Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (658)
    • Manfred Kube (113)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (32)
    • Maria Barbieri (30)
    • Kristel Teyras (24)
    • Xavier Larduinat (21)
    • Haider Iqbal (21)
    • Neville Pattinson (20)
    • Sebastien Violette (20)
    • Frederic Martinez (20)
    • Sophie Bessin-Py (19)
    • John Ahlberg (19)
    • Ken Abbott (19)
    • Brittany Jedrzejewski (18)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Sek Leong (12)
    • Jennifer Hindle (12)
    • Axel Hansmann (10)
    • Sharon Ginga (10)
    • Cecile Eurendjian (10)
    • Christian Hartwigsson (8)
    • Kim Depussé (8)

    Latest blog posts by:

    • Kristel TeyrasKristel Teyras
    • Paul KobosPaul Kobos
    • Isabelle LodoIsabelle Lodo
    • Jennifer DeanJennifer Dean
    • Sharon GingaSharon Ginga
    • Alex HanwayAlex Hanway
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 04 September 2019 by Didier Benkoel-Adechy in Mobile

How AI and advanced analytics can further position MNOs as Trusted Digital ID service providers

Last updated: 05 September 2019

In the world we live in today we have a range of different digital identities that permit us to use a wide variety of online services. In most cases your digital identity is simply the email address you choose to provide and a secure password. Although this is a perfectly adequate requirement in these cases, it reveals less about your real identity and therefore is more vulnerable to being accessed by someone pretending to be you. However, there are circumstances, such as when accessing services like banking, or an enterprise’s resources remotely, where it’s critical to ensure that you have a trusted digital identity to prove you are who you are claiming to be online and that you have the right to access those services.

Mobile Network Operators (MNOs) and more generally Communication Service Providers (CSPs), already hold plenty of valuable information about their customers. Your mobile network, for example, will already have obtained information such as your name, date of birth, billing information, and mobile device type, when you signed up for a contract.

Given the advantageous position MNOs find themselves in, there are two ways they can play a key role as a trusted digital ID service provider, a role which benefits both their own customers, as well as other industries and governments who need to use Trusted Digital Identities for security-sensitive transactions.

  1. Digitalization of subscribers’ enrollment process

As the shift towards digital identification systems continue, MNOs are looking to digitize the enrollment process by capturing and verifying ID documents and biometrics. Not only does this process more effectively fight fraud, it also improves user experience.

Once this process is complete, the MNOs can aggregate all the verified data it holds and create trusted digital identities using static attributes, such as demography and biometrics. Together these characteristics can then serve as a gateway for subscribers to seamlessly and securely authenticate to access multiple security-sensitive services such as mobile money, eGov, online banking, mobile gambling and more generally all services that require strong ID verification procedures (such as Know Your Customer –KYC- and the UK Gambling Commission).

MNOs, therefore, have a crucial role in facilitating and accelerating the digital transformation of industries and government. This is because by committing to creating trusted digital IDs they remove the need for multiple institutions to produce their own separate trusted digital ID’s for their customers or citizens. What’s more, as MNOs have such a global reach their impact on creating trusted digital identities across the world could be exceptional.

  1. Aggregation of ID intelligence data

AI and advanced analytics can also greatly enhance the capability of MNOs to become a Trusted Digital ID service provider. This technology is already in use across the industry to provide drastic improvements in marketing insights, in order to tailor the products that MNOs offer, and for telecom network analysis. However, this technology can also be applied for intelligence driven user authentication, by gathering a collection of dynamic attributes together to offer real-time identification through many data points.

AI and machine learning analyze both user behavior and environmental patterns. Examples of the multitude of data points that can be analyzed include: the geolocation, the typing patterns of users with their mobile devices, app usage, network usage, browsing patterns and the surrounding signals like Bluetooth, and Wi-Fi. This behavioral biometric data can then be used for risk management, whenever authentication services are required. This is a kind of silent authentication.

Put simply, AI, machine learning and Big Data would be able to tell the likelihood of fraud based on the nature of characteristics of a transaction. This adds another layer of security for users.

Risk management analysis use cases

It is quite easy to see how this risk management analysis could be applied to the banking sector – a transaction unexpectedly made far away from the country you live in would require more authentication to check its legitimacy. What’s more, with the revised Payment Service Directive (PSD2) requiring financial institutions to adapt security measures to review the level of risk involved in every transaction made, fighting fraud using MNO Trusted Digital Identity solutions would be a way to help solve this problem.

In addition to this, the GMSA have also listed a set of steps MNOs can take to reduce the level of account takeovers and help prevent fraud. This highlights the importance of the role of MNOs in identifying high-risk sessions and assisting in Account Takeover Protection.

However, not only does this type of risk management aid the banking industry, it also works well in the enterprise sector for employees who want to access company resources, such as VPN or the cloud, remotely. Here, information such as geolocation and the types of network used for accessing the internal services or resources, can be used to evaluate how likely it is that the person wishing to have access to service is who they say they are. This adds another layer of non-intrusive security for the business and users.

When discussing any topic that involves the use of people’s personal data it is always important to make it clear that in order to be put in place, this process would have to meet all the necessary data privacy regulations across the world, such as GDPR in Europe. There would also have to be different specifications needed for each country. Consumers would need to be confident that they were in control of their data and could easily opt out if they didn’t want to be involved.

Beyond the Trusted Digital ID of individuals – the Trusted Digital ID of Things (IoT)

Looking to the future, the new generation of 5G networks will enable for the tremendous growth of connected objects that will interact with each other and individuals (projected by Juniper Research to reach an installed base of 64 billion units in 2023).

As is the case with people, connected objects will also need a trusted digital identity to be securely identified. Once a connected object has this trusted digital ID it can be enrolled and linked to its owner seamlessly and securely. In this way trusted digital IDs of people and object can become inherently linked, for example, commercial drones to their pilot.

With the data that MNOs have they could also help in this sphere, using existing technologies, such as eSIM management solutions, to pair up their subscribers with their objects. As the number of connected objects in the world booms, Big data, A.I and machine learning solutions will be essential to analyze and process the swell of the data that accompanies this growth and detect any anomalies.

If you want to know more about our Trusted Digital ID and AI solutions for MNOs, click on the links above.

What’s your perspective on the role of MNOs in providing Trusted Digital Identities? How do you envisage the future of digital identity? Let us know by tweeting to us at @GemaltoMobile, or by posting a comment below.

Related posts:

OCSI Certifies SafeNet Luna PCIe Cryptographic Module for Use as…

Posted on 02 August 2018 by Gemalto in Corporate

The Italian Organismo di Certificazione della Sicurezza Informatica (OCSI) certified the SafeNet Luna PCIe Cryptographic Module 6.10.9 when embedded within a SafeNet Luna Network HSM 6 “SafeNet Luna HSM 6”…

PSD2 and a new reality in European banking

Posted on 22 December 2017 by Emilie Casteran in Corporate

Now that the Regulatory Technical Standards for PSD2 have been agreed, it’s time for the European banking sector to get prepared

Who will win the driverless car race?

Posted on 02 April 2013 by Axel Hansmann in Corporate

Let’s play a game of word association. What springs to mind when you hear ‘driverless cars’? Let me guess: Google. Did you know, however, that there are many other brands…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2023 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy