Use of authentication services at mobile networks. If identification is solved anything including payment systems can easily be built in the electronic cloud.
2. WhyAuthentication? ADSL SubscriberGrowth in 5 YearsX13 %24 of theworld is connected Increase in numberof servicesonline Increase of value of time Cost of transportationandwork time Username & Password is inadequate
3. Face 2 FaceIdentification Face, mimics & tone of voice Emotionalattitudes Interaction Digitalworlddoesn’tprovidetoolstocompensatethese
Kullanıcı ismi ve şifre çalındığında çalındığının farkına varmıyoruzKişiler her hesaba ait kullanıcı ismi ve şifreyi hatırlamakta yetersiz kalıyor
“Justtogiveyou an understanding on wherewe can extendtheuse of thistechnology; We can helpbanksgetrid of thedistributionandcost of ATM cards in additionbringingextra security againstcardskimmers…. Accessing ATM with m-signature. Orsigning an invoice. Theseare not Technologies of tommorrow. Thesearerealities of today. I can withdraw Money fromover 3000 ATMswithoutusinganycard. I justneedmy m-signatureactivatedhandset. Andourbillingdepartment is sending roaming billsto T-mobile over Internet gainingvaluable time andadvantage.”