Adopting Mobile Credentials Into Your Access Control Infrastructure
|
|
- Dinah Simon
- 5 years ago
- Views:
Transcription
1 Adopting Mobile Credentials Into Your Access Control Infrastructure Jeremy Earles Credentials Business Leader, Allegion 1 Overview Security Where do we start? Evolution of the credential Convenience The demand for mobile Technology Opportunities Raising the bar on security/convenience dynamic Pros & cons of mobile credential options What can I do? Implementation & Rollout recommendations 2 2 So in war, the way is to avoid what is strong and to strike at what is weak. So in war, the way is to avoid what is strong and to strike at what is weak. The Art of War Lesson 6: Weak Points and Strong Sun Tzu The Art of War Sun Tzu 3 3 1
2 Security technology in credentials today Multi factor + + ( ) Biometrics Security 13.56MHz Smart Cards Mag Stripe 125kHz Proximity US Credit/Debit Cards (Today) Keys PIN/Passwords 4 4 The current weak link in payments 5 5 The Weakness in Access Control Magnetic Stripe magstripe reader/writers are widely available as well as software for analyzing data encoded on the cards. By swiping a valid card, it becomes trivial to make any number of duplicates that function as the original
3 The Weakness in Access Control 125kHz Proximity 7 7 Higher Security Option for Access Control: Transitioning to Smarter Cards Mutual Authentication The card and reader communicate back and forth Each verifies that the other is legitimate Key Diversification Each card has a unique key, so transactions are unique Prevents compromise of the entire card population ϖ ßƔϘϞѪ ᴕ Encryption The card and reader communicate in secret code An algorithm (very large and complicated) prevents the ability to discern the communication 8 Sniffing, Replay, & Brute Force Attacks Putting smart card encryption into perspective undecillion 340,282,366,920,938,463,463,374,607,431,768,211,456 ounces of water on Earth grains of sand in Sahara Desert 680,564,733,841,876,926,926,749,214,863,536,422,912 quattuorvigintillion atoms in atoms on 115,792,089,237,316,195,423,570,985,008,687,907,853,269, 984,665,640,564,039,457,584,007,913,129,639,936 ounces of water on grains of sand Earth in Sahara Desert 9 3
4 Brute force attack Fastest super computer: petaflops (10.51 x operations / second) Operations required per combination check: 1,000 (optimistic, assume for now) Combination guesses / second = (10.51 x ) / 1000 = x Seconds in one Year = 31,536,000 Years to crack AES with 128 bit Key = (3.4 x ) / [(10.51 x ) x ] = (0.323 x )/ = 1.02 x = 1,020,000,000,000,000,000 years (billion billion) 10 Contactless Market Making slow progress toward higher security 125 khz Prox Cards 70% MHz Smart Cards 30% How can we move faster? Ranked Credential Benefits (student user perspective, Villanova survey) Americas Market for Electronic Physical Access Control Contactless credentials by type: IHS, % More Convenient 15% Faster 14% Less likely to break 11% Innovative Technology 6% More Secure 6% Easy to Replace Convenience in credentials Convenience
5 Consumer Demand for Convenience and beyond 90% of American adults have a mobile phone 58% of American adults have a smartphone Nomophobia An overwhelming fear of being out of mobile phone contact Short for no mobile phone phobia Security vs. Convenience They have been brutal enemies for a long time Created a stalemate that is difficult to disrupt, except in very small increments The Mighty Compromise Multi factor Mobile Credentials Biometrics Security Smart cards Prox cards Mag stripe Keys Convenience Passwords
6 The Best of The Best Mobile credentials offer the best of both worlds Convenient & easily accessible Password protected Biometric option Screen lock Remote data wipe for lost phone Tracking data available Security inherent in a mobile device How many times do you look at it vs. your keys/wallet/id/etc? Technology Opportunity Today s Options Pass through request Wifi/Cellular network Credential or Token on phone NFC Bluetooth (BLE) iphone and/or ibeacon Technology
7 Pass through request options Internet/Clould Security Panel Phone Advantages Infrastructure exists No special reader requirements Phones already equipped Shows user intent GPS Location option but sacrifices convenience Lock/Strike Disadvantages Internet connection required Wifi or Cellular Data Both panel & device must stay connected Delay expected Must find door in a functional list No credential ever created NFC: Level Set Near Field Communication (NFC) technology makes it simpler to make transactions, exchange content, and connect electronic devices with a touch. Enables contactless solutions in: Payments Access control Consumer electronics Loyalty and coupons Information collection and exchange NFC A Little Tech Talk Based on 13.56MHz Convenient for MIFARE users (very popular globally) Many companies have been developing this tech for years Modes of NFC 1. Read/Write usually for card/tags, check in, posters, etc. 2. Peer to Peer Designed for two devices to communicate with one another Can be used for access control as well, if configured properly 3. Card Emulation Secure Element Mirrors today s smart cards Significant industry/business complexity within TSM/Carriers/OS/others fighting for money/control. Service Providers on the outside Host Card Emulation Opens the industry: Security is in the software, not stored in Secure Element. SP control. Becoming the method of choice in the payments world
8 NFC Advantages No network connection needed Once the credential is downloaded it acts just like your ID card Minimal latency Shows clear user intent short range Added Security Screen Lock End to end 128 bit AES encryption Anti playback credential exchange (patent pending) Convenient No extra steps required Based on existing card reader infrastructure MIFARE becoming more popular in the US, already there in Europe Transition to smart cards make this an easy decision NFC Disadvantages Not available in all phones Widespread use of android worldwide iphone distribution limitation Main reason for the delay in adoption Relies on phone battery Dead battery Limited reader infrastructure for non access applications Multiple use credentials will drive demand Terminal transition to 13.56MHz payment readers will assist Many existing prox & mag stripe readers in access control Business Model to access secure element still undefined TSM, Carriers, Payments, Service Providers, etc. Where does the money go? Lack of standardization in payments space will delay widespread adoption of the technology elsewhere Apple Pay, Google Wallet, Softcard, Independent Wallets, etc The iphone Situation iphone 5 and prior No NFC antenna External sleeves the only option Not a sustainable model Sleeve not an attractive customer solution iphone 6 launched with NFC! Exciting for the growth of the technology in payments and other uses, such as access control But Only used for Apple Pay today Cannot yet use for access control Locked from developers/sps so far Standard Apple launch practice
9 The Future of NFC Android jump started the movement Open tech welcomes innovation Excellent global strategy, but US share less than 40% Future adoption speed relies on Apple & Payments Industry Need a standardized, stable method of using NFC across platforms Must open it to SP s to move forward What if Apple doesn t open NFC to Service Providers? Still working through TSM/Carriers/Device Manufacturers/etc. business relationships via Secure Element The ibeacon possiblity ios 7/8 indoor positioning system Uses BLE for Immediate, Near, and Far location Good idea, but not universal or standardized (again) Still in its infancy Bluetooth LE BLE Bluetooth 4.0 Bluetooth Smart Bluetooth LE Bluetooth Low Energy All essentially the same thing 2.4GHz radio frequency Much lower power than traditional (classic) Bluetooth with comparable communication range Does this compliment or replace NFC? Advantages On nearly all smartphones No waiting for device adoption Widespread technology use today Mitigates end user tech hesitation Built for convenience Could be always on Automatic connections Long range operation Good for specific use case Solitary entrance, long range, nondirectional application 26 Disadvantages Full reader replacement required Early phase technology in access control No current door based market trails yet publicized The Intent Problem Works from a distance (maybe too much) Unlock by passing by is undesirable Multiple doors in an area which unlocks? No current reliable solution for this Development work still needed to solve standard install access control problems 26 So what do I do now? Opportunities for you to get involved in the discussion
10 Recommendations Technology Making the right choice now is extremely important 1. Do NOT choose mag stripe 2. Do NOT choose 125kHz proximity The push from manufacturers to migrate to smart cards will continue Consistent story for years Now even more powerful as we move to mobile Preferably an open technology like MIFARE that can accept both cards and phones Provides a solid future migration path Recommendations Technology The best thing you can do for existing low tech credential users: Install multi tech readers Provide a migration path from mag stripe or prox up to smart cards and mobile Include PIN for multi factor if applicable Recommendations Mobile Rollout Small group that you can manage: Go for it! Ambulance service example Large Enterprise: Take baby steps University example Ease into larger implementations with a pilot program Device type control (iphone vs. Android) Commercial Building rollout example Sexy tech for executives, then push downward Bluetooth trial example Test the technology and how it works for you
11 Recommendations Mobile Rollout Use a backup plan when necessary Sticky tag backup example Alleviate NFC dead battery issue Provides phased approach to mobile credential rollout Introduces dual credentials (possible management issue) Cards are another likely alternate Final thoughts Convenience is king to consumers, but we cannot sacrifice security for it Mobile allows these two principles to peacefully coexist Cards are not disappearing anytime soon Cards, fobs, mobile, and wearables will coexist Plan ahead Multi technology options for transition path Improve security of current credentials and open the door to future innovation First identify your need, then select a technology One size does NOT fit all Start small Date before you marry Technologies AND companies Many providers will give trial samples of mobile credentials Contact Information Jeremy Earles Credentials Business Leader, Allegion jeremy.earles@allegion.com aptiqmobile.com allegion.com 33 11
Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019
Powering the trusted identities of the world s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April
More informationReaders and credentials
Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products
More informationImproving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact
Improving the Student Experience with a Unified Credential Jeff Staples VP Market Development Blackboard Transact 93% High school students who say campus technology is a key factor in their college selection
More informationBluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24
Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid
More informationMobile Security Fall 2014
Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationThe COMPLETE GUIDE NFC VERSION 1.0 PUBLISHED 09/13/18
The COMPLETE GUIDE to NFC VERSION 1.0 PUBLISHED 09/13/18 TABLE of CONTENTS 03 15 WHAT IS NFC 04 Form Factors 05 Tech Specs 06 Scanning and Interactivity GETTING STARTED 07 08 09 iphone Android Popularity
More informationChoosing the Right Credentials Is Easier than You Think
Choosing the Right Credentials Is Easier than You Think Jennifer Toscano, Ingersoll Rand Security Technologies, Portfolio Marketing Manager, Credentials, Readers, Software, and Controls Security is complicated.
More informationiclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationACR1255 NFC Bluetooth Smart Card Reader
ACR1255 NFC Bluetooth Smart Card Reader User Manual V1.00 Name Signature Date Prepared by: Tommy Wong 2015-05-28 Reviewed by: Approved by: Subject to change without prior notice Table of Contents 1.0.
More informationEmpower your phone to open new doors
Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing
More informationEXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper
Sponsored by The Evolution of Cards and Credentials EXECUTIVE BRIEF In this Paper Despite effective, newer options, many organizations are still using outdated and vulnerable access control technology.
More informationACR1255U-J1 Secure Bluetooth NFC Reader
ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...
More informationBluetooth: What does it really do and will it be replaced?
Bluetooth: What does it really do and will it be replaced? By James Rogerson January 29, 2014Mobile phones A look at the ins and outs of Bluetooth and what its future hold Bluetooth is old and it might
More informationMobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010
Mobile NFC Services Opportunities & Challenges NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Agenda 1. Introduction 2. Mobile NFC Overview 3. NFC Ecosystem Key Findings 4. Main NFC challenges 5. What
More informationWill Mobile Phones Replace Cards?
Will Mobile Phones Replace Cards? Bastian Knoppers, Senior Vice President Card Personalization and Fulfillment, FIS Soren Bested, Managing Director Monitise Americas Kevin Morrison, Senior Vice President
More informationAlpha Scanner Pro User manual
WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.
More informationStudent ID card and campus security solutions. Colleges and universities
Student ID card and campus security solutions Colleges and universities Student ID card and campus security solutions for colleges and universities College students today expect convenience. They want
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More information2009 Fare Collection Workshop
2009 Fare Collection Workshop Emerging Technologies Near Field Communications and Credit Card Based Transit Payment Scott Rodda Booz Allen Hamilton March 16, 2009 GROWTH AND RENEWAL Emerging standards
More informationBeyond Payment: Secure NFC applications and their relation to RFID
Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017
More informationSmart Payments. Generating a seamless experience in a digital world.
Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,
More informationGSM Association (GSMA) Mobile Ticketing Initiative
GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative
More informationEmpower your phone to open new doors
Empower your phone to open new doors Introducing Lenel BlueDiamond Unmatched experience in mobile credentialing BlueDiamond leverages United Technologies Corporation s 17 years of experience developing
More informationGOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA
GOOGLE WALLET Hardik Mangukiya INDIA ABSTRACT Over the past few thousand years of evolution, the way we pay has changed shapes and materials. It has gone from gold to coins, paper money to plastic cards
More informationNew Product Announcement
New Product Announcement EntraPass v7.30 Software Tyco Security Products is pleased to announce version 7.30 of Kantech s flagship EntraPass security management system software. We continue to build upon
More informationPowering the enterprise-grade mobile access experience.
Brochure Mobile Reader Pro The new standard for mobile access. Powering the enterprise-grade mobile access experience. Finally, a mobile access solution that integrates seamlessly with existing access
More informationFare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010
Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,
More informationMOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK
E -BOOK MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK MOBILITY 1 04 INTRODUCTION 06 THREE TECHNOLOGIES THAT SECURELY UNLEASH MOBILE AND BYOD TABLE OF CONTENTS
More informationTopics. Ensuring Security on Mobile Devices
Ensuring Security on Mobile Devices It is possible right? Topics About viaforensics Why mobile security matters Types of security breaches and fraud Anticipated evolution of attacks Common mistakes that
More informationmulticlass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1
15370 Barranca Parkway Irvine, CA 92618-2215 USA multiclass Magnetic Stripe Reader APPLICATION NOTE June 11, 2010 AN0134, Rev A.1 2010 HID Global Corporation. All rights reserved. HID GLOBAL, HID, the
More informationLeveraging RFID: The Evolution of Security and Access Control April 30, 2013
1 Leveraging RFID: The Evolution of Security and Access Control April 30, 2013 Michael Liard VP, AutoID & Data Capture 2 Levels of Security What You Know Passwords What You Have Magstripe cards RFID cards/tags/key
More informationACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.
ACR1252U NFC Forum Certified Reader Technical Specifications V1.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0.
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationNear Field Comunications
Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range
More informationHID Proximity Credentials
HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125
More informationNázov prezentácie. Logo partnera
Názov prezentácie Logo partnera Mobile banking more popular than a Facebook? Mobile Dependence Day, ExactTarget report on mobile usage, 2012 Competition is heating up Payment area competition Foreign banks
More informationACCESS CONTROL Products 2017
Page 1 of 8 NESS Access Controllers 101-102 NESS MCP-040 ACCESS CONTROLLER Including 12V 6A power supply and high-tech metal housing Supports 4 x Wiegand Readers Supports 8 x RS-485 Readers 4 Lock Outputs
More informationACR1251U-A1 USB NFC Reader with SAM Slot
ACR1251U-A1 USB NFC Reader with SAM Slot Technical Specifications V1.05 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationAries. m.marcus E L E C T RON I C T R I M S E T. architectural hardware E LECTRONI C S OLU TIONS. Presents
m.marcus architectural hardware Presents Aries E L E C T RON I C T R I M S E T E LECTRONI C S OLU TIONS Argo Aries Cat-MAL2017-2.indd 1 23/03/2017 15:03 Argo Aries Cat-MAL2017-2.indd 2 23/03/2017 15:03
More informationThe Role of PNT in Cybersecurity Location-based Authentication
The Role of PNT in Cybersecurity Location-based Authentication Dr. Michael O Connor November 14, 2013 Satelles is a Division of ikare Corporation What do we mean by Authentication? Authentication is the
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationMultifunctional Identifiers ESMART Access
AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID
More informationHCE security implications. Analyzing the security aspects of HCE
HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:
More informationPower LogOn s Features - Check List
s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationReaders and Credentials. from Security Technologies
Readers and Credentials from Security Technologies Simplifying the security industry like never before. Ingersoll Rand s aptiq and XceedID readers and credentials not only feature cutting-edge security
More informationThe Next Generation of Credential Technology
The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationSmart Locks. Product Catalogue TIME MANAGEMENT ACCESS CONTROL VIDEO SURVEILLANCE TURNSTILES SOFTWARE
Smart Locks Product Catalogue TIME MANAGEMENT ACCESS CONTROL VIDEO SURVEILLANCE TURNSTILES SOFTWARE Smart Locks ZKTecos newer Smart Locks, using the latest biometric and RFID technologies, offer effective
More informationConnecting to the future ELATEC RFID SYSTEMS
Connecting to the future ELATEC RFID SYSTEMS ELATEC GmbH Enabling success RFID SYSTEMS Focus on the goal Adaptable to our customer s requirements, Elatec products and technologies are the core that has
More informationRev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual
80149509-001 Rev. C 8/16/2017 VP3300/VP3300C/VP3300E User Manual Copyright 2017, ID TECH. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 USA This document, as well as the software and
More informationAdvances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted
Type A/B GP TSM Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards The Osaifu-Keitai service currently being provided in Japan is based on the FeliCa *1 mobile
More informationEMBEDDED SYSTEMS PROGRAMMING Accessing Hardware
EMBEDDED SYSTEMS PROGRAMMING 2016-17 Accessing Hardware HARDWARE LIST Accelerometer Vector magnetometer (compass) Gyroscope GPS and/or other location facilities (Front/rear) camera Microphone Speaker Battery
More informationFrequently Asked Questions
Frequently Asked Questions 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service. You can add your SBI Debit Card issued on Visa and MasterCard platform on your Samsung
More informationLet s Hack NFC. How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications?
Geoffrey Vaughan Let s Hack NFC How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications? Security Compass and NFC Currently we are devoting a lot of energy
More informationUSER MANUAL Argo 2.0
USER MANUAL Argo 2.0 2 About this manual Dear Customer, Thanks for choosing this innovative ISEO product, designed and developed following the highest standard of production, for an effective user-friendly
More informationDIGITAL TECHNOLOGY An Evolution in the Payment Landscape. AMEX Digital Solutions
DIGITAL TECHNOLOGY An Evolution in the Payment Landscape AMEX Digital Solutions The Anatomy of Digital Payments Integration with leading digital wallet platforms such as Apple Pay, Android Pay and Samsung
More informationOvercoming Objections to Smartphones as Your Credential
Overcoming Objections to Smartphones as Your Credential Security Industry Association By Suzi Abell, 3xLOGIC on September 14, 2018 Could the phone replace your access control card or fob? Moore s Law notwithstanding,
More informationNew Product Announcement. Flexible iosmart Card Readers and Cards
New Product Announcement Flexible iosmart Card Readers and Cards Tyco Security Products is pleased to announce Kantech iosmart Card Readers and Cards. Based on MIFARE Plus, Kantech s iosmart Card Readers
More informationD220 - User Manual mypos Europe Ltd. mypos Mini Ice En
D220 - User Manual mypos Europe Ltd. mypos Mini Ice En CONTENTS Introduction... 2 Scope... 2 Related documentation... 2 Internet connectivity... 2 Using D220 with a mobile phone (via Bluetooth or personal
More informationWELCOME : OVERVIEW Mobile Applications Testing. Copyright
WELCOME : OVERVIEW Mobile Applications Testing Copyright NataliaS@portnov.com 1 INTRODUCTION: Mobile APP vs Desktop and WEB Ever since the first cell phone hit the commercial market in 1983, the mobile
More informationMobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)
Mobile Banking App Guide (ios and Android) Page 1 A safe and efficient way of accessing your People s Choice Credit Union accounts, paying bills Contents. 1. Mobile Banking using the People s Choice iphone
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More informationMobile Payments Building the NFC Ecosystem
Mobile Payments Smart Card Alliance / NFC Forum Joint Workshop Building the NFC Ecosystem 2010 Smart Card Alliance Annual Conference Peter Preuss Nokia Chairman, NFC Forum Marketing Committee Cooperation
More informationSTMicroelectronics Payment Solutions. December 6 th 2012
STMicroelectronics Payment Solutions December 6 th 2012 GP Microcontrollers General Purpose 8-bit and 32-bit MCUs Automotive 8-bit MCUs Microcontrollers in MMS Group 2 Memories Serial EEPROM RF memories
More informationSecurity Solutions for Mobile Users in the Workplace
Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing
More informationRELATIONSHIP WITH KONICA MINOLTA
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level
More informationState of US Mobile Payments (NFC)
State of US Mobile Payments (NFC) (NFC State of the Industry Panel) Chandra Srivastava Business Leader, Visa SCA Mobile & NFC Council 2013 Payments Summit February 6, 2013 Draft - For Discussion Only 1
More information3. Why should I use Samsung Pay instead of my physical cards?
Overview 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service which can be used to make purchases almost anywhere. Leveraging a new proprietary technology called Magnetic
More informationSamsung Pay Frequently Asked Questions
1 Samsung Pay Frequently Asked Questions Contents 1. About Samsung Pay..2 2. Getting Started..2 3. Using Samsung Pay to make payments..3 4. Samsung Pay Security..5 5. Miscellaneous 6 1 2 About Samsung
More informationCh 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated
Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated
More informationKONICA MINOLTA MOBILE PRINTING SOLUTIONS
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationThe mobile phone is the key
The mobile phone is the key AirKey The locking system for flexible applications Just as dynamic as customers needs AirKey is the innovation from EVVA. Developed and manufactured in Austria, the electronic
More information6 Vulnerabilities of the Retail Payment Ecosystem
6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting
More informationUnlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.
Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded
More informationFuture Trends In Railway Ticketing
Eleventh UIC ebusiness Conference Paris, 11 12 October 2007 Future Trends In Railway Ticketing Where can technology take the mobile generation? Jeremy Acklam Business Development Director thetrainline.com
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationNext steps for NFC and mobile wallets
Next steps for NFC and mobile wallets PSE Consulting Merchant Acquiring Conference Mike Hendry Payment Systems Consultant Mike Hendry Page 1 1 Next steps for NFC and mobile wallets State of the (dis-)
More informationSMART Technologies. Introducing bluetooth low energy and ibeacon
SMART Technologies Introducing bluetooth low energy and ibeacon In real life you may call me Frederick Bousson Competence Leader Mobile @ Ordina Smartphone as life s remote control Focus on Software Development
More informationHow to NFC. Nick Pelly & Jeff Hamilton May 10 th, feedback: hashtags: #io2011 #Android questions:
How to NFC Nick Pelly & Jeff Hamilton May 10 th, 2011 feedback: http://goo.gl/syzqy hashtags: #io2011 #Android questions: http://goo.gl/mod/ekbn Agenda What is NFC Why use NFC How to NFC 101 How to NFC
More informationmbank s mobile payments journey Joanna Erdman Director, Card Business Development
mbank s mobile payments journey Joanna Erdman Director, Card Business Development The agenda of the journey 2 The agenda of the journey 3 Will 2015 be the next Year of Mobile Payments? This year we can
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationNFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 6, June 2018, pp. 566 571, Article ID: IJMET_09_06_065 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=6
More informationWearable Technologies and the IoT. David Lamb Market Development Manager, North Europe STMicroelectronics
Wearable Technologies and the IoT David Lamb Market Development Manager, North Europe STMicroelectronics Who We Are 2 A global semiconductor leader The largest European semiconductor company 2013 revenues
More informationZKBioBL Smart Phone Door Management Solution
ZKBioBL Smart Phone Door Management Solution Codes Sharing Access Management Bluetooth 4.0 Power Saving Technology User Management Keyless Entry Records Checking ZKBioBL App. Functions 1. Mobile door-opening
More informationMobile Prepaid: The Future is Now. Mary Carol Harris Visa Europe
Mobile Prepaid: The Future is Now Mary Carol Harris Mobile in context 4.8 billion 3.5 billion 1000 every minute Youth have never known life without a phone Payment via mobile phone discussed spontaneously
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer
CIVINTEC GLOBAL 01 World Leading OEM/ODM Designer & Manufacturer ABOUT CIVINTEC CIVINTEC is the world leading designer and manufacturer of smart card terminals and devices, established in 2006 and focusing
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture
More informationJoin the forward thinkers who rely on Toshiba for wireless connectivity ICs.
ELECTRONIC COMPONENTS Wireless Communication Solutions Join the forward thinkers who rely on Toshiba for wireless connectivity ICs. Bluetooth Low Power Near Field Communications High Speed Wireless Power
More informationFINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS
FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS April 2015 Ralph W. Bernstein (Consultant) IDEX ASA and AmberCon 14.04.2015 ralph.bernstein@idex.no ralph@bernstein.no Mobile:+ 47 93059303 www.idex.no IDEX
More informationSmart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen
Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the
More informationmypos Mini - User Manual mypos Europe Ltd. mypos Mini En
mypos Mini - User Manual mypos Europe Ltd. mypos Mini En CONTENTS Introduction... 2 Scope... 2 Related documentation... 2 Internet connectivity... 2 Using mypos Mini with a mobile phone (via Bluetooth
More information5G Readiness Survey 2017
5G Readiness Survey 2017 An assessment of operators progress on the road to 5G 1 5G READINESS SURVEY 2017: AN ASSESSMENT OF OPERATORS PROGRESS ON THE ROAD TO 5G Are Operators Ready for 5G? 5G next-generation
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More information