Category: Blog

SIM-less authentication

The “SIM-less” in this context is a collection of all those techniques that do not use a SIM as a secure tamper proof hardware to implement the place for running the secure element function with a precisely known runtime environment.

Mobile ID using Faster Bearers

Some people have questioned if the SMS bearer provides a good user experience and if it is based on a long term technology for Mobile ID. In this blog we try to study this issue and what improvements other wireless communication

Tagged with: , , , ,

In Layman’s Terms – Alauda Applet Signature Algorithm

Kirmo Hovinmaa, technical writer The Internet has forced us humans to rethink communication on a fundamental level. The convenience of being able to exchange ideas without necessarily seeing each other face to face or even being on the same continent

Tagged with: , , , , , , ,

MSSP Performance Testing (2/2)

This blog post is follow up for our MSSP Performance Testing post earlier this year.  Test Results – First Round The first tests we run were focused on the number of CPU cores. Does limiting the core count reduce performance

Tagged with: , ,

Global Telecommunications Study: Navigating the Road to 2020

The 2015 Global Telecommunications Study has been conducted by EY. It gives a first hand industry perspective to the telco market. “The telco of 2020 cannot be a bad copy of the telco of 2015.” The report collects the outputs

Tagged with: , ,

MSSP Performance Testing (1/2)

We recently bought a new Proliant server for running performance tests and now we can dedicate one server for testing only. The problem was defining and setting up an optimal test environment on said server. Our requirements for the test

Tagged with: , , , , ,

MSS Roaming

In Mobile Signature Service (MSS), messages are routed between Mobile Signature Service Providers (MSSPs). Interconnected MSSPs are called a Mesh. The point of interconnecting MSSPs is that Application Providers (APs) can reach any Mobile User that’s connected to any of the

Tagged with: , , , ,

SHA-1 is no longer to be considered Secure

Abstract: The long expected (by cryptographers) news is that it is becoming moderately cheap to find collisions on SHA-1 hash algorithm. Current cost estimate is $75k – $120k of Amazon EC2 CPU/GPU resources, and this cost is expected to go down

Tagged with: ,

Methics has moved

We moved office from Kaisaniemi, Helsinki to Tapiola, Espoo last week. The moving was hectic but the dust is finally settling down. Instead of city roofs, we now see leaves: Our new address is: Methics Oy Kimmeltie 1 (1st floor)

Tagged with: ,

Article about the Finnish MSS by Dr. Esa Kerttula

This summer Dr. Esa Kerttula published an article about the Finnish MSS called “A novel federated strong mobile signature service—The Finnish case“. Esa has studied Finnish national solution for using strong authentication for public services. In his article, Esa “describes the legal

Tagged with: , , ,
Top