Adopting Mobile Credentials Into Your Access Control Infrastructure

Size: px
Start display at page:

Download "Adopting Mobile Credentials Into Your Access Control Infrastructure"

Transcription

1 Adopting Mobile Credentials Into Your Access Control Infrastructure Jeremy Earles Credentials Business Leader, Allegion 1 Overview Security Where do we start? Evolution of the credential Convenience The demand for mobile Technology Opportunities Raising the bar on security/convenience dynamic Pros & cons of mobile credential options What can I do? Implementation & Rollout recommendations 2 2 So in war, the way is to avoid what is strong and to strike at what is weak. So in war, the way is to avoid what is strong and to strike at what is weak. The Art of War Lesson 6: Weak Points and Strong Sun Tzu The Art of War Sun Tzu 3 3 1

2 Security technology in credentials today Multi factor + + ( ) Biometrics Security 13.56MHz Smart Cards Mag Stripe 125kHz Proximity US Credit/Debit Cards (Today) Keys PIN/Passwords 4 4 The current weak link in payments 5 5 The Weakness in Access Control Magnetic Stripe magstripe reader/writers are widely available as well as software for analyzing data encoded on the cards. By swiping a valid card, it becomes trivial to make any number of duplicates that function as the original

3 The Weakness in Access Control 125kHz Proximity 7 7 Higher Security Option for Access Control: Transitioning to Smarter Cards Mutual Authentication The card and reader communicate back and forth Each verifies that the other is legitimate Key Diversification Each card has a unique key, so transactions are unique Prevents compromise of the entire card population ϖ ßƔϘϞѪ ᴕ Encryption The card and reader communicate in secret code An algorithm (very large and complicated) prevents the ability to discern the communication 8 Sniffing, Replay, & Brute Force Attacks Putting smart card encryption into perspective undecillion 340,282,366,920,938,463,463,374,607,431,768,211,456 ounces of water on Earth grains of sand in Sahara Desert 680,564,733,841,876,926,926,749,214,863,536,422,912 quattuorvigintillion atoms in atoms on 115,792,089,237,316,195,423,570,985,008,687,907,853,269, 984,665,640,564,039,457,584,007,913,129,639,936 ounces of water on grains of sand Earth in Sahara Desert 9 3

4 Brute force attack Fastest super computer: petaflops (10.51 x operations / second) Operations required per combination check: 1,000 (optimistic, assume for now) Combination guesses / second = (10.51 x ) / 1000 = x Seconds in one Year = 31,536,000 Years to crack AES with 128 bit Key = (3.4 x ) / [(10.51 x ) x ] = (0.323 x )/ = 1.02 x = 1,020,000,000,000,000,000 years (billion billion) 10 Contactless Market Making slow progress toward higher security 125 khz Prox Cards 70% MHz Smart Cards 30% How can we move faster? Ranked Credential Benefits (student user perspective, Villanova survey) Americas Market for Electronic Physical Access Control Contactless credentials by type: IHS, % More Convenient 15% Faster 14% Less likely to break 11% Innovative Technology 6% More Secure 6% Easy to Replace Convenience in credentials Convenience

5 Consumer Demand for Convenience and beyond 90% of American adults have a mobile phone 58% of American adults have a smartphone Nomophobia An overwhelming fear of being out of mobile phone contact Short for no mobile phone phobia Security vs. Convenience They have been brutal enemies for a long time Created a stalemate that is difficult to disrupt, except in very small increments The Mighty Compromise Multi factor Mobile Credentials Biometrics Security Smart cards Prox cards Mag stripe Keys Convenience Passwords

6 The Best of The Best Mobile credentials offer the best of both worlds Convenient & easily accessible Password protected Biometric option Screen lock Remote data wipe for lost phone Tracking data available Security inherent in a mobile device How many times do you look at it vs. your keys/wallet/id/etc? Technology Opportunity Today s Options Pass through request Wifi/Cellular network Credential or Token on phone NFC Bluetooth (BLE) iphone and/or ibeacon Technology

7 Pass through request options Internet/Clould Security Panel Phone Advantages Infrastructure exists No special reader requirements Phones already equipped Shows user intent GPS Location option but sacrifices convenience Lock/Strike Disadvantages Internet connection required Wifi or Cellular Data Both panel & device must stay connected Delay expected Must find door in a functional list No credential ever created NFC: Level Set Near Field Communication (NFC) technology makes it simpler to make transactions, exchange content, and connect electronic devices with a touch. Enables contactless solutions in: Payments Access control Consumer electronics Loyalty and coupons Information collection and exchange NFC A Little Tech Talk Based on 13.56MHz Convenient for MIFARE users (very popular globally) Many companies have been developing this tech for years Modes of NFC 1. Read/Write usually for card/tags, check in, posters, etc. 2. Peer to Peer Designed for two devices to communicate with one another Can be used for access control as well, if configured properly 3. Card Emulation Secure Element Mirrors today s smart cards Significant industry/business complexity within TSM/Carriers/OS/others fighting for money/control. Service Providers on the outside Host Card Emulation Opens the industry: Security is in the software, not stored in Secure Element. SP control. Becoming the method of choice in the payments world

8 NFC Advantages No network connection needed Once the credential is downloaded it acts just like your ID card Minimal latency Shows clear user intent short range Added Security Screen Lock End to end 128 bit AES encryption Anti playback credential exchange (patent pending) Convenient No extra steps required Based on existing card reader infrastructure MIFARE becoming more popular in the US, already there in Europe Transition to smart cards make this an easy decision NFC Disadvantages Not available in all phones Widespread use of android worldwide iphone distribution limitation Main reason for the delay in adoption Relies on phone battery Dead battery Limited reader infrastructure for non access applications Multiple use credentials will drive demand Terminal transition to 13.56MHz payment readers will assist Many existing prox & mag stripe readers in access control Business Model to access secure element still undefined TSM, Carriers, Payments, Service Providers, etc. Where does the money go? Lack of standardization in payments space will delay widespread adoption of the technology elsewhere Apple Pay, Google Wallet, Softcard, Independent Wallets, etc The iphone Situation iphone 5 and prior No NFC antenna External sleeves the only option Not a sustainable model Sleeve not an attractive customer solution iphone 6 launched with NFC! Exciting for the growth of the technology in payments and other uses, such as access control But Only used for Apple Pay today Cannot yet use for access control Locked from developers/sps so far Standard Apple launch practice

9 The Future of NFC Android jump started the movement Open tech welcomes innovation Excellent global strategy, but US share less than 40% Future adoption speed relies on Apple & Payments Industry Need a standardized, stable method of using NFC across platforms Must open it to SP s to move forward What if Apple doesn t open NFC to Service Providers? Still working through TSM/Carriers/Device Manufacturers/etc. business relationships via Secure Element The ibeacon possiblity ios 7/8 indoor positioning system Uses BLE for Immediate, Near, and Far location Good idea, but not universal or standardized (again) Still in its infancy Bluetooth LE BLE Bluetooth 4.0 Bluetooth Smart Bluetooth LE Bluetooth Low Energy All essentially the same thing 2.4GHz radio frequency Much lower power than traditional (classic) Bluetooth with comparable communication range Does this compliment or replace NFC? Advantages On nearly all smartphones No waiting for device adoption Widespread technology use today Mitigates end user tech hesitation Built for convenience Could be always on Automatic connections Long range operation Good for specific use case Solitary entrance, long range, nondirectional application 26 Disadvantages Full reader replacement required Early phase technology in access control No current door based market trails yet publicized The Intent Problem Works from a distance (maybe too much) Unlock by passing by is undesirable Multiple doors in an area which unlocks? No current reliable solution for this Development work still needed to solve standard install access control problems 26 So what do I do now? Opportunities for you to get involved in the discussion

10 Recommendations Technology Making the right choice now is extremely important 1. Do NOT choose mag stripe 2. Do NOT choose 125kHz proximity The push from manufacturers to migrate to smart cards will continue Consistent story for years Now even more powerful as we move to mobile Preferably an open technology like MIFARE that can accept both cards and phones Provides a solid future migration path Recommendations Technology The best thing you can do for existing low tech credential users: Install multi tech readers Provide a migration path from mag stripe or prox up to smart cards and mobile Include PIN for multi factor if applicable Recommendations Mobile Rollout Small group that you can manage: Go for it! Ambulance service example Large Enterprise: Take baby steps University example Ease into larger implementations with a pilot program Device type control (iphone vs. Android) Commercial Building rollout example Sexy tech for executives, then push downward Bluetooth trial example Test the technology and how it works for you

11 Recommendations Mobile Rollout Use a backup plan when necessary Sticky tag backup example Alleviate NFC dead battery issue Provides phased approach to mobile credential rollout Introduces dual credentials (possible management issue) Cards are another likely alternate Final thoughts Convenience is king to consumers, but we cannot sacrifice security for it Mobile allows these two principles to peacefully coexist Cards are not disappearing anytime soon Cards, fobs, mobile, and wearables will coexist Plan ahead Multi technology options for transition path Improve security of current credentials and open the door to future innovation First identify your need, then select a technology One size does NOT fit all Start small Date before you marry Technologies AND companies Many providers will give trial samples of mobile credentials Contact Information Jeremy Earles Credentials Business Leader, Allegion jeremy.earles@allegion.com aptiqmobile.com allegion.com 33 11

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019 Powering the trusted identities of the world s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April

More information

Readers and credentials

Readers and credentials Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products

More information

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact Improving the Student Experience with a Unified Credential Jeff Staples VP Market Development Blackboard Transact 93% High school students who say campus technology is a key factor in their college selection

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

Mobile Security Fall 2014

Mobile Security Fall 2014 Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

The COMPLETE GUIDE NFC VERSION 1.0 PUBLISHED 09/13/18

The COMPLETE GUIDE NFC VERSION 1.0 PUBLISHED 09/13/18 The COMPLETE GUIDE to NFC VERSION 1.0 PUBLISHED 09/13/18 TABLE of CONTENTS 03 15 WHAT IS NFC 04 Form Factors 05 Tech Specs 06 Scanning and Interactivity GETTING STARTED 07 08 09 iphone Android Popularity

More information

Choosing the Right Credentials Is Easier than You Think

Choosing the Right Credentials Is Easier than You Think Choosing the Right Credentials Is Easier than You Think Jennifer Toscano, Ingersoll Rand Security Technologies, Portfolio Marketing Manager, Credentials, Readers, Software, and Controls Security is complicated.

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

ACR1255 NFC Bluetooth Smart Card Reader

ACR1255 NFC Bluetooth Smart Card Reader ACR1255 NFC Bluetooth Smart Card Reader User Manual V1.00 Name Signature Date Prepared by: Tommy Wong 2015-05-28 Reviewed by: Approved by: Subject to change without prior notice Table of Contents 1.0.

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing

More information

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper Sponsored by The Evolution of Cards and Credentials EXECUTIVE BRIEF In this Paper Despite effective, newer options, many organizations are still using outdated and vulnerable access control technology.

More information

ACR1255U-J1 Secure Bluetooth NFC Reader

ACR1255U-J1 Secure Bluetooth NFC Reader ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...

More information

Bluetooth: What does it really do and will it be replaced?

Bluetooth: What does it really do and will it be replaced? Bluetooth: What does it really do and will it be replaced? By James Rogerson January 29, 2014Mobile phones A look at the ins and outs of Bluetooth and what its future hold Bluetooth is old and it might

More information

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Mobile NFC Services Opportunities & Challenges NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Agenda 1. Introduction 2. Mobile NFC Overview 3. NFC Ecosystem Key Findings 4. Main NFC challenges 5. What

More information

Will Mobile Phones Replace Cards?

Will Mobile Phones Replace Cards? Will Mobile Phones Replace Cards? Bastian Knoppers, Senior Vice President Card Personalization and Fulfillment, FIS Soren Bested, Managing Director Monitise Americas Kevin Morrison, Senior Vice President

More information

Alpha Scanner Pro User manual

Alpha Scanner Pro User manual WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.

More information

Student ID card and campus security solutions. Colleges and universities

Student ID card and campus security solutions. Colleges and universities Student ID card and campus security solutions Colleges and universities Student ID card and campus security solutions for colleges and universities College students today expect convenience. They want

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

2009 Fare Collection Workshop

2009 Fare Collection Workshop 2009 Fare Collection Workshop Emerging Technologies Near Field Communications and Credit Card Based Transit Payment Scott Rodda Booz Allen Hamilton March 16, 2009 GROWTH AND RENEWAL Emerging standards

More information

Beyond Payment: Secure NFC applications and their relation to RFID

Beyond Payment: Secure NFC applications and their relation to RFID Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

More information

Smart Payments. Generating a seamless experience in a digital world.

Smart Payments. Generating a seamless experience in a digital world. Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,

More information

GSM Association (GSMA) Mobile Ticketing Initiative

GSM Association (GSMA) Mobile Ticketing Initiative GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing Lenel BlueDiamond Unmatched experience in mobile credentialing BlueDiamond leverages United Technologies Corporation s 17 years of experience developing

More information

GOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA

GOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA GOOGLE WALLET Hardik Mangukiya INDIA ABSTRACT Over the past few thousand years of evolution, the way we pay has changed shapes and materials. It has gone from gold to coins, paper money to plastic cards

More information

New Product Announcement

New Product Announcement New Product Announcement EntraPass v7.30 Software Tyco Security Products is pleased to announce version 7.30 of Kantech s flagship EntraPass security management system software. We continue to build upon

More information

Powering the enterprise-grade mobile access experience.

Powering the enterprise-grade mobile access experience. Brochure Mobile Reader Pro The new standard for mobile access. Powering the enterprise-grade mobile access experience. Finally, a mobile access solution that integrates seamlessly with existing access

More information

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,

More information

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK E -BOOK MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK MOBILITY 1 04 INTRODUCTION 06 THREE TECHNOLOGIES THAT SECURELY UNLEASH MOBILE AND BYOD TABLE OF CONTENTS

More information

Topics. Ensuring Security on Mobile Devices

Topics. Ensuring Security on Mobile Devices Ensuring Security on Mobile Devices It is possible right? Topics About viaforensics Why mobile security matters Types of security breaches and fraud Anticipated evolution of attacks Common mistakes that

More information

multiclass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1

multiclass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1 15370 Barranca Parkway Irvine, CA 92618-2215 USA multiclass Magnetic Stripe Reader APPLICATION NOTE June 11, 2010 AN0134, Rev A.1 2010 HID Global Corporation. All rights reserved. HID GLOBAL, HID, the

More information

Leveraging RFID: The Evolution of Security and Access Control April 30, 2013

Leveraging RFID: The Evolution of Security and Access Control April 30, 2013 1 Leveraging RFID: The Evolution of Security and Access Control April 30, 2013 Michael Liard VP, AutoID & Data Capture 2 Levels of Security What You Know Passwords What You Have Magstripe cards RFID cards/tags/key

More information

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice. ACR1252U NFC Forum Certified Reader Technical Specifications V1.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0.

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Near Field Comunications

Near Field Comunications Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range

More information

HID Proximity Credentials

HID Proximity Credentials HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125

More information

Názov prezentácie. Logo partnera

Názov prezentácie. Logo partnera Názov prezentácie Logo partnera Mobile banking more popular than a Facebook? Mobile Dependence Day, ExactTarget report on mobile usage, 2012 Competition is heating up Payment area competition Foreign banks

More information

ACCESS CONTROL Products 2017

ACCESS CONTROL Products 2017 Page 1 of 8 NESS Access Controllers 101-102 NESS MCP-040 ACCESS CONTROLLER Including 12V 6A power supply and high-tech metal housing Supports 4 x Wiegand Readers Supports 8 x RS-485 Readers 4 Lock Outputs

More information

ACR1251U-A1 USB NFC Reader with SAM Slot

ACR1251U-A1 USB NFC Reader with SAM Slot ACR1251U-A1 USB NFC Reader with SAM Slot Technical Specifications V1.05 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

Aries. m.marcus E L E C T RON I C T R I M S E T. architectural hardware E LECTRONI C S OLU TIONS. Presents

Aries. m.marcus E L E C T RON I C T R I M S E T. architectural hardware E LECTRONI C S OLU TIONS. Presents m.marcus architectural hardware Presents Aries E L E C T RON I C T R I M S E T E LECTRONI C S OLU TIONS Argo Aries Cat-MAL2017-2.indd 1 23/03/2017 15:03 Argo Aries Cat-MAL2017-2.indd 2 23/03/2017 15:03

More information

The Role of PNT in Cybersecurity Location-based Authentication

The Role of PNT in Cybersecurity Location-based Authentication The Role of PNT in Cybersecurity Location-based Authentication Dr. Michael O Connor November 14, 2013 Satelles is a Division of ikare Corporation What do we mean by Authentication? Authentication is the

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Multifunctional Identifiers ESMART Access

Multifunctional Identifiers ESMART Access AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID

More information

HCE security implications. Analyzing the security aspects of HCE

HCE security implications. Analyzing the security aspects of HCE HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:

More information

Power LogOn s Features - Check List

Power LogOn s Features - Check List s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Readers and Credentials. from Security Technologies

Readers and Credentials. from Security Technologies Readers and Credentials from Security Technologies Simplifying the security industry like never before. Ingersoll Rand s aptiq and XceedID readers and credentials not only feature cutting-edge security

More information

The Next Generation of Credential Technology

The Next Generation of Credential Technology The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.

More information

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking

More information

Smart Locks. Product Catalogue TIME MANAGEMENT ACCESS CONTROL VIDEO SURVEILLANCE TURNSTILES SOFTWARE

Smart Locks. Product Catalogue TIME MANAGEMENT ACCESS CONTROL VIDEO SURVEILLANCE TURNSTILES SOFTWARE Smart Locks Product Catalogue TIME MANAGEMENT ACCESS CONTROL VIDEO SURVEILLANCE TURNSTILES SOFTWARE Smart Locks ZKTecos newer Smart Locks, using the latest biometric and RFID technologies, offer effective

More information

Connecting to the future ELATEC RFID SYSTEMS

Connecting to the future ELATEC RFID SYSTEMS Connecting to the future ELATEC RFID SYSTEMS ELATEC GmbH Enabling success RFID SYSTEMS Focus on the goal Adaptable to our customer s requirements, Elatec products and technologies are the core that has

More information

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual 80149509-001 Rev. C 8/16/2017 VP3300/VP3300C/VP3300E User Manual Copyright 2017, ID TECH. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 USA This document, as well as the software and

More information

Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted

Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted Type A/B GP TSM Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards The Osaifu-Keitai service currently being provided in Japan is based on the FeliCa *1 mobile

More information

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware EMBEDDED SYSTEMS PROGRAMMING 2016-17 Accessing Hardware HARDWARE LIST Accelerometer Vector magnetometer (compass) Gyroscope GPS and/or other location facilities (Front/rear) camera Microphone Speaker Battery

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service. You can add your SBI Debit Card issued on Visa and MasterCard platform on your Samsung

More information

Let s Hack NFC. How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications?

Let s Hack NFC. How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications? Geoffrey Vaughan Let s Hack NFC How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications? Security Compass and NFC Currently we are devoting a lot of energy

More information

USER MANUAL Argo 2.0

USER MANUAL Argo 2.0 USER MANUAL Argo 2.0 2 About this manual Dear Customer, Thanks for choosing this innovative ISEO product, designed and developed following the highest standard of production, for an effective user-friendly

More information

DIGITAL TECHNOLOGY An Evolution in the Payment Landscape. AMEX Digital Solutions

DIGITAL TECHNOLOGY An Evolution in the Payment Landscape. AMEX Digital Solutions DIGITAL TECHNOLOGY An Evolution in the Payment Landscape AMEX Digital Solutions The Anatomy of Digital Payments Integration with leading digital wallet platforms such as Apple Pay, Android Pay and Samsung

More information

Overcoming Objections to Smartphones as Your Credential

Overcoming Objections to Smartphones as Your Credential Overcoming Objections to Smartphones as Your Credential Security Industry Association By Suzi Abell, 3xLOGIC on September 14, 2018 Could the phone replace your access control card or fob? Moore s Law notwithstanding,

More information

New Product Announcement. Flexible iosmart Card Readers and Cards

New Product Announcement. Flexible iosmart Card Readers and Cards New Product Announcement Flexible iosmart Card Readers and Cards Tyco Security Products is pleased to announce Kantech iosmart Card Readers and Cards. Based on MIFARE Plus, Kantech s iosmart Card Readers

More information

D220 - User Manual mypos Europe Ltd. mypos Mini Ice En

D220 - User Manual mypos Europe Ltd. mypos Mini Ice En D220 - User Manual mypos Europe Ltd. mypos Mini Ice En CONTENTS Introduction... 2 Scope... 2 Related documentation... 2 Internet connectivity... 2 Using D220 with a mobile phone (via Bluetooth or personal

More information

WELCOME : OVERVIEW Mobile Applications Testing. Copyright

WELCOME : OVERVIEW Mobile Applications Testing. Copyright WELCOME : OVERVIEW Mobile Applications Testing Copyright NataliaS@portnov.com 1 INTRODUCTION: Mobile APP vs Desktop and WEB Ever since the first cell phone hit the commercial market in 1983, the mobile

More information

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android) Mobile Banking App Guide (ios and Android) Page 1 A safe and efficient way of accessing your People s Choice Credit Union accounts, paying bills Contents. 1. Mobile Banking using the People s Choice iphone

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Mobile Payments Building the NFC Ecosystem

Mobile Payments Building the NFC Ecosystem Mobile Payments Smart Card Alliance / NFC Forum Joint Workshop Building the NFC Ecosystem 2010 Smart Card Alliance Annual Conference Peter Preuss Nokia Chairman, NFC Forum Marketing Committee Cooperation

More information

STMicroelectronics Payment Solutions. December 6 th 2012

STMicroelectronics Payment Solutions. December 6 th 2012 STMicroelectronics Payment Solutions December 6 th 2012 GP Microcontrollers General Purpose 8-bit and 32-bit MCUs Automotive 8-bit MCUs Microcontrollers in MMS Group 2 Memories Serial EEPROM RF memories

More information

Security Solutions for Mobile Users in the Workplace

Security Solutions for Mobile Users in the Workplace Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing

More information

RELATIONSHIP WITH KONICA MINOLTA

RELATIONSHIP WITH KONICA MINOLTA JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level

More information

State of US Mobile Payments (NFC)

State of US Mobile Payments (NFC) State of US Mobile Payments (NFC) (NFC State of the Industry Panel) Chandra Srivastava Business Leader, Visa SCA Mobile & NFC Council 2013 Payments Summit February 6, 2013 Draft - For Discussion Only 1

More information

3. Why should I use Samsung Pay instead of my physical cards?

3. Why should I use Samsung Pay instead of my physical cards? Overview 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service which can be used to make purchases almost anywhere. Leveraging a new proprietary technology called Magnetic

More information

Samsung Pay Frequently Asked Questions

Samsung Pay Frequently Asked Questions 1 Samsung Pay Frequently Asked Questions Contents 1. About Samsung Pay..2 2. Getting Started..2 3. Using Samsung Pay to make payments..3 4. Samsung Pay Security..5 5. Miscellaneous 6 1 2 About Samsung

More information

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated

More information

KONICA MINOLTA MOBILE PRINTING SOLUTIONS

KONICA MINOLTA MOBILE PRINTING SOLUTIONS JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

The mobile phone is the key

The mobile phone is the key The mobile phone is the key AirKey The locking system for flexible applications Just as dynamic as customers needs AirKey is the innovation from EVVA. Developed and manufactured in Austria, the electronic

More information

6 Vulnerabilities of the Retail Payment Ecosystem

6 Vulnerabilities of the Retail Payment Ecosystem 6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

Future Trends In Railway Ticketing

Future Trends In Railway Ticketing Eleventh UIC ebusiness Conference Paris, 11 12 October 2007 Future Trends In Railway Ticketing Where can technology take the mobile generation? Jeremy Acklam Business Development Director thetrainline.com

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Next steps for NFC and mobile wallets

Next steps for NFC and mobile wallets Next steps for NFC and mobile wallets PSE Consulting Merchant Acquiring Conference Mike Hendry Payment Systems Consultant Mike Hendry Page 1 1 Next steps for NFC and mobile wallets State of the (dis-)

More information

SMART Technologies. Introducing bluetooth low energy and ibeacon

SMART Technologies. Introducing bluetooth low energy and ibeacon SMART Technologies Introducing bluetooth low energy and ibeacon In real life you may call me Frederick Bousson Competence Leader Mobile @ Ordina Smartphone as life s remote control Focus on Software Development

More information

How to NFC. Nick Pelly & Jeff Hamilton May 10 th, feedback: hashtags: #io2011 #Android questions:

How to NFC. Nick Pelly & Jeff Hamilton May 10 th, feedback:  hashtags: #io2011 #Android questions: How to NFC Nick Pelly & Jeff Hamilton May 10 th, 2011 feedback: http://goo.gl/syzqy hashtags: #io2011 #Android questions: http://goo.gl/mod/ekbn Agenda What is NFC Why use NFC How to NFC 101 How to NFC

More information

mbank s mobile payments journey Joanna Erdman Director, Card Business Development

mbank s mobile payments journey Joanna Erdman Director, Card Business Development mbank s mobile payments journey Joanna Erdman Director, Card Business Development The agenda of the journey 2 The agenda of the journey 3 Will 2015 be the next Year of Mobile Payments? This year we can

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

NFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY

NFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 6, June 2018, pp. 566 571, Article ID: IJMET_09_06_065 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=6

More information

Wearable Technologies and the IoT. David Lamb Market Development Manager, North Europe STMicroelectronics

Wearable Technologies and the IoT. David Lamb Market Development Manager, North Europe STMicroelectronics Wearable Technologies and the IoT David Lamb Market Development Manager, North Europe STMicroelectronics Who We Are 2 A global semiconductor leader The largest European semiconductor company 2013 revenues

More information

ZKBioBL Smart Phone Door Management Solution

ZKBioBL Smart Phone Door Management Solution ZKBioBL Smart Phone Door Management Solution Codes Sharing Access Management Bluetooth 4.0 Power Saving Technology User Management Keyless Entry Records Checking ZKBioBL App. Functions 1. Mobile door-opening

More information

Mobile Prepaid: The Future is Now. Mary Carol Harris Visa Europe

Mobile Prepaid: The Future is Now. Mary Carol Harris Visa Europe Mobile Prepaid: The Future is Now Mary Carol Harris Mobile in context 4.8 billion 3.5 billion 1000 every minute Youth have never known life without a phone Payment via mobile phone discussed spontaneously

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer CIVINTEC GLOBAL 01 World Leading OEM/ODM Designer & Manufacturer ABOUT CIVINTEC CIVINTEC is the world leading designer and manufacturer of smart card terminals and devices, established in 2006 and focusing

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

Join the forward thinkers who rely on Toshiba for wireless connectivity ICs.

Join the forward thinkers who rely on Toshiba for wireless connectivity ICs. ELECTRONIC COMPONENTS Wireless Communication Solutions Join the forward thinkers who rely on Toshiba for wireless connectivity ICs. Bluetooth Low Power Near Field Communications High Speed Wireless Power

More information

FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS

FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS FINGERPRINT SENSOR FOR MASS MARKET APPLICATIONS April 2015 Ralph W. Bernstein (Consultant) IDEX ASA and AmberCon 14.04.2015 ralph.bernstein@idex.no ralph@bernstein.no Mobile:+ 47 93059303 www.idex.no IDEX

More information

Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen

Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the

More information

mypos Mini - User Manual mypos Europe Ltd. mypos Mini En

mypos Mini - User Manual mypos Europe Ltd. mypos Mini En mypos Mini - User Manual mypos Europe Ltd. mypos Mini En CONTENTS Introduction... 2 Scope... 2 Related documentation... 2 Internet connectivity... 2 Using mypos Mini with a mobile phone (via Bluetooth

More information

5G Readiness Survey 2017

5G Readiness Survey 2017 5G Readiness Survey 2017 An assessment of operators progress on the road to 5G 1 5G READINESS SURVEY 2017: AN ASSESSMENT OF OPERATORS PROGRESS ON THE ROAD TO 5G Are Operators Ready for 5G? 5G next-generation

More information

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...

More information