NFC Windows Phone Applications. Development Guidelines

Size: px
Start display at page:

Download "NFC Windows Phone Applications. Development Guidelines"

Transcription

1 NFC Windows Phone Applications Development Guidelines RELEASE 1.0 Date 04/09/2014 Reference afscm-windows-phone-development-guidelines-v doc AFSCM Android development guidelines p1/19 Copyright AFSCM20121

2 Document management Name Company Authors Jérôme Roussel, Erwan Louet Orange Eric Le Bomin SFR Nicolas Sollier EI Telecom Document Manager Grégoire Fraisse AFSCM Document history Version Date Chapters Modification /09/ First release of the guide AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p2/19

3 TABLE OF CONTENTS 1 INTRODUCTION Context Copyright license Purpose and content of this document References Abbreviation Definitions WINDOWS PHONE APPLICATION DEVELOPMENT Development environment Reference guidelines Implementation guidelines Manipulation of logical channels NFC card emulation state NFC transaction event registration Background tasks and transaction events filtering MANAGEMENT RULES Dependencies in terms of device properties and features Usage of personal data Publishing a Windows Phone Mobile Application Structure of the deliverable Preparing to Publish Publishing on Windows Store AFSCM NFC Application Validation Process Windows Phone Application signature Windows Phone Mobile Application update Connectivity General Requirements Network Server Requests Phone numbers Security Requirements Protection of local assets Protection of private user assets Alteration of assets Confidential assets Protection of assets among network communications Prohibited transmissions Secured transmissions Protection of the Environment ANNE: SYNTHESIS OF RULES AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p3/19

4 1 INTRODUCTION 1.1 Context The Mobile Network Operators Bouygues Telecom, Orange and SFR have founded the AFSCM (Association Française du Sans Contact Mobile) to foster the development of mobile contactless services. The AFSCM constituency includes all companies involved in the development of a sustainable market for mobile contactless services such as Service Providers, handset makers, smart card manufacturers, Mobile Network Operators, MVNOs. The AFSCM members include mobile telephony operators, contactless service providers, manufacturers and technical service providers. Together, AFSCM members contribute to the definition of innovative industry standards and best practices. The AFSCM objective is to support the inception of new contactless services for mobile phone users. In particular, the AFSCM endeavors: - To support service providers in the definition and deployment of contactless solutions suited for mobile subscribers to any available mobile network; - To specify technical guidelines for the development of mobile contactless services to ensure seamless installation and consistent end user experience; - To promote the benefits of the mobile phone platform for contactless service providers, technology providers and end users. To define a mutually beneficial mobile contactless eco-system, the AFSCM proposes a shared mobile contactless target mark and a shared brand that distinguishes those contactless services that are available to mobile phone users. Together, the AFSCM members contribute to the definition of innovative industry standards and best practices. The stated objective of the AFSCM is to facilitate the development of mobile contactless services. To this end, the founding members recognize the significance of the following success factors: - Virtuous eco-system in which all parties involved can develop a sustainable market position, - Efficient customer support, - Smooth customer experience, - State-of-the art application life cycle management, - Service portability in the event of a mobile equipment swap. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p4/19

5 1.2 Copyright license The following document is a personal, non-exclusive copyright license between you - the Licensee - and the AFSCM founding members (*), regarding the AFSCM specifications, that must be included in any copy of said specifications. The licensee is authorized to copy, present or communicate the AFSCM specifications on any media without having to pay any license fee under the condition that the following copyright notice be included in any copy or any excerpt of the specifications: «Copyright AFSCM (Association Française du Sans Contact Mobile ; All rights reserved. Terms and conditions to copy, display and communicate these Specifications are available at The licensee is NOT authorized to create or disclose modifications or abstracts of the specifications or work derived from the specifications. The specifications include detailed functional specifications, technical specifications, NFC handset and NFC UICC implementation guidelines, application development guidelines (Mobile Application and Cardlet) and SP-MNO interconnection guidelines. Separate patent licenses and additional materials will be proposed to those wanting to implement solutions compliant with the AFSCM specifications, under licensing conditions to be defined in separate agreements. Information for procuring such patent licenses and additional materials documents is contained in Annex 1. THE SPECIFICATIONS ARE SUPPLIED "AS IS" AND NEITHER THE AFSCM NOR ITS MEMBERS ARE COMMITTED TO ANY WARRANTY, EPLICIT OR IMPLICIT, REGARDING THE SPECIFICATIONS, IN PARTICULAR NO WARRANTY IS GIVEN OF QUALITY, SUITABILITY TO ANY USE WHATSOEVER, ABSENCE OF TITLE OR RIGHTS TO THE CONTENT OF THE SPECIFICATIONS, INSURANCE THAT THE USE OF THE SPECIFICATIONS WILL NOT INFRINGE INTELLECTUAL PROPRETY RIGHTS OF A THIRD PARTY SUCH AS PATENTS, TRADE MARKS, COPYRIGHTS. NEITHER THE AFSCM NOR ITS MEMBERS SHALL BE HELD LIABLE FOR ANY DAMAGE INCURRED IN CONNECTION TO THE USE, REPRESENTATION OR COMMUNICATION OF THE SPECIFICATIONS. Neither the AFSCM name nor its trade marks shall be used under any circumstances, such as to communicate or advertise the specifications without the prior written agreement of the AFSCM. No rights other than the rights described above are granted under this license and the rights granted under this license cannot be construed as conferring, implicitly or explicitly, any rights (through a licensing agreement or any other means) concerning AFSCM or AFSCM members inventions, knowhow or intellectual property, or any of their assets resulting from, based on or required in the specifications. This copyright license is subject to French law and shall be governed by and interpreted according to French laws. The exclusive place of jurisdiction shall be the Paris Court of Appeal, regardless of the number of claims or defendants. By downloading the AFSCM specifications, you indicate your acceptance of these terms and conditions. (*) : AFSCM founding members are : Bouygues Telecom, Orange France / France Telecom, SFR AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p5/19

6 1.3 Purpose and content of this document The purpose of this document is to provide to Service Providers some security rules and best practice guidelines to develop their service Mobile Application on the Windows Phone 8.1 (or later version) mobile operating system. Note: Security rules and best practice guidelines to develop a Cardlet are described in the AFSCM Cardlet Development Guidelines ([R3]). This document focuses on card emulation application development, which is the more specific, lesser documented topic in the industry. The mobile network operators members of the AFSCM have agreed on a common set of rules and recommendations regarding the design and the development of Mobile Applications appropriate for the context of NFC services. This document therefore also serves as a reference for the AFSCM NFC Applications Validation Process as described in the corresponding AFSCM guides ([R2]). This document intends to refer to existing documents and specifications and to highlight the topics that are relevant regarding Mobile Applications development in these documents. The safety of a Mobile Application is achieved through a variety of factors mentioned throughout this document, ranging from the development process to the correct use of the APIs, and the structure of the Mobile Application. In addition, because these applications are intended to be embedded on mobile handsets they require particular care in the usage of the operators and devices resources. Throughout the document, the key points are highlighted with the following icons: Recommended Mandatory AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p6/19

7 1.4 References AFSCM: The following documents are publicly available on the AFSCM website ( [R1] Interface Specification between Telecom Operators and NFC Service Providers [R2] NFC Applications Validation Process [R3] Cardlet Development Guidelines [R4] Guidelines for interconnection of Service Providers' and MNOs' Information Systems The AFSCM also specifies high level requirements for both UICC and mobile handset in separate documents. Microsoft: The following development guidelines are publicly available on the on Microsoft Developer Network (MSDN) website (msdn.microsoft.com): [R5] Windows Runtime app development [R6] App development guide for UICC-based NFC card emulation Microsoft white paper AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p7/19

8 1.5 Abbreviation ACL Access Control List AFSCM Association française du sans contact mobile AID Application (or Applet) IDentifier APDU Application Protocol Data Unit API Application Programming Interface ATR Answer To Reset BIP Bearer Independent Protocol MIDP Mobile Information Device Profile MNO Mobile Network Operator NDEF NFC Data Exchange Format NFC Near Field Communication OTA Over The Air RAM Remote Access Management SE Secure Element SIM Subscriber Identity Module SP Service Provider UICC Universal Integrated Circuit Card (aka SIM) UPI User Primary Interface URL Uniform Resource Locator URI Uniform Resource Identifier 1.6 Definitions Acknowledgment to Security Requirements Cardlet Mobile Application Service Service Provider Validation Entity Declarative document to be provided by the Service Provider for the AFSCM NFC Application Validation Process described in the AFSCM NFC Applications Validation Process guidelines ([R2]) JavaCard application loaded onto the UICC (also known as UICC application or applet) Application loaded onto the mobile handset, providing a GUI (also known as MMI or midlet) Combination of a Cardlet and a Mobile Application (also known as NFC service or Mobile NFC service) Entity which provides an NFC service. Entity in charge of validating that the security level in the applications meets the security requirements (typically, a laboratory). AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p8/19

9 2 WINDOWS PHONE APPLICATION DEVELOPMENT 2.1 Development environment The present guidelines assume an up-to-date Visual Studio environment is being used for development, including Windows Phone 8.1 support. The Windows Phone 8.1 development tools are included starting with Visual Studio 2013 (Update 2 or later). An updated set of APIs has been introduced with Windows Phone 8.1, to build what Microsoft calls Windows Runtime (or Windows Phone Runtime) apps. Windows Runtime (WinRT) is the main framework recommended to create new Mobile Applications for Windows Phone from now on. Cf. Windows Runtime app development ([R5]) on Microsoft Developer Network (MSDN). Microsoft has added a new SmardCards API to develop UICC-based NFC applications in the WinRT framework. The older framework, called Silverlight, keeps evolving from Windows Phone 8.0 to 8.1 but does not include this newer NFC API to build UICC-based NFC applications. This document will thus focus on and cover only WinRT application development using the SmartCard WinRT API found in the Windows.Devices.SmartCards namespace. 2.2 Reference guidelines Microsoft has published a detailed white paper entitled App development guide for UICC-based NFC card emulation ([R6]) which describes specifically how to develop UICC-based NFC applications. This Microsoft white paper is covering all the major aspects to create such applications, including API descriptions, required building blocks, sample code and even certificate creation. This is the must-read reference for all developers targeting the Windows Phone 8.1 platform. 2.3 Implementation guidelines This part provides additional development rules to follow, complementing the reference guidelines mentioned in the previous section Manipulation of logical channels On Windows Phone, only one application is running in foreground at any given time. Due to this, when the user switches away from a Mobile Application, it is either suspended (Dormant state) or terminated (Tombstoned state), depending on the context. In both these states, the SmartCard API (used to access the UICC) is not available anymore. All SmartCard resources created before transmitting APDUs to the SIM will be closed/deleted. For this reason: 1. The Mobile Application must release the UICC logical channel(s) explicitly as soon as possible. This is done using the Dispose method, as in the following example: connection.dispose(); 2. The Mobile Application must release the UICC logical channel(s) explicitly when a Deactivated event is raised, 3. On an Activated event, the Mobile Application must re-open UICC logical channel(s) before transmitting new APDUs. Trying to transmit APDUs using existing SmartCard resources created before the Mobile Application passed in Suspended State will fail. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p9/19

10 Rule 2.3.1: Mobile Applications shall only open logical channels to their respective AID. Rule 2.3.2: Mobile Applications shall explicitly release UICC logical channel(s) as soon as possible after sending all APDUs in a sequence. Rule 2.3.3: On a Deactivated event, Mobile Applications shall explicitly release UICC logical channel(s). Rule 2.3.4: On an Activated event, Mobile Applications shall re-open UICC logical channel(s) before transmitting new APDUs. It is strongly recommended following all the recommendations about Activation/Deactivation provided by Microsoft at: Activation and deactivation best practices for Windows Phone 8 on Windows Developer Network (MSDN). For more details about Windows Phone application life cycle, please refer to both: App activation and deactivation for Windows Phone 8 and Launching, resuming, and multitasking for Windows Phone 8 on Windows Developer Network (MSDN) NFC card emulation state Windows Phone 8.1 gives end users a fine control over the card emulation state. It is therefore important for an NFC Mobile Application to check the activation state of NFC, and warn the end user if card emulation is not permanently enabled. This is done using the Windows.Devices.SmartCards.SmartCardEmulator class. Rule 2.3.5: Mobile Applications should ensure that card emulation is permanently enabled and display appropriate status accordingly NFC transaction event registration Windows Phone 8.1 exposes 3 different types of NFC-triggered events: Transaction event: This event can be registered openly (no specific capability is required to use them) as it is subject to the Access-Control List (ACL) rules on the UICC as defined by the Global Platform standard. Field-entry and field-exit events: These events are not bound to a specific AID and represent a less valuable (generic) interaction with the card reader than the transaction event. They must not be used by application developers for UICC transaction purpose and they must be restricted only to developers with access to specific capabilities granted by Microsoft. NFC transaction events are handled in background tasks. However, for a background task to be notified, a preliminary registration is necessary from the main application. Cf. chapter Smart card WinRT API for event notifications from the Microsoft white paper App development guide for UICC-based NFC card emulation ([R6]) for more details and examples of code. Rule 2.3.6: Mobile Applications willing to be notified by transaction events sent from the UICC shall create a background task and register it from the main application. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p10/19

11 2.3.4 Background tasks and transaction events filtering In order to receive and process transaction notifications triggered by the UICC, a background task is required (cf. Guidelines for background tasks on Windows Developer Network). It must wake up the Mobile Application and launch the corresponding user interface only for transaction events triggered by its own AID, as in the following example: public sealed class NFCTask:IBackgroundTask { const String TAPINTAP_AID = "A "; /* Run method is called when on NFC event */ public void Run(IBackgroundTaskInstance taskinstance) { HandleEvent(taskInstance); } /* HandleEvent treats NFC events */ public void HandleEvent(IBackgroundTaskInstance taskinstance) { var eventdetails = (SmartCardTriggerDetails)taskInstance.TriggerDetails; switch (eventdetails.triggertype) { case SmartCardTriggerType.EmulatorTransaction: } } } // Check that the transaction event was triggered by my own applet if (eventdetails.sourceappletid.equals(tapintap_aid)) { Windows.ApplicationModel.Package.Current.Launch( "/PinPage.xaml?aid=" + eventdetails.sourceappletid + "&data=" + eventdetails.triggerdata ); } taskinstance.getdeferral().complete(); break; Rule 2.3.7: Background tasks capturing NFC transaction events shall check AID and systematically filter out transactions targeting AID they do not own. 3 MANAGEMENT RULES 3.1 Dependencies in terms of device properties and features The list of operating system properties and APIs features accessed by the Mobile Application must be documented and transmitted to the AFSCM and to the Validation Entity during the AFSCM NFC Applications Validation Process as described in the corresponding AFSCM guides ([R2]). Rule 3.1.1: The list of all external APIs imported by the Mobile Application shall be provided (including list of proprietary and device-specific APIs). Rule 3.1.2: The list of all external APIs packaged within the Mobile Application s binary file shall be provided. 3.2 Usage of personal data The list of accessed personal data and the description on their handling must be documented and transmitted to the AFSCM and to the Validation Entity during the AFSCM NFC Applications Validation Process as described in the corresponding AFSCM guides ([R2]). Rule 3.2.1: The list of all personal data accessed by the Mobile Application shall be provided. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p11/19

12 Rule 3.2.2: The type (or category) of each personal data field accessed by the Mobile Application shall be provided. Rule 3.2.3: The list of all files and folders accessed by the Mobile Application shall be provided. Rule 3.2.4: The type of each file accessed by the Mobile Application shall be provided. Rule 3.2.5: A description of usage of read/write accesses on existing personal data elements shall be provided. Rule 3.2.6: A description of creation/deletion of personal data elements shall be provided. Rule 3.2.7: A description of copying, storing and transferring personal data elements and their destination location shall be provided. In France, depending on the type of data accessed, the Service Provider may have to declare this information to the CNIL ( 3.3 Publishing a Windows Phone Mobile Application Structure of the deliverable A Windows Phone Mobile Application (Windows Runtime app) is packaged as an APP file format (file extension.appx). This file format is used for the distribution and installation of bundled components onto the Windows Phone mobile device platform. An APP file is a ZIP-based container file containing the following items: App payload App manifest App block map App signature More details can be found at: App packages and deployment (Windows Runtime apps) on Windows Developer Network (MSDN) Preparing to Publish Publishing a Mobile Application means testing it, packaging it appropriately, and making it available to users of Windows Phone powered mobile devices. Before considering a Mobile Application ready for release, it is recommended to test it using the Windows App Certification Kit which may be downloaded at: Windows App Certification Kit on Windows Developer Network (MSDN) Publishing on Windows Store The complete description of the end-to-end process of getting a Windows Phone Mobile Application into the Windows Store, from signing up through launch may be found at: Overview of publishing an app to the Windows Store on Microsoft Developer Network (MSDN) AFSCM NFC Application Validation Process It is mandatory to perform the NFC Application Validation Process as described in the corresponding AFSCM guides ([R2]) on the Windows Phone Mobile Application to ensure that it respects the rules described in the present guide Windows Phone Application signature In order to allow access to the Cardlet on a UICC containing ACL rules defined following the Global Platform standard, the Mobile Application must include a file signed with any certificate authorized by the ACL rules on the UICC. Re-using an existing certificate is supported (e.g. a certificate used to sign the SP Mobile Application on another operating system such as Android). AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p12/19

13 To generate and include this signed file into your project, please refer to the step by step guidelines found in the Microsoft with paper App development guide for UICC-based NFC card emulation ([R6]) in chapter Using an MO-owned certificate for Global Platform (GP) ACL access. The signature can be applied either by the Service Providers ( SP self-signing mode ) or the Mobile Network Operators ( MNO signing mode ). Remark: The Microsoft step-by-step guidelines are indeed applicable to both SP self-signing and MNO signing modes, despite its title and description making confusing references only to Mobile Operator ( MO ) owned certificates. In MNO signing mode, since the Mobile Application can contain only one unique signed file, the Service Provider will have to publish as many variants of its Mobile Application as there are MNO supported. Rule 3.3.1: In MNO signing mode, the Mobile Application name should include the MNO name in order to guide the end user to the correct Mobile Application Windows Phone Mobile Application update In order to clearly identify a given version of the Mobile Application, it is necessary to systematically increment its version number for each published update. 3.4 Connectivity Rule 3.3.2: When publishing an update, the SP should increment the version number of the Mobile Application General Requirements Many APIs use URLs to refer to resources. Beyond the connection APIs, URLs are also used in media players, and elsewhere. It is therefore very important to determine properties about URLs, because they are used by the verification process to determine which protocols connections resources are used by the Mobile Application. This information can actually be inferred if the URLs comply with simple constraints such as specifying a determined scheme. Rule 3.4.1: The Mobile Application shall only use URLs in which the protocol and destination host are determined. Rule 3.4.2: The Mobile Application shall use fixed host strings (URLs shall not be dynamically built) Network The following rules must be respected by the Mobile Application regarding the network connections: Rule 3.4.3: The Mobile Application shall only use HTTP and HTTPS network connections. In particular, the following low-level protocols are prohibited: datagram, socket, ssl and tcpobex. Rule 3.4.4: The Mobile Application shall not open connections to numerical IP addresses. This rule simply consists in forbidding the usage of numerical IP addresses to meet both portability and security requirements. Rule 3.4.5: The Mobile Application shall not open connections to local host. As previously mentioned, Mobile Applications are not allowed to share data and services with AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p13/19

14 other Mobile Applications. Opening a connection to localhost or to is therefore strictly prohibited since it can be used to get out of the Mobile Application s sandbox, by performing direct exchanges with native code on the platform Server Requests Microsoft defines a method allowing Windows Phone Mobile Applications to request that the device handles an indicated URL. Rule 3.4.6: The Mobile Applications shall not use HTTP requests for downloading files. The use of requests should be limited to Web content browsing Phone numbers The following rules must be respected by the Mobile Application when managing phone numbers: Rule 3.4.7: The Mobile Application shall only use constant or defined phone numbers. This is particularly important to detect costly calls to premium or international numbers. 3.5 Security Requirements Protection of local assets The Mobile Application is responsible for the protection of the local assets (= all the information generated and/or handled by the Mobile Application) during their manipulation. Depending of the type of manipulated asset, the Mobile Application should take appropriate security measures to ensure its protection Protection of private user assets Rule 3.5.1: The Mobile Application shall not access any non-public resources of other Mobile Applications. Rule 3.5.2: The Mobile Application shall neither access the user s MSISDN, nor the IMSI, nor the IMEI Alteration of assets Mobile Applications are not supposed to alter or corrupt the assets managed by the mobile Operating System, mostly because these assets are shared with other Mobile Applications and this could lead to severe functional issues. Rule 3.5.3: The Mobile Application shall not alter user assets without the end user approval (e.g. the Mobile Applications shall not add new contacts or calendar events without the end user approval). Rule 3.5.4: The Mobile Application shall verify the consistency of its database. This rule requests Mobile Applications to perform format verification on the content of the database while inserting or extracting data. This may be useful to detect a record corruption. Rule 3.5.5: The Mobile Application shall verify the consistency of its files. This rule requests Mobile Applications to perform format verification on the content of their own files while inserting or extracting data. This may be useful to detect a file s corruption. Rule 3.5.6: The Mobile Application shall preserve RFID tags integrity. The Mobile Application shall make significant effort to preserve the integrity of the RFID tags it writes (e.g. when writing NDEF tags). AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p14/19

15 3.5.4 Confidential assets The Mobile Application may be responsible to manage confidential assets. These assets are end user s secrets (e.g. service logins and passwords) or application-own assets (e.g. activation or encryption keys). Rule 3.5.7: The Mobile Application shall not define default passwords for accessing its services. Most end users never change the password attributed by the service. Thus, defining default password exposes end users to identity theft attacks. Rule 3.5.8: Mobile Application s secrets shall not be hard coded in plaintext format in the Mobile Application binary file. On some devices and some provisioning servers, the Mobile Application binary file is not protected against disclosure. Thus, an attacker could disassemble the Mobile Application s code and retrieve any secret value it contains. Rule 3.5.9: Secrets shall not be stored in plaintext format in the local storage. Developers should particularly consider the issue about persistent storage as files and databases are exposed to data disclosure. Rule : Secrets shall not be decrypted for comparison. When possible, the Mobile Application should prefer to perform the verification of secrets on encrypted values. This will prevent the Mobile Application from involuntary storing the plaintext secret value Protection of assets among network communications Most of the assets manipulated by the Mobile Application are not intended to be transmitted to any remote entity. This is the purpose of this section which defines the security guidelines accordingly Prohibited transmissions In order to preserve end user's privacy, the Mobile Applications are not allowed to transmit to remote entities some categories of data. Rule : The Mobile Application shall not send Operator and third party data. Usage of Operator data should be restricted to local computations. Rule : The Mobile Application shall inform the end user of the usage and storage of end user identification data, end user authentication data, device localization data and device network identification information when these data are sent to a remote server Secured transmissions For data that could be exchanged between entities, some of them may require the implementation of specific security mechanisms, especially to prevent social-engineering attacks. Rule : The Mobile Application shall implement mutual authentication mechanisms when sending end user personal data or mobile network operator data. Rule : The Mobile Application shall use encrypted communications when sending end user personal data or mobile network operator data. Rule : The design of the Mobile Application should not permit replay attacks. This is the only server-oriented security requirement mentioned in this document as it has some impact on the implementation of the local agent. In particular requests to remote servers should be protected against replay attacks, especially authentication requests, as it should not be possible for an attacker to illegally authenticate on servers. Rule : The Mobile Application shall be able to handle the cases when the Cardlet is not present on the UICC. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p15/19

16 3.6 Protection of the Environment The security of Mobile Application does not only concern local features, but also requires considering the global environment. Mobile handsets are mobile items in a wide network connecting personal computers, other handsets, other devices (headphone, GPS receiver), through several operating systems and protocols. Thus, the Mobile Applications are not only the direct target of the attacks: they could be used as communication interfaces (e.g. to propagate a malware program). Rule : The Mobile Application shall not send any executable program to remote entities. A Mobile Application shall not be a vector to propagate malware programs among the network. The Mobile Applications that send some files are intended to verify these files are not executable files. Rule : The Mobile Application shall not send binary SMS/MMS messages containing executable code. This rule is an extension of the previous rule, to precise that is also applies to SMS or MMS binary messages: executable code shall be prohibited in the body of these messages. Rule : The Mobile Application shall not intensively use network resources. In particular, the Mobile Application shall not massively send s or any kind of data because: - It implies a cost to the end user; - It could have a significant impact on the bandwidth; - It could be associated to spam operations. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p16/19

17 Mandatory Recommended Changed? (*) 4 ANNE: SYNTHESIS OF RULES The following table lists all the rules defined in the present guide and indicates for each rule if it is a requirement (mandatory) or a recommendation (recommended), and if it is new or updated (or if it has been suppressed). Rule ID and description Rule 2.3.1: Mobile Applications shall only open logical channels to their respective AID. Rule 2.3.2: Mobile Applications shall explicitly release UICC logical channel(s) as soon as possible after sending all APDUs in a sequence. Rule 2.3.3: On a Deactivated event, Mobile Applications shall explicitly release UICC logical channel(s). Rule 2.3.4: On an Activated event, Mobile Applications shall re-open UICC logical channel(s) before transmitting new APDUs. Rule 2.3.5: Mobile Applications should ensure that card emulation is permanently enabled and display appropriate status accordingly. Rule 2.3.6: Mobile Applications willing to be notified by transaction events sent from the UICC shall create a background task and register it from the main application. Rule 2.3.7: Background tasks capturing NFC transaction events shall check AID and systematically filter out transactions targeting AID they do not own. Rule 3.1.1: The list of all external APIs imported by the Mobile Application shall be provided (including list of proprietary and device-specific APIs). Rule 3.1.2: The list of all external APIs packaged within the Mobile Application s binary file shall be provided. Rule 3.2.1: The list of all personal data accessed by the Mobile Application shall be provided. Rule 3.2.2: The type (or category) of each personal data field accessed by the Mobile Application shall be provided. Rule 3.2.3: The list of all files and folders accessed by the Mobile Application shall be provided. Rule 3.2.4: The type of each file accessed by the Mobile Application shall be provided. Rule 3.2.5: A description of usage of read/write accesses on existing personal data elements shall be provided. Rule 3.2.6: A description of creation/deletion of personal data elements shall be provided. Rule 3.2.7: A description of copying, storing and transferring personal data elements and their destination location shall be provided. Rule 3.3.1: In MNO signing mode, the Mobile Application name should include the MNO name in order to guide the end user to the correct Mobile Application. Rule 3.3.2: When publishing an update, the SP should increment the version number of the Mobile Application. Rule 3.4.1: The Mobile Application shall only use URLs in which the protocol and destination host are determined. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p17/19

18 Mandatory Recommended Changed? (*) Rule ID and description Rule 3.4.2: The Mobile Application shall use fixed host strings (URLs shall not be dynamically built). Rule 3.4.3: The Mobile Application shall only use HTTP and HTTPS network connections. In particular, the following low-level protocols are prohibited: datagram, socket, ssl and tcpobex. Rule 3.4.4: The Mobile Application shall not open connections to numerical IP addresses. This rule simply consists in forbidding the usage of numerical IP addresses to meet both portability and security requirements. Rule 3.4.5: The Mobile Application shall not open connections to local host. As previously mentioned, Mobile Applications are not allowed to share data and services with other Mobile Applications. Opening a connection to localhost or to is therefore strictly prohibited since it can be used to get out of the Mobile Application s sandbox, by performing direct exchanges with native code on the platform. Rule 3.4.6: The Mobile Applications shall not use HTTP requests for downloading files. The use of requests should be limited to Web content browsing. Rule 3.4.7: The Mobile Application shall only use constant or defined phone numbers. This is particularly important to detect costly calls to premium or international numbers. Rule 3.5.1: The Mobile Application shall not access any non-public resources of other Mobile Applications. Rule 3.5.2: The Mobile Application shall neither access the user s MSISDN, nor the IMSI, nor the IMEI. Rule 3.5.3: The Mobile Application shall not alter user assets without the end user approval (e.g. the Mobile Applications shall not add new contacts or calendar events without the end user approval). Rule 3.5.4: The Mobile Application shall verify the consistency of its database. This rule requests Mobile Applications to perform format verification on the content of the database while inserting or extracting data. This may be useful to detect a record corruption. Rule 3.5.5: The Mobile Application shall verify the consistency of its files. This rule requests Mobile Applications to perform format verification on the content of their own files while inserting or extracting data. This may be useful to detect a file s corruption. Rule 3.5.6: The Mobile Application shall preserve RFID tags integrity. The Mobile Application shall make significant effort to preserve the integrity of the RFID tags it writes (e.g. when writing NDEF tags). Rule 3.5.7: The Mobile Application shall not define default passwords for accessing its services. Most end users never change the password attributed by the service. Thus, defining default password exposes end users to identity theft attacks. Rule 3.5.8: Mobile Application s secrets shall not be hard coded in plaintext format in the Mobile Application binary file. On some devices and some provisioning servers, the Mobile Application binary file is not protected against disclosure. Thus, an attacker could disassemble the Mobile Application s code and retrieve any secret value it contains. Rule 3.5.9: Secrets shall not be stored in plaintext format in the local storage. Developers should particularly consider the issue about persistent storage as files and databases are exposed to data disclosure. AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p18/19

19 Mandatory Recommended Changed? (*) Rule ID and description Rule : Secrets shall not be decrypted for comparison. When possible, the Mobile Application should prefer to perform the verification of secrets on encrypted values. This will prevent the Mobile Application from involuntary storing the plaintext secret value. Rule : The Mobile Application shall not send Operator and third party data. Usage of Operator data should be restricted to local computations. Rule : The Mobile Application shall inform the end user of the usage and storage of end user identification data, end user authentication data, device localization data and device network identification information when these data are sent to a remote server. Rule : The Mobile Application shall