Beyond Payment: Secure NFC applications and their relation to RFID

Similar documents
Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC

iclass SE Platform Solutions The New Standard in Access Control

Powering the enterprise-grade mobile access experience.

NFC Equipped Smartphones

Empower your phone to open new doors

Single Secure Credential to Access Facilities and IT Resources

Multifunctional Identifiers ESMART Access

Secure Connections for a Smarter World

Empower your phone to open new doors

NFC in the PC environment

NFC USE CASES FOR INDUSTRIAL APPLICATIONS. December 2016

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

LEARN ALL ABOUT NFC SESSION 4: PRODUCT SUPPORT PACKAGE FOR NFC READERS & NFC CONNECTED TAGS

NTAG for Electronics. James Zhu Business Development Manager Business Unit Identification

HID Mobile Access. Simple. Secure. Smart.

RD200/300 TOOL OPERATION MANUAL V02.10

Security in NFC Readers

Real-time access control by your side!

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

The COMPLETE GUIDE NFC VERSION 1.0 PUBLISHED 09/13/18

ST25TV product presentation. June 2018

Evaluation of the feasible attacks against RFID tags for access control systems

Enabling Compliance for Physical and Cyber Security in Mobile Devices

Smart Cards. Tim Hogan, Practice Director, Unisys

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer

Connecting to the future ELATEC RFID SYSTEMS

Presenting the new 9200 Series

ACR1255U-J1 Secure Bluetooth NFC Reader

NFC FOR CONSUMABLES AND ACCESSORIES

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice.

CRESCENDO SERIES Smart Cards. Smart Card Solutions

Alpha Scanner Pro User manual

NFC is the double click in the internet of the things

Overview RFID-Systems

Multi-ISO HF RFID reader for the Motorola MC55/65 Terminal

RFID DEFCON 26 Vinnie Vanhoecke Lorenzo Bernardi

Security Solutions for Mobile Users in the Workplace

HID RAIN UHF Tags Portfolio Overview

GSM Association (GSMA) Mobile Ticketing Initiative

Hacking new NFC cards

RFID and Wiegand. Short manual. Version 0.1. Date Log v0.1. Adatis GmbH & Co.KG Seite 1 von 8

NFC Identity and Access Control

C4 Red. Handheld Computer DESCRIPTION FEATURES RFID OPTIONS

ACR1251U-A1 USB NFC Reader with SAM Slot

Logical Access How to Order Guide D00538, Release E.5 September 2018

ACR1255 NFC Bluetooth Smart Card Reader

RS31. series. Touch Mobile Computer. Presenting the new RS31. series. Touch Mobile Computer

SPRINGCARD SMART READERS & RFID SCANNERS

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010

THE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors

Logical Access How to Order Guide

The Next Generation of Credential Technology

Printing & Encoding Solutions

HID goid Mobile ID Solution

Near Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme

Identiv TS Readers. Ordering Guide. October 2016

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Extensive proximity connectivity capabilities for USB-enabled devices

NFC Lab Michel Simatic

ETSI Security Standards Workshop January 2006

PCMS. PC-linked Reader with Mass Storage.

How to troubleshoot if a compact disc (CD) will not play.

Attacks on NFC enabled phones and their countermeasures

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie

v2.2.0 CATALOG TRANSPONDERS 2017

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

Readers and credentials

Credential Programmer How to Order Guide

iclass SE How to Order Guide

Idesco OEM modules. Compact Module: 40,9 x 39,0 mm. Module: 72 x 37,8 x18 mm. 125 khz Prox. 13,56 MHz UID. MIFARE DESFire. MIFARE DESFire LEGIC - 1 -

FACIAL RECOGNITION TERMINAL SYSTEM

Multi-ISO HF RFID reader for Motorola MC70/75/75A Terminal

MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER

Corey Benninger Max Sobell

HID goid Mobile ID Solution

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee

ThingMagic M6-e Micro FAQ

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered

Leveraging RFID: The Evolution of Security and Access Control April 30, 2013

XS4 2.0 READER WRDBxxx

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

E Series : Network PC/SC Contactless Couplers. TwistyWriter-IP PC/SC / FunkyGate-IP PC/SC

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware

Smartair. Proximity access control. ASSA ABLOY, the global leader in door opening solutions

1. General LED Indicators Reset AT-120 Utility Customer-specific Applications Firmware Updates...

Corporate Commitment to Excellence

Natural Security Alliance

STid presents the new upgradable range. identify. touch. control

Identity & security CLOUDCARD+ When security meets convenience

ACCESS CONTROL Products 2017

PIN Entry & Management

The NFC Forum NFC Technology for Developers

JUNE 2018 MULTI-FAMILY HOUSING SOLUTIONS CONVENIENT SECURITY

How Next Generation Trusted Identities Can Help Transform Your Business

Transcription:

Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

About HID Global Privately held company and an ASSA ABLOY Group brand Headquartered in Austin, TX 2,500+ employees worldwide International offices that support 100+ countries Production facilities in U.S., South America, Asia and Europe Primary brands include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard, Lumidigm, Quantum Secure, Bluvision Serves a variety of markets: PACS (physical access control), LACS (strong authentication/credential management, card personalization, visitor management), Government ID and RFID technologies for a range of industrial applications 2

HID Offering in RFID Tags www.hidglobal.com/rfid Top quality RFID tags, cards and inlays (prelaminates) Frequency agnostic - LF, HF and UHF to suit various applications, incl. NFC Swiss engineering combined with own Malaysian, fully automated, ISO 9001:2008 certified production ensures affordable top quality Custom design services help system integrators to create innovative or specialized RFID solutions across the world Examples: LF HF incl. UHF 3

What is NFC? Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters. - Wikipedia 4

Positioning NFC within RFID (passive) RFID Low Frequency (LF) 125 KHz (Industrial use) 134.2 KHz (Animal ID) High Frequency (HF) 13.56 MHz Other, non-nfc data and command formats Ultrahigh Frequency (UHF) ETSI RFID / EU (865 MHz - 868 MHz), FCC RFID / US (902 MHz - 928 MHz) 5

NFC Operation Modes 6

NFC Devices Smartphones Android, Windows Phone, Blackberry, + New in fall 2017: iphone 7/8 + ios11! iphone 1-5 does not have NFC hardware, iphone 6/7 and Apple Watch usable for payment only (ios <11) Laptops or Desktop PC Built-in or external reader Loudspeakers, headphones, cameras... Payment terminals, Door-locks 7

NFC Tags Most standard HF tags can be used as NFC tag if data is stored on them in NFC forum compliant NDEF format There are currently 5 tag types defined by NFC Forum Being compliant to a NFC tag type provides interoperability with billions of NFC enabled devices Every NFC tag is also an (HF) RFID tag but not vice versa! 8

Common NFC Tags - Chip overview Tag Type Use Case Chip Examples Forum Type 1 User Memory (bytes)* UID Length (bytes) Specialized Innovision Topaz 90-454 4 $ Cost Forum Type 2 Forum Type 3 Forum Type 4 Forum Type 5 (NFC-V / ISO 15693) MIFARE Classic / EV1 Most common, low cost, single application like smart poster, personal label etc. NXP MIFARE UL, MIFARE UL-C, NTAG 203, 210, 212, 213, 46 142 7 $ Specialized, Asian markets Sony FeliCa (Lite) 224 3984 8 $$$ High memory applications, high security (in non NFC mode) If longer read range is required, industrial rugged tags added as forum tag type June 17, 2015. Very common, high memory Not compatible to all devices! NXP MIFARE DESFire EV1/EV2-2K, 4K, 8K, Inside Secure VaultIC 151/161, NTAG 413 DNA, HID Trusted Tag, NXP ICODE SLIx family, EM4233, Fujitsu FRAM MB89R118C, MB89R112, HID Vigo, NXP MIFARE Classic EV1 1K, 4K, MIFARE Plus, 1536-7678 7 $$$ 32 8192 (112 for ICODE SLIx) 8 $ - $$$ 716-3356 4 or 7 $$ 9

Common NFC Tags Device Compatibility Tag Type Android 4 Android 5+ Windows 10 iphone 1-6 iphone 7 with ios 11 NFC Forum Type 2: MIFARE UL, NTAG 2xx No writing to tag NFC Forum Type 4: MIFARE DESFire EV1/2 VaultIC, HID Trusted Tag, NTAG 413 DNA NFC Forum Type 5: ICODE SLIx family NFC Forum Type 5: Non-ICODE SLIx chips e.g. EM4233, Fujitsu MB89Rxxxx, HID Vigo MIFARE Classic / EV1 No writing to tag No formatting (read NDEF only) Selected devices e.g. Galaxy S3 Selected devices only No formatting (read NDEF only) No formatting (read NDEF only) No formatting (read NDEF only) No writing to tag No writing to tag 10

NFC / NDEF Security NDEF NFC data is clear text with optional write protection only Encyption requires a dedicated App Optional signature record type (SRT) 2.0 can be appended to identify author of NFC data Requires few hundred bytes extra memory and PKI certificates Does not prevent data to be copied & data remains in clear text Secure Element (for Card Emulation mode) Hardware options complex to use and inconsistent Software option Host Card Emulation (HCE) from Android 4.4 and Windows 10 onwards 11

How most NFC Tags are used Option 1: Constant URL stored on Tag, Write locked All tags have the same URL Upon tap, the NFC phone will open its browser and access the URL provided by the tag [URL] www.service.com Option 2: URL Combined with Tag UID, Write locked URLs unique by tag, but may be copied Upon tap, the NFC phone will open its browser and access the URL provided by the tag with UID as parameter [UID] 03 B4 25 FF A1 35 80 [URL] www.tag.com [URL+UID] www.service.com?03 B4 25 FF A1 35 80 12

Current uses focus on convenience [URL] www.service.com [URL] www.service.com 13

How to Hack a NFC tag Option A: Copy the tag Use one of many free NFC apps from App Stores Read Tag 1 copy content to Tag 2 Option B: Remember the URL Bookmark the URL after the first tap in your browser or publish/retrieve it from Social media sites etc. The server will not notice a difference from a tapped tag! [URL] www.service.com [URL] www.service.com For some use cases this is critical, for others not [URL+UID] www.service.com?03 B4 25 FF A1 35 80 14

Benefits of Frictionless Trust Frictionless Frictionless Benefits: Easy customer adoption Simple integration Trusted Trusted Benefits: Unclonable Tags Proof of Presence 15

HID Trusted Tag Services Overview 16

How Trusted Tag works Tap Tap Refresh Tap http:// ABCD http:// 7635 http:// 7635 http:// B423 HID Trusted Tags are NFC Forum Tag Type 4 compliant and work with any NFC forum compatible device without requiring special apps! 17

Trusted NFC Use Cases Authenticity Trusted Transactions Secure Proof of Presence Prevent counterfeiting and warranty fraud while also engaging the consumer Controlled Sweepstakes, loyalty point issuance, small data analytics Proving that a person is where they said they were 18

Trust care is delivered & billed accurately Nurse s ID Badge NFC Enabled Phone Trusted Tag securely mounted in patients home 19

Trusted Guard Tour and Keys Live reporting on Proof of Presence Verified via HID Trusted Tag Real, precise location (inside building) Full history No cloning / fake logs possible Management of physical keys 20

Streamline Maintenance & Inspection Improve efficiency with relevant & historical data Secure audit trails to comply with city ordinance Physically link equipment to Computerized Maintenance Management Systems (CMMS) Field technicians are going mobile 21

Mobile Access NFC Card Emulation mode may be used to authenticate against existing access control infrastructure Bluetooth (BLE) may be used as alternative to NFC + Supports all modern devices incl. iphone Requires BLE enabled door locks 22

The right NFC Tag for every use 23

Questions and Answers

hidglobal.com/rfid