Contents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv
|
|
- Gordon Freeman
- 5 years ago
- Views:
Transcription
1 Preface xv Acknowledgments. xxiii List of Acronyms i xxv 1 Executive Summary Towards NFC Era Ubiquitous Computing Mobile Phones Technological Motivation of NFC Wireless Communication, RFID, andnfc Evolution of NFC Earlier Form of RFID: Barcode Technology RFID Technology Earlier Form of Smart Cards: Magnetic Stripe Cards Smart Card Technology NFC as a New Technology NFC Essentials Smart NFC Devices Standardization of NFC Enabled Mobile Phones General Architecture of NFC Enabled Mobile Phones Near Field Communication Inteiface and Protocol (NFCIP) NFC Operating Modes and Essentials NFC Operating Modes Reader/Writer Mode Essentials Peer-tO'Peer Mode Essentials Card Emulation Mode Essentials Case Studies SE and Its Management Over-the-Air Technology GlobalPlatform Card Specification Trusted Service Manager UICC Management Models Multiple SE Environments 16
2 viii Contents 1.6 NFC Application Development JSR JSR NFC Security and Privacy Why is Security Important? Primary Goals of Security Measures 20 I.7J Vulnerability, Threat, Attack, anclrisk Security Tools and Mechanisms NFC Security Privacy, Legal, and Ethical Aspects NFC Business Ecosystem Stakeholders in NFC Ecosystem Understanding NFC Business Models ' Business Model Approaches Usability in NFC Benefits of NFC Applications Future Scenarios on NFC NFC Throughout the World NFC Cities NFC Trials and Projects Status of Academic Research on NFC Literature Chapter Summary 39 References 39 2 Towards NFC Era Ubiquitous Computing and NFC Ubiquitous Computing New Communication Interface Alternative for Mobile Phones: NFC Technology Mobile Phones Features of a Mobile Phone Mobile Phone Network Mobile Phone Architecture Wireless Communication as a Communication Media for NFC Technology Wireless, Mobile, and Nomadic Communication Wireless and Mobile Communication Technologies RFID Technology Earlier Form of RFID: Barcode Technology Barcodes vs. RFID Tags Essentials of RFID Technology RFID Tags as Transponders RFID Readers Frec/uency Ranges Operating Principles of RFID Technology Near Field vs. Far Field Transmission Common RFID Applications Throughout the World 58
3 ix 2.5 Smait Card Technology Earlier Form of Smart Card: Magnetic Stripe Cards Evolution of Smart Cards Types of Smart Cards: Capability Based Classification Smart Card Operating System (SCOS) Types of Smart Cards: Mechanism Based Classification 63 2.J.6 Smart Card Applications Comparison between RFID Tags and Contactless Smart Cards More on NFC J Inherent Security and Pairing Capability of NFC Chapter Summary 70 Chapter Questions 71 References 71 3 NFC Essentials Introduction to NFC ' Standardization and Development Efforts of NFC Enabled Mobile Phones NFC Forum GlobalPlatform GSM Association (GSMA) International Organization for Standardization (ISO)IInternational Electrotechnical Commission (lec) ECMA International ETSI and ETSI Smart Card Platform (ETSISCP) lava Community Process (TCP) Open Mobile Alliance (OMA) rd Generation Partnership Project (3GPP) EMVCo General Architecture of NFC Enabled Mobile Phones Secure Element NFC Interface Interface between SE andnfc Controller Host Controller and HCI Physical Layer of NFC ISOIIEC Proximity Contactless Smart Card Standard Near Field Communication Interface and Protocol (NFCIP) Data Transmission on RF Layer ReaderAVriter Operating Mode Essentials Protocol Stack Architecture of Reader/Writer Mode NFC Forum Mandated Tag Types NDEF 102 3,5 Peer-to-Peer Operating Mode Essentials Protocol Stack Architecture of Pecr-to-Peer Mode LLCP Card Emulation Operating Mode Essentials Protocol Stack Architecture of Card Emulation Mode 111
4 X Contents 3.8 Chapter Summary 112 Chapter Questions 113 References NFC Operating Modes H5 4.1 Mobile Interaction Techniques 115 4J.1 NFC Technology Interaction Technique Classification of NFC Devices Active vs. Passive Devices Initiator vs. Target Devices ReaderAVriter Mode Smart Poster Generic Usage Model Leading Applications Use Cases on Reader/Writer Mode Underlying Application Benefits Peer-to-Peer Mode Generic Usage Model Leading Applications Use Cases on Peer-to-Peer Mode Underlying Application Benefits Card Emulation Mode Generic Usage Model Leading Applications Use Ca.'ies on Card Emulation Mode Underlying Application Benefits Overview on Benefits of Operating Modes Case Studies Reader/Writer Mode Case Study: NFC Shopping Peer-to-Peer Mode Case Study: NFC Gossiping Card Emulation Mode Case Study: NFC Ticketing ' ^ Chapter Summary 148 Chapter Questions 148 References Developing NFC Applications Initial Steps in NFC Application Development Why Java? / Why did we Choose.lava? Why is Java the Favorite? Setting up the Environment for Java ME and NFC Programming Introduction to Mobile Programing Java ME Building Blocks MIDlets Package javax.microedition.lcdui Creating a New MlDlet Project 165
5 xi Inside a MIDlet Suite (MIDIet Packaging) A More Detailed User Interface MIDlet Push Registry Ml 5.5 NFC Application Development Reader/Writer Mode Programing Package javax.microedition.contactless Package javax.microedition.contactless.ndef Package javax.microedition.contactless.rf Package javax.microedition.contactless.se A Reader/Writer Mode Application NFC Push Registry Peer-to-Peer Mode Programing Package com.nokia.nfc.p2p ^ Package com.nokia.nfc.llcp. ' A Peer-to-Peer Mode Application _ Card Emulation Mode Programing ' Acces.sing Secure Element Using JSR Accessing Secure Element Using JSR Reader/Writer Mode Case Study: NFC Shopping Peer-to-Peer Mode Case Study: NFC Gossiping Chapter Summary 236 Chapter Questions 238 References NFC Security and Privacy Security in General Why is Security Important? Primaiy Goals of Security Measures Vulnerability, Threat, Attack, and Risk Principles of Security Security Tools and Mechanisms Cryptography Symmetric Cryptography Asymmetric Cryptography Hashing Message Authentication Code (MAC) and HMAC Digital Signature and Mobile Signature Comparing Security Mechanisms Digital Certificates and Certificate Authority Do Not Keep Ciyptographic Algorithms Secret Key Types: Symmetric Key, Private Key, Public Key, Master Key, and Session Key Key Management and its Importance ,72 WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) Other Security Components 264
6 6.3 NFC Security Framework Security Jssues on NFC Tag Security Issues on NFC Reader Security Issues on Smart Card Security Issues on Communication Middleware and Backend System Security Standardized NFC Security Protocols Privacy, Legal, and Ethical Aspects ft is a Different World Some Examples on Privacy Issues Summary on Privacy and Countermeasures Some Proposals for Providing Privacy on Tags What to do for Protecting Privacy Chapter Summary 281 Chapter Questions 282 References NFC Business Ecosystem Business Ecosystem Generic Features of a Business Ecosystem Business Ecosystem of NFC Stakeholders in NFC Ecosystem Standardization Bodies and Other Contributors NFC Chip Set Manufacturers and Suppliers Secure Element Manufacturers and Suppliers Mobile Handset Manufacturers and Suppliers Reader Manufacturers and Suppliers Mobile Network Operators Trusted Service Managers Sen-ice Providers Merchants/Retailers Customers Business Models Key Indicators in NFC Business Models Business Model Alternatives General Revenue!Expenditure Flow Model Case Study: NFC Ticketing Additional Reading: Pay-Buy-Mobile Project by GSMA Chapter Summary 308 Chapter Questions 309 References Secure Element Management Introduction to OTA Technology / OTA Technology and Mobile Device Management OTA Technology and UICC Based SEs 313
7 xiii 8.2 GlobalPlatform Specifications GlobalPlatform Card Specification GlobalPlatform Messaging Specification Life Cycle Management of SEs TSM in NFC Environment Actors and Their Functional Roles in GlobalPlatform UICC Based SE: Security Domains and Hierarchy UICC Management Models Multiple SE Environments Architecture without Aggregation Architecture with Aggregation Alternative TSM Based OTA Management Model Chapter Summary 328 Chapter Questions,., ' 329 References ' NFC Cities and Trials NFC Cities CityofOulu City of Nice Smart Urban Spaces NFC Trials and Projects Contactless Payment Trials Transport and Other Ticketing Trials Other Trials Chapter Summary 349 References 349 Index 351 it
GSM Association (GSMA) Mobile Ticketing Initiative
GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative
More informationNFC is the double click in the internet of the things
NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationAttacks on NFC enabled phones and their countermeasures
Attacks on NFC enabled phones and their countermeasures Arpit Jain: 113050028 September 3, 2012 Philosophy This survey explains NFC, its utility in real world, various attacks possible in NFC enabled phones
More informationNFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee
NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee September 2009 Agenda Review of Use Cases Architecture Overview Relationship to Other Standards Status of NFC Forum
More informationA Role-Based Service Level NFC Ecosystem Model
A Role-Based Service Level NFC Ecosystem Model Kerem Ok, Vedat Coskun, Busra Ozdenizci, Mehmet N. Aydin This is the author copy of the paper " A Role-Based Service Level NFC Ecosystem Model". For the latest
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationNFC Forum Specifications to Build Solutions and Ensure the Global Interoperability of NFC. John Hillan Qualcomm (UK) Ltd. Chair, Technical Committee
NFC Forum Specifications to Build Solutions and Ensure the Global Interoperability of NFC John Hillan Qualcomm (UK) Ltd. Chair, Technical Committee 28th September, 2012 NFC Forum Mission and Goals The
More informationSecure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices
Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION (GUIDED BY:MISS ANUJA V NAIR) BY: REJOY MENDEZ ROLL NO:24 S7 ECE OVERVIEW INTRODUCTION FEATURES OF NFC TECHNOLOGICAL OVERVIEW COMPARISON WITH OTHER TECHNOLOGY SECURITY ASPECTS
More informationPractical Attack Scenarios on Secure Element-enabled Mobile Devices
Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March
More informationMobile Security Fall 2014
Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate
More informationSpecifications and Application Documents. Laurent Sourgen NFC Forum Board Member STMicroelectronics
Specifications and Application Documents Laurent Sourgen NFC Forum Board Member STMicroelectronics April 13, 2012 NFC Forum Architecture Reader/Writer Mode 2 NFC Forum Architecture Reference Applications
More informationMobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010
Mobile NFC Services Opportunities & Challenges NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Agenda 1. Introduction 2. Mobile NFC Overview 3. NFC Ecosystem Key Findings 4. Main NFC challenges 5. What
More informationThe NFC Forum NFC Technology for Developers
The NFC Forum NFC Technology for Developers 7 October 2008 Audio Tips All audio comes through your computer Use your computer mixer to adjust master volume Use Webcast reader audio slide top center of
More informationMobile Payments Building the NFC Ecosystem
Mobile Payments Smart Card Alliance / NFC Forum Joint Workshop Building the NFC Ecosystem 2010 Smart Card Alliance Annual Conference Peter Preuss Nokia Chairman, NFC Forum Marketing Committee Cooperation
More informationIndustry-leading, 2 nd - generation NFC controller
NXP NFC controller PN544 for mobile phones and portable equipment Industry-leading, 2 nd - generation NFC controller This high-quality, high-performance NFC controller enables a new range of contactless
More informationSmart Tokens: Tags, smart phones and everything in between. Dr Gerhard Hancke Information Security Group
Smart Tokens: Tags, smart phones and everything in between Dr Gerhard Hancke Information Security Group 29.02.2012 Royal Holloway (RHUL) Royal Holloway founded in 1879 by Victorian entrepreneur Thomas
More informationRelay Attacks on Secure Elementenabled
Relay Attacks on Secure Elementenabled Mobile Devices Virtual Pickpocketing Revisited Michael Roland University of Applied Sciences Upper Austria,, Austria SEC2012 IFIP International Information Security
More informationDr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011
Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile
More informationHOW TO INTEGRATE NFC CONTROLLERS IN LINUX
HOW TO INTEGRATE NFC CONTROLLERS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 28/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th
More informationHAKI-NFC BASED ANDROID APPLICATION
HAKI-NFC BASED ANDROID APPLICATION JAIKISHAN KHATWANI 1, ABHISHEK SINGH 2, HRISHIKESH RANGDALE 3, KAMLESH JUWARE 4 & ISHAN ALONE 5 1,2,3,4&5 Department of Information Technology, Mumbai University, FR.
More informationA Secure and Practical Key Management Mechanism for NFC Read-Write Mode
Journal of Computational Information Systems 7: 11 (2011) 3819-3828 Available at http://www.jofcis.com A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen CHENG, Wen-Wei LIAO,
More informationPreface. Structure of the Book
When the first edition of this book was published back in 2008, the scope was anything to do with smart cards and security tokens in the widest sense. The aim was in fact to provide a complete story, looking
More informationSmart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen
Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the
More informationCurrent Benefits and Future Directions of NFC Services
Current Benefits and Future Directions of NFC Services Kerem Ok, Vedat Coskun, Mehmet N. Aydin, Busra Ozdenizci www.nfclab.com ISIK University, Istanbul ICEMT 2010 International Conference on Education
More informationA Secure and Practical Key Management Mechanism for NFC Read-Write Mode
A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information and Management, Chinese Culture University, Taipei,
More informationSMART CARDS. Miguel Monteiro FEUP / DEI
SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged
More informationA Novel Scheme for On-demand Distribution of Secure Element Keys
A Novel Scheme for On-demand Distribution of Secure Element Keys Vincent Alimi Normandie Univ, France UNICAEN, ENSICAEN, GREYC CNRS, UMR 6072 F-14032 Caen, France fvincent.alimi@ensicaen.fr ABSTRACT: The
More informationSoftware Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
More informationSecurity of NFC payments
Security of NFC payments Olga Korobova Department of Computer Science University of Massachusetts Amherst Abstract Our research objective was to examine the security features implemented by the bank cards
More informationA SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS
Technical report, IDE1062, Sept 2010 A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS Master s Thesis in Computer Systems Engineering IMHONTU, EROMON EMMANUEL & KUMAH, YAW OWUSU School of Information
More informationThe UICC. Recent Work of SCP and Related Security Aspects. Dr. Klaus Vedder Chairman ETSI TC SCP
The UICC Recent Work of SCP and Related Security Aspects Dr. Klaus Vedder Chairman ETSI TC SCP Footer text (edit in View : Header and Footer) 5 th ETSI Security WS Sophia Antipolis, France 20-22 January
More informationNEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD
Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION
More informationMobile/NFC Security Fundamentals. Secure Elements 101. Smart Card Alliance Webinar March 28, 2013
Mobile/NFC Security Fundamentals Secure Elements 101 Smart Card Alliance Webinar March 28, 2013 Introductions Brent Bowen, INSIDE Secure Chair, Mobile & NFC Council, Smart Card Alliance Mobile & NFC Council
More informationNFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC
NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC Learn all about NFC Session I, 15th March NFC applications and use cases https://attendee.gotowebinar.com/rt/1059402932312036099 Session II,
More informationNext steps for NFC and mobile wallets
Next steps for NFC and mobile wallets PSE Consulting Merchant Acquiring Conference Mike Hendry Payment Systems Consultant Mike Hendry Page 1 1 Next steps for NFC and mobile wallets State of the (dis-)
More informationAdvances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted
Type A/B GP TSM Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards The Osaifu-Keitai service currently being provided in Japan is based on the FeliCa *1 mobile
More informationSCOPE OF ACCREDITATION TO ISO/IEC 17025:2005
SCOPE OF ACCREDITATION TO ISO/IEC 17025:2005 DEKRA TESTING AND CERTIFICATION, S.A.U. Parque Tecnologico de Andalucia C/ Severo Ochoa 2 29590-Campanillas, Málaga, SPAIN Jose Maria Fernandez Phone: +34 952619100
More informationSecure Over-The-Air Services in NFC Ecosystems
Secure Over-The-Air Services in NFC Ecosystems Sirpa Nordlund Venyon Hagenberg March 20th, 2007 Contents of the presentation 1. Building up NFC ecosystem 2. Trusted third party and value proposition 3.
More informationFundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors
Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Automotive Identification Wireless Infrastructure Lighting Industrial Mobile Consumer Computing Global player with local
More informationDigital Signature Records for the NFC Data Exchange Format
Digital Signature Records for the NFC Data Exchange Format Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
More informationSEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop January 2011 Sophia Antipolis, France
www.europeanpaymentscouncil.eu SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop 2011 19-20 January 2011 Sophia Antipolis, France Global mobile subscribers (millions) Mobile phone: some statistics
More informationCurrent Benefits and Future Directions of NFC Services
Current Benefits and Future Directions of NFC Services Kerem OK, Vedat COSKUN, Mehmet N. AYDIN, and Busra OZDENIZCI Department of Information Technologies, ISIK University Istanbul, Turkey { keremok vedatcoskun
More informationDigital Signature Records for the NFC Data Exchange Format
Digital Signature Records for the NFC Data Exchange Format Michael Roland Upper Austria University of Applied Sciences,, Austria 2 nd International Workshop on Near Field Communication 20 April 2010, Monaco
More informationNFC in the PC environment
NFC in the PC environment Kurt Schmid March 2007 1 ITG within ASSA ABLOY A multi-national group Some 30,000 employees HQ: Stockholm, Sweden Global Technologies Group Entrance System Group Americas EMEA
More informationDie Zukunft des M-Payment The future of m-payment NFC. Andreas Johne. Düsseldorf, 25. Januar 2008
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationChapter 2 Basics. 2.1 Smartcards. This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards.
Chapter 2 Basics This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards. 2.1 Smartcards Smartcards are identification cards equipped with a microchip (integrated
More informationISG Seminar 3 rd November Agenda for Lecture. Smart Cards with Contacts. Contact-less Smart Cards. From Smart Cards to NFC Smart Phone Security
ISG Seminar 3 rd November 2011 From Smart Cards to NFC Smart Phone Security Keith Mayes ISG Smart Card Centre (SCC) www.scc.rhul.ac.uk www.isg.rhul.ac.uk keith.mayes@rhul.ac.uk Agenda for Lecture Evolution
More informationManaging an NFC Ecosystem
Managing an NFC Ecosystem Gerald Madlmayr NFC, ICMB 2008, Barcelona 1 NFC - What is it all about RFID Derivate 13,56 Mhz Integrated in mobile devices for consumer market Operating Modes Tag/SmartCard Emulation
More informationLinux NFC Subsystem. Lauro Ramos Venancio Samuel Ortiz 2011, September 9th
Lauro Ramos Venancio Samuel Ortiz 2011, September 9th What is NFC? NFC means Near Field Communication It is a short-range wireless communication It operates at 13.56 MHz Data rates from 106 kbits/s to
More informationNear Field Comunications
Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range
More informationMobile Identity Management
Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks
More informationSecurity Vulnerabilities of the NDEF Signature Record Type
Security Vulnerabilities of the NDEF Signature Record Type Michael Roland Upper Austria University it of Applied Sciences,, Austria 3 rd International Workshop on Near Field Communication 22 February 2011,,
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationNFC Forum News Conference. June 5, 2006
NFC Forum News Conference June 5, 2006 The NFC Forum: Who We Are and Where We Are Going Christophe Duverne, NFC Forum Chairman Philips Semiconductors Today s Agenda Introduction to the NFC Forum Christophe
More informationISO / NFC Standards and Specifications Overview. NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team
ISO / NFC Standards and Specifications Overview NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team HF RFID ISO STANDARDS HF RFID ISO Standards Overview The main worldwide accepted High
More informationST21NFCB. Near field communication controller. Features. RF communications. Hardware features. Communication interfaces. Electrical characteristics
Near field communication controller Data brief Features NFC operating modes supported: Card emulation Reader / Writer Peer-to-peer communication Hardware features FBGA WFBGA 64-pin 36 Kbytes of EEPROM
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationFixed-Mobile Wireless Networks Convergence
Fixed-Mobile Wireless Networks Convergence Technologies, Solutions, Services JOSEPH GHETIE X) jh CAMBRIDGE ЧЩР UNIVERSITY PRESS Contents Disclaimer How the Book is Organized List of Figures List of Tables
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationBusiness Models in Mobile NFC Services
+ Business Models in Mobile NFC Services Network-Approach to Service Development and Commercialization Per Andersson, Riikka Murto, Christopher Rosenqvist 19.10.2012 + Small project at Wireless@KTH, 2
More informationCYBERSECURITY AND SERVICE STATIONS
CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How
More informationClover Flex Security Policy
Clover Flex Security Policy Clover Flex Security Policy 1 Table of Contents Introduction General description Installation Guidance Visual Shielding Device Security Decommissioning Key Management System
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationPutting NFC Forum Specifications to Work
Putting NFC Forum Specifications to Work 16 March 2011 Moderator Ruth Cassidy PR Director NFC Forum ruth.cassidy@nfc-forum.org 2 Audio Tips Audio may come through your computer or you may call in Use your
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationBuilding Digital Key Solution for Automotive
Building Digital Key Solution for Automotive Content Overview Use Cases Unlocking Use Cases Key Provisioning Use Cases Key Sharing Use Cases Key Properties High Level Architecture and Related Standards
More informationWHAT FUTURE FOR CONTACTLESS CARD SECURITY?
WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues
More informationAdvances in NFC & Mobile Payments Trials and Technology
Smart Card Alliance 2006 Annual Conference Advances in NFC & Mobile Payments Trials and Technology Mohammad Khan President, ViVOtech October 3, 2006 T H E L Y D I A N R O U N D T A B L E ViVOtech We enable
More informationSmart Campus an Android and Web based Application using. IoT and NFC Technology
Smart Campus an Android and Web based Application using IoT and NFC Technology Shyam Ambilkar 1, Shivkumar Hegonde 1, Rutuja Therade 1, Surbhi Lingamwar 1 ------------------------------------------------------------------------------***------------------------------------------------------------------------------
More informationOverview RFID-Systems
Overview RFID-Systems MSE, Rumc, RFID, 1 References [1] Klaus Finkenzeller, RFID-Handbuch, 5. Auflage, Hanser, 2008. [2] R. Küng, M. Rupf, RFID-Blockkurs, ergänzende MSE-Veranstaltung, ZHAW, 2009. [3]
More informationAlpha Scanner Pro User manual
WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.
More informationConnecting to the future ELATEC RFID SYSTEMS
Connecting to the future ELATEC RFID SYSTEMS ELATEC GmbH Enabling success RFID SYSTEMS Focus on the goal Adaptable to our customer s requirements, Elatec products and technologies are the core that has
More informationSession 2: Understanding the payment ecosystem and the issues Visa Europe
Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said
More informationNFC in Japan and NFC Forum
NFC in Japan and NFC Forum Koichi Tagawa Sony Chairman, NFC Forum Meetup at NFC Solutions Summit 2012.05.23 What is NFC? 2 NFC is Uniquely Powerful 3 NFC - How Does it Work? Three Mandatory Communication
More informationInside Bluetooth Low Energy
Inside Bluetooth Low Energy Naresh Gupta BOSTON LONDON artechhouse.com Contents Preface Acknowledgments Foreword xix xxiii xxv Introduction 1 1.1 Introduction to Wireless Communication 1 1.2 Data Rates
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationForging the Link Between Global Interoperability and New Business Opportunities
Forging the Link Between Global Interoperability and New Business Opportunities Debbie Arnold Director, NFC Forum WIMA USA November 30, 2011 Marketplace Situation 2 NFC Forum Google Hits Awareness of NFCIncreasing
More informationSecurity on NFC-Enabled Platforms
Security on NFC-Enabled Platforms Building Trust in the New Mobile Applications Ecosystem Whitepaper www.infineon.com/nfc Content A New Stage in the Evolution of Personal Mobility 4-7 The Need for Hardware-based
More informationThe impact of NFC on multimodal social media application
