED
`IDENTITY
`
`Human roles already have been divided into three
`different areas, such as, personal, professional and social
`roles. In this article, we are proposing a concept of “My
`digital
`identity” that can be divided into ‘My personal
`identity (PID)’. ‘My corporate identity (CID)’ and ‘My
`social identity (SID)’ that would represent ourselves and our
`relevant real life roles to the digital world. ‘My personal
`identity’ can be used to identify ourselves in our personal
`and commercial
`interactions. Similarly,
`‘My corporate
`identity’ and ‘My social
`identity’ can be used in our
`professional and interpersonal
`interactions respectively.
`Each of these three identities will have several identifiers.
`Each identifier will be used to access several relevant
`services and a number ofattributes will characterize an
`identifier (see fig.1).
`Attributes are those set of characteristics of an identifier
`
`
`
`Fig. 1. Architecture of“Mydigital identity”.
`
`that are required by the service providers during service
`interactions. For example, passport can be one of the
`identifiers and name, date of birth. date of issue, date of
`expiry, the country that issued the passport, passport number
`etc. can be its attributes. The passport that is in fact a
`personal identity will be used to deal with governments
`electronically. Similarly, another identifier will be used to
`get access to financial services,
`like, buying something
`through credit cards. Attributes of such identifiers are name
`of the person who holds the credit card (may be optional),
`numberof the card, pin code, date of expiry etc. My PID
`might have some more identifiers to access our home
`premises, home network or VPNetc. In the same way, My
`CID and My SID will have several such identifiers and
`attributes. My CID might hold the identifiers to access our
`office premises, office LAN/VPN etc. According to Dick
`Hardt, individual’s interests, fondness, preferences or tastes
`are also part of his/her identity [2]. In the proposed identity
`model, these features will also be dealt with by My SID.It
`will also include my calendar, my address book, and
`identifiers for accessing my email, messenger, IP telephony
`etc. Each identifier will contain only the required identifying
`information that a service provider needs to know. Each
`identifier will be used to access one or several relevant
`services. “My digital identity” thus, ensures the minimum
`disclosure of identifying information. This is how; an
`identity repository (“My digital identity’’) that will be placed
`partly in the network environment and partly in mobile
`
`Fig. 2. Security infrastructure based on security requirements.
`know[3] authentication mechanism, user can access most
`other services, such as, accessing messenger
`(msn or
`yahoo), my address book, IP telephone (skype, voipstunt,
`telenor etc.), e-mail account; accessing home or office
`premises etc. using appropriate identifiers of My PID, My
`CID or MySID.Nice to knowservices are network access,
`where knowledge about usage is only required. Need to
`Knowservices have higher security requirements. Highest
`security requirements are required for have to know[3]
`services. Users have to be authenticated through a have to
`knowauthentication mechanism to use the identifiers that
`are required to access financial services, such as, bank,
`credit card etc. Here, we are proposing to deploy the have to
`knowauthentication mechanism in SIM card, whichis a part
`of “Mydigital identity”. It will significantly minimize the
`possibility of disclosure of identities for financial services,
`in case there are electronic attacks on network contents of
`“My digital identity”. To further enhance the privacy of
`attribute entries of the legitimate owner, identifiers of the
`above mentioned IDs will be visible to the owner but the
`
`CARDWAREEXHIBIT 2031, Page 2 of 5
`SAMSUNG V. CARDWARE PGR2023-00013
`
`

`

`attribute entries will not be. Owner can edit and add or
`delete the contents in the edit mode.
`
`VIL. SERVICE INTERACTION THROUGH ROLE
`BASED IDENTITY
`
`VI. EXTENDED SIM CARD AUTHENTICATION
`
`Currently, the SIM card provides the nice to knowaccess
`to network. We propose that the SIM card authentication
`will also be enough to enter “My digital identity”. The
`higher security requirements that need to knowservices may
`require might
`also be
`satisfied through SIM card
`authentication [3]. This is because, the SIM card in the
`mobile phone has the capability to provide all levels of
`authentication, and support mechanisms for revocation of
`credentials stored in the SIM card [4]. It is only active if
`authenticated by the network operator. If it gets stolen, the
`operator can disable the card. SIM card opens
`for
`authentication and encryption in every wireless network
`(Bluetooth, WLAN, WiMAX) in addition to GSM and
`UMTS[4]. So, SIM card enables authentication mechanism
`to interact different
`services will
`certainly give
`a
`technological edge to the development of future wireless
`technologies and services. By placing the identity repository
`in the network, we are reducing the volumeofdata transfer
`from mobile phone to network.
`In consequence,
`the
`additional data transfer due to the use of such system will
`leave a very little effect on the capacity ofair interface.
`As
`proposed,
`the
`save
`to
`know authentication
`mechanisms will be realized in SIM card.It will then act as
`one of the identifiers of “My digital
`identity”. We are
`introducing an extended SIM card (ESIM) that has the
`capability to hold multiple credentials. One will be
`responsible to access the network,
`thereby the network
`entity of proposed “My digital identity” and another one
`will store the have to knowauthentication mechanisms.
`Fig.3 shows the scenario of extended SIM (ESIM) card
`authentication in “My digital identity”.
`Thus, ESIM will also be a part of “My digital identity”
`
`which will not be placed in network.
`
`Fig. 3. The have to know authentication mechanism is in ESJM.
`
`Services have to be accessed through either of the IDs
`(PID, CID or SID) and their identifiers proposed. Identifiers
`and attributes can be added according to the user’s service
`requirements. Owner of “My digital
`identity” can also
`include his/her own interests, fondness, preferences, address
`book, calendar in My SID.Therefore, personalization is an
`essential feature in such identity mechanism. User can
`control which of the attributes he/she wants to reveal while
`interacting services. These can make “Mydigital identity” a
`very much wsercentric. The data always flows from/through
`the identity with user’s consent. There are mutual trust
`relationships between this identity repository and the service
`provider’s websites or contents [5]. Therefore, disclosure of
`identifying relationship is limited to parties having trust
`relationships with “My digital identity”. A model service
`interaction scenario can be established through “My digital
`identity”. Somebody wants buy air ticket using his/her credit
`card from Lufthansa. The action is performed through the
`following steps (see fig.4):
`1) “My digital identity” is accessed from mobile phone.
`2) Lufthansa.de is accessed and request is made to buy an
`
`air ticket.
`
`Fig. 4. Purchase ofair ticket by “My digital identity”.
`
`3) Lufthansa.de asks for credit card identity from “My
`digital
`identity” for payment. At
`this point,
`the
`payment
`requires
`the
`use of have
`to
`know
`authentication mechanism from owner’s mobile phone
`SIM card (ESIM). SIM card performs the necessary
`authentication and returmms a paymentreceipt.
`4) “Mydigital identity” sends the receipt to Lufthansa.de.
`5) Lufthansa.de checksthis receipt of payment with credit
`card authority, for example, VISA for validation.
`This is how; a person can buy air ticket from airlines
`websites using his/her digital
`identity repository. Any
`identifier with all its attributes can be downloaded from
`“Mydigital identity” and stored temporarily at the memory
`of SIM to transfer users’ credentials through Bluetooth or
`from NFC enabled phone to other NFC enabled devices [3].
`[6]. This is how, “My digital
`identity’ can be used
`anywhere, anytime and can be transferred to any device
`which can be used to enable seamless user experience.
`
`CARDWAREEXHIBIT 2031, Page 3 of 5
`SAMSUNG V. CARDWARE PGR2023-00013
`
`

`

`
`
`4
`
`VIII. CRITICAL ANALYSIS
`The proposed identity mechanism conforms to the
`fundamental principles of Kim Cameron’s “The Laws of
`Identity” [7]. In this concept, user controls how much
`identifying information it would reveal to the service
`providers. As the services are accessed through relevant
`identity (PID, CID or SID) and their relevant identifiers,
`minimal disclosure of only necessary
`identifying
`information is ensured. Any sustainable identity system
`should have this criterion. Accessing this identity through
`mobile phone provides the major advantage over the other
`available identity mechanisms. Mobile phone acts as a
`primary identifier to “My digital identity”. It is available 24
`h/7 days a week, as compared to about 4 h average usage of
`a PC. Thus, it provides the always online functionality with
`availability. As, SIM card may also provide need to know
`authentication, some services that require minimum security
`can be available to the users as soon as they enter the
`proposed identity repository by mobile phone. Deployment
`of have to know authentication mechanism in SIM (ESIM)
`not only enhances the security to access financial services
`but also increases the acceptability of this identity to users.
`Another very useful feature of such identity concept is
`portability of identifier from one device to another,
`especially to the devices that has no direct connectivity to
`“My digital identity”. Thus, this identity can be accessed
`from anywhere and service continuity is possible in
`heterogeneous wireless environment. In case of losing or
`theft of SIM, we can use our PC to access “My digital
`identity” which is an optional access possibility to “My
`digital
`identity”. It obviously requires some security
`modification or enhancement.
`The proposed identity mechanism will certainly create
`values for
`the users, network operators and service
`providers. User can use a unique identity mechanism that is
`simple, easy to use, digital in nature but available anywhere
`and portable to any device. It has the potential to replace all
`the physical identities in the real world. Network operators
`can also earn revenues by providing space for the repository
`and through the additional data transfer requirements. Users
`can access service readily. As there are trust relationships
`among the parties involved in transactions here, the
`possibilities for fake transactions will reduced significantly.
`Once “My digital identity” repositories are known to the
`service providers, new offers can even be posted directly to
`these repositories.
`Sxip 2.0 and Microsoft Cardspace are two identity
`solutions developed by Sxip
`identity and Microsoft
`Corporation [8], [9]. They provide the movement of identity
`data over the internet. In addition to effortless movement of
`identity over the internet, the proposed mechanism supports
`the portability of identity data among the devices. Gemalto,
`one of the leading digital security providers, is using high
`capacity SIM card for storing digital certificates or rights
`[10]. The identity repository can be used instead to store
`these rights that can be accessed through mobile phone.
`Thus, some overheads during data transfer can be avoided.
`The mechanism also ensures the portability of rights. There
`are many identities based on chips cards, like, memory cards
`and smart cards [11]. There are multiple chip cards,
`
`provided by multiple entities and single chip card, shared by
`few entities. If the proposed identity repository is available
`in the network which can be accessed anytime and from
`anywhere through an always online mobile phone, such
`various identity based chip cards might not be necessary at
`all. User needs only one card, a SIM card.
`
`
`IX. CONCLUSION
`The paper introduced a new concept of a role based
`identity repository, its security and service interaction
`architectures. Part of the identity is placed in mobile phone
`SIM card to meet the highest security requirements.
`Authentication to this identity and thereby service access
`through mobile phone is one of the main features of this
`concept. The paper also indicated various usefulness of such
`mechanism. The concept of a unique identity repository in
`the network will obviously enhance the user experience in
`seamless service interaction in heterogeneous wireless
`networks. In our future work, we will focus on establishing
`a use case on seamless user experience in heterogeneous
`wireless networks.
`
`
`ACKNOWLEDGMENT
`The contribution is a part of an ongoing research in WP2
`of SWACOM project, funded by The Research Council of
`Norway. The authors would like to acknowledge the
`contributions and supports provided by their colleagues
`from UniK, Kjeller and Telenor R&D, Fornebu, Norway.
`
`[4]
`
`[3]
`
`REFERENCES
`[1] Telecommunication Statistics, “OECD key ICT indicator”,
`http://www.oecd.org/
`[2] D. Hardt, “Identity 2.0”, OSCON 2005,
`http://www.identity20.com/media/OSCON2005/
`J. Noll, J.C. Lopez Calvet, K. Myksvoll, “Admittance services
`through mobile phone short messages”, Proceedings of the
`International Conference on Wireless and Mobile Communications
`ICWMC’06, July 29-31, 2006, Bucharest.
`J. Noll, “Services and applications in future wireless networks”, in the
`press, Telektronikk, Q4/2006.
`[5] RSA Security, http://www.rsasecurity.com/
`[6]
`J. Noll, U. Carlsen, G. Kalman, “License transfer mechanisms through
`seamless SIM authentication”, International Conference on Wireless
`Information Systems, Winsys 2006, 7.-10. August 2006, Setubal,
`Portugal.
`[7] K. Cameron, “The Laws of Identity”,
`http://www.identityblog.com/?page_id0354
`[8] The Simple eXtensible Identity Protocol, Sxip,
`http://sxip.net/downloads/sxip2-overview.pdf
`[9] Windows Cardspace,
`http://msdn.microsoft.com/winfx/reference/infocard/default.aspx
`[10] Gemalto, a leading digital security provider, http://www.gemalto.com/
`[11] Senthil Sengodan, “On secure mobile identity provisioning”, Wireless
`World Research Forum Meeting 15, 08-09 December 2005, Paris,
`France.
`
`
`
`
`
`
`
`
`
`
`
`
`CARDWARE EXHIBIT 2031, Page 4 of 5
`SAMSUNG V. CARDWARE PGR2023-00013
`
`

`

`
`
`5
`
`Mohammad M. R. Chowdhury is Ph. D. student at the University
`Graduate Center at Kjeller, Norway (UniK) in the area of User Mobility and
`Service Continuity. He received his M. Sc. from Helsinki University of
`Technology in Radio Communication.
` His current areas of interest are identity and identity based service
`interactions, seamless user experience in heterogeneous wireless networks
`and development of innovative service concepts for mobile operators.
`
`Josef Noll is Prof. stip. at the University Graduate Center at Kjeller,
`Norway (UniK) in the area of Mobile Systems. He is also Senior Advisor in
`Telenor R&D in the Product and Market groups, and Senior Advisor in
`Movation. He received his Ph. D. from University of Bochum (D), worked
`for European Space Agency at ESTEC from 1991-1997, and from 1997-
`2005 at Telenor R&D.
` His working areas of include mobile authentication, wireless broadband
`access, personalized services, mobile-fixed integration, and the evolution to
`4G system.
`
`
`
`CARDWARE EXHIBIT 2031, Page 5 of 5
`SAMSUNG V. CARDWARE PGR2023-00013
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket