4. THE NEW MODEL
Fast IDentity Online
online authentication using
public key cryptography
THE FIDO
PARADIGM
Poor Easy
WeakStrong
USABILITY
SECURITY
All Rights Reserved. FIDO Alliance. Copyright 2016.
HOW “Shared Secrets” WORK
ONLINE
The user authenticates
themselves online by presenting a
human-readable “shared secret”
HOW FIDO WORKS
AUTHENTICATOR
LOCAL ONLINE
The user authenticates
“locally” to their device
(by various means)
The device authenticates
the user online using
public key cryptography
All Rights Reserved. FIDO Alliance. Copyright 2016.
FIDO認証モデル
公開鍵暗号方式を活用した
オンライン認証
セキュリティと
使い勝手の両立をめざす
「共有の秘密」は不正アクセスの原因 FIDO認証モデルでは「秘密」が共有されず、安心
FIDO認証器
生体情報 秘密鍵 公開鍵ID・パスワード
16. 16
NTT DOCOMO Rolls Out FIDO Biometric Authentication to iOS Customers
Underscores rapid market adoption of FIDO as the new standard for strong authentication
Mountain View, Calif., March 7, 2016 – The FIDO® Alliance, the cross-industry creators of open standards for simpler, stronger authentication, announced
today that Japan’s largest mobile network operator NTT DOCOMO, INC. (“DOCOMO”) has extended its market-leading deployment of FIDO® Certified strong
authentication to its millions of customers with Touch ID®-equipped Apple iPhones and other iOS(1) devices. DOCOMO adds this new FIDO-for-iOS capability to
an already impressive suite of 10 FIDO Certified Android devices from Samsung, Fujitsu, Sharp, and Sony Mobile, ensuring that their customers enjoy
unprecedented choice between platforms, devices and biometric authentication modalities including fingerprint touch, fingerprint swipe, and iris recognition.
(1) iOS 9 or later
DOCOMO’s decision to add support for FIDO strong authentication to the base capabilities of Touch ID underscores both the security benefits and the rapid
market adoption of FIDO standards in just over a year since the specifications were published. Today more than 100 solutions have been FIDO Certified and, in
addition to DOCOMO, hundreds of millions of end-users’ web and mobile apps have been FIDO-enabled for strong authentication protection by leading service
providers, including Google, PayPal, Samsung, Bank of America, Dropbox, and GitHub.
“The expansion of cross-platform support from NTT DOCOMO highlights the growing global consensus that using open standards from FIDO Alliance is the right
strategy for moving the connected economy off its dependency on passwords,” said Brett McDowell, executive director of the FIDO Alliance. “As more service
providers look to reduce fraud risk and give customers a better, faster user experience, I believe they will be following DOCOMO’s example and deploying cross-
platform FIDO-enabled, privacy-respecting biometric authentication that is simultaneously more secure and convenient.”
More details on DOCOMO’s FIDO-for-iOS deployment
Using FIDO specifications, DOCOMO is enabling its customers to securely authenticate themselves with Touch ID instead of a password to the DOCOMO d
ACCOUNT™ app, which will be available in the App Store on March 9. From there, they will have secure access to DOCOMO account details, billing and services,
including mobile gaming and music platforms d game™ and d music™, and shopping sites such as d delivery™ and d shopping™. DOCOMO is also removing the
password from carrier billing, allowing customers to approve their payments via Touch ID.
In a media update about this news, DOCOMO said, “The app will encourage more DOCOMO partner companies to incorporate the FIDO standard as users
demand biometric authentication for an increasingly diverse range of mobile handsets.”
“d ACCOUNT,” “d game,” “d music,” “d delivery,” and “d shopping” are trademarks or registered trademarks of NTT DOCOMO, INC. NTT DOCOMO’s “d ACCOUNT,” “d delivery” and “d shopping” services are only
available to subscribers in Japan.
Touch ID is a registered trademark of Apple, Inc.
iOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license.
Android is a trademark or registered trademark of Google, Inc.
Media Contact
Megan Shamas
Montner Tech PR 203-226-9290
mshamas@montner.com
When DOCOMO started to consider FIDO-enabled devices and services deployment, Android OS didn’t support any FIDO related APIs and capabilities; therefore, DOCOMO defines device requirements, and collaborated with OEMs and partners. e.g. Qualcomm and Nok Nok Labs.
When DOCOMO started to consider FIDO-enabled devices and services deployment, Android OS didn’t support any FIDO related APIs and capabilities; therefore, DOCOMO defines device requirements, and collaborated with OEMs and partners. e.g. Qualcomm and Nok Nok Labs.
When DOCOMO started to consider FIDO-enabled devices and services deployment, Android OS didn’t support any FIDO related APIs and capabilities; therefore, DOCOMO defines device requirements, and collaborated with OEMs and partners. e.g. Qualcomm and Nok Nok Labs.
When DOCOMO started to consider FIDO-enabled devices and services deployment, Android OS didn’t support any FIDO related APIs and capabilities; therefore, DOCOMO defines device requirements, and collaborated with OEMs and partners. e.g. Qualcomm and Nok Nok Labs.
When DOCOMO started to consider FIDO-enabled devices and services deployment, Android OS didn’t support any FIDO related APIs and capabilities; therefore, DOCOMO defines device requirements, and collaborated with OEMs and partners. e.g. Qualcomm and Nok Nok Labs.