Second International Workshop on Near Field Communication The impact of NFC on multimodal social media application Erkki Siira, Vili Törmänen VTT, Finland firstname.lastname@vtt.fi Abstract In this paper
More informationSmart Grid Communications and Networking
Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents
More informationMobile Payment Security
Mobile Payment Security What it means and how to implement it Macroeconomics of Mobile Money Columbia University Apr. 2, 2010 Hadi Nahari Principal Security & Mobile Architect PayPal, Inc. an ebay Company
More informationDesign of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 4 (April 2014), PP.20-24 Design of an Automatic Fare Collection System
More informationSecuring Internet of things Infrastructure Standard and Techniques
Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards
More informationNFC USE CASES FOR INDUSTRIAL APPLICATIONS. December 2016
NFC USE CASES FOR INDUSTRIAL APPLICATIONS December 2016 Agenda Session 1 st December: NFC use cases for industrial applications NFC technology essentials NFC Forum specifications Application examples NFC
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING
IT1452 Fundamentals Of Pervasive Computing 1 KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING Year / Sem : IV
More informationNear Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme
Near Field Communication: IoT with NFC Dominik Gruntz Institut für Mobile und Verteilte Systeme NFC Experience at FHNW 2005/06 First NFC demonstrator (with Siemens CX70 Emoty) NFC was included in a removable
More informationNFC Application Ecosystems: Introduction, Peer-to-Peer, NFC Tags/Posters and Product Label Applications
NFC Application Ecosystems: Introduction, Peer-to-Peer, NFC Tags/Posters and Product Label Applications Smart Card Alliance Mobile & NFC Council Webinar September 27, 2012 Introductions Brent Bowen, INSIDE
More informationExtensive proximity connectivity capabilities for USB-enabled devices
NXP Near Field Communication (NFC) controller Extensive proximity connectivity capabilities for -enabled devices NXP Semiconductors is a highly integrated transmission module for contactless communication
More informationReal Time Applications by Using Near Field Communication Based on Security
ISSN 2395-1621 Real Time Applications by Using Near Field Communication Based on Security #1 Vrushali Bhand, #2 Chaitali Ghadage, #3 Sonam Khade 1 chaitu.ghadage1994@gmail.com 2 vrushalibhand@gmail.com
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationA Tool for the Tag Management for the Building of Smart Environments
A Tool for the Tag Management for the Building of Smart Environments Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz and Miguel Ángel Gómez-Nieto University of Córdoba. Department of Computing
More informationMobile Payment Trials in Public Transport. Card Tech Secure Tech 2009
Mobile Payment Trials in Public Transport Card Tech Secure Tech 2009 Transit and Mobile Technology Mobile Phones offer the potential to serve in many fare system roles: An internet access device A portable
More informationSolutions to Enhance IoT Authentication Using SIM Cards (UICC)
Solutions to Enhance IoT Authentication Using SIM Cards (UICC) Copyright 2016 GSM Association Solutions to Enhance IoT Authentication Using SIM Cards (UICC) 4 1 Contents 1 Introduction 2 1.1 Purpose 2
More informationThe SIM Turns 20. Dr. Klaus Vedder. Chairman ETSI TC SCP. 3rd ETSI Security WS Sophia Antipolis, France January 2008
The SIM Turns 20 Dr. Klaus Vedder Chairman ETSI TC SCP Footer text (edit in View : Header and Footer) 3rd ETSI Security WS Sophia Antipolis, France 14-15 January 2008 World Class Standards ETSI TC SCP,
More informationMobile and Ubiquitous Computing CS 525M: P2P Micro Interactions with NFC Enabled Mobile Phones
Mobile and Ubiquitous Computing CS 525M: P2P Micro Interactions with NFC Enabled Mobile Phones Hiromu Enoki Computer Science Dept. Worcester Polytechnic Institute (WPI) 1 Introduction Near Field Communication
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationSoftware Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland NFC Research Lab Hagenberg University of Applied Sciences Upper Austria Softwarepark 11, 4232
More information