Amazon Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 8 May 2009

Thoughts on managed ID services by mobile operators

Posted on 01:32 by Unknown
Over the last couple of years, I have regularly heard discussion about the possibility of mobile operators providing "managed ID" services to either businesses or consumers. It's something I haven't really delved into in depth, but I've generally thought it makes a fair amount of sense in some circumstances, especially for the corporate market where employees may need ID cards or other forms of secure logon.

I hadn't really thought about the options for massmarket consumers until seeing a couple of presentations and panel discussions at yesterday's Telco 2.0 brainstorm in Nice. I'm now less certain about the whole thing.

Orange presented the notion of becoming like an individual's bank, trusted to store digital content, provide single log-on capabilities and so forth, "for their whole life". Insofar as I could make out however, this was all tied to the individual maintaining an Orange access connection (SIM, fixed broadband etc).

This is utterly unrealistic. I can't imagine that any sane person would want to lock themselves into a mobile or fixed access provider for life. Why would you want to entrust your photos, or music or digital signature to a company that actively prevents you from churning if you just want to get an exclusive phone offered by another operator?

I think that any link between identity management and access will lead to a complete erosion of trust. Loyalty is not the same as lock-in: it is earned, not enforced. This is something that telcos (especially mobile ones) tend to ignore. I keep hearing terms like "stickiness" in discussions about churn reduction, which is a codeword for lock-in. This is a surefire way for customer dissatisfaction, and you can bet that when the beleagured punter finally extricates himself from his contract with his data, he'll shout it from the rooftops.

I caused a fair amount of consternation by asserting that I trust my bank and Google more with my data than my main mobile operator (O2 in my case) or the UK government.

Over coffee, a representative of a vendor asked me why I don't trust operators with personal data - and why I trust Google more. My answers were:
(a) they already spam me through SMS and post;
(b) I actually don't know where O2's ownership of my data ends and Carphone Warehouse begins. I get bills from CPW, but I'm on the O2 network.
(c) Operators (and governments) frequently outsource their IT to other companies. If they don't trust themselves to hold my data, why should I trust them?
(d) I know that operators pursue aggressive lock-in strategies, which makes me very wary of falling into the traps
(e) I know that there is a reasonable chance I'll want to churn at some point, and I see no reason to make my decision harder. What happens if Vodafone gets an exclusive on a particular handset I want?
(f) There's no bilateralism in identity management, which points to arrogance and closed behaviour. If operators believe that ID can be provided by third parties as a managed service, then operators should also buy into the concept for inbound ID as well as outbound. I'm not aware of being able to register on a cellular network with a BT or Deutsche Telekom managed identity, much less a Google or Skype ID

Overall, I still think there's scope for providing ID and authentication services as part of the Telco2.0 / two-sided business model concept. But I don't buy the pitch of consumer, massmarket "escrow" of personal data.

(Obviously, I trust the Government even less. I'd much rather have O2 manage my ID than the Home Secretary. SIMs are more secure, cheaper and better-managed than the UK's ridiculous Stalinist ID card system).
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Quick musing on Cloud Computing
    I just heard the phrase "Everything as a Service" during a presentation on Cloud, SaaS and other forms of managed service offering...
  • Apple, embedded SIMs, NFC and mobile payments - some speculation
    I wonder if I've just managed to join up the dots on something rather important: - Recent reports suggest that Apple is intending to use...
  • New Cisco VNI traffic report out
    One of the broadband industry's "bibles" has been published in a 2010 edition . Cisco's "Visual Networking Index...
  • Is the MID a market?
    MIDs (Mobile Internet Devices) are being pushed by some notebook OEMs and silicon suppliers as the next big convergent handheld category. I...
  • "You can't use my eyeballs for free"
    Let's look forward 10 years. We've all got augmented reality browsers on our handsets, or perhaps our 4G-connected sunglasses. They ...
  • Mobile traffic management - the Inter-technology war begins
    I've been following the proliferation of mobile broadband traffic management technologies for some considerable time now, having publish...
  • Pre-MWC notes for analyst relations staff
    OK, it's the time of the year when I get bombarded by emails and phone calls from a million people inviting me to briefings and similar ...
  • Mobile operators' future voice strategies decoded
    Apologies in advance, but this blog post is deliberately a bit of a tease. I'm not going to spell out the answer here, as it's too v...
  • Hosted mobile services in the recession - Caveat Emptor
    I used to work as an equity analyst at an investment bank back in 2000-2001. I remember an unending stream of first generation Application S...
  • Challenges in measuring offload volumes
    I suspect we're going to get bombarded with statistics in the next year, along the lines of "Operator X deployed Vendor Y's off...

Blog Archive

  • ►  2013 (31)
    • ►  October (2)
    • ►  September (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (5)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (46)
    • ►  December (5)
    • ►  November (4)
    • ►  October (3)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (1)
    • ►  May (6)
    • ►  April (4)
    • ►  March (1)
    • ►  February (9)
    • ►  January (4)
  • ►  2011 (73)
    • ►  December (4)
    • ►  November (10)
    • ►  October (8)
    • ►  September (6)
    • ►  August (3)
    • ►  July (5)
    • ►  June (7)
    • ►  May (9)
    • ►  April (4)
    • ►  March (7)
    • ►  February (6)
    • ►  January (4)
  • ►  2010 (130)
    • ►  December (4)
    • ►  November (10)
    • ►  October (10)
    • ►  September (6)
    • ►  August (9)
    • ►  July (7)
    • ►  June (19)
    • ►  May (19)
    • ►  April (11)
    • ►  March (18)
    • ►  February (7)
    • ►  January (10)
  • ▼  2009 (126)
    • ►  December (4)
    • ►  November (14)
    • ►  October (9)
    • ►  September (8)
    • ►  August (9)
    • ►  July (10)
    • ►  June (21)
    • ▼  May (14)
      • Mobile broadband - a lack of loyalty built-in?
      • Does the mobile network standards process inhibit ...
      • Upcoming events - Open Mobile Summit and WiMAX Forum
      • LTE for heavy mobile broadband users? A paradox
      • LTE, mobile broadband & SMS - VoLGA vs. IMS
      • Evolved Packet Core in LTE
      • Are there risks associated with an LTE "monoculture"?
      • Microsoft - bearer-aware applications are the way ...
      • At the LTE Summit. With a herd of elephants in the...
      • Can mobile operators revenue-share with handset ve...
      • Piracy, Net Neutrality & DPI - Imminent Failure
      • Thoughts on managed ID services by mobile operators
      • Ubiquisys and Intrinsyc - femto-aware Android phones
      • Reconnecting again!
    • ►  April (2)
    • ►  March (11)
    • ►  February (15)
    • ►  January (9)
  • ►  2008 (94)
    • ►  December (24)
    • ►  November (26)
    • ►  October (25)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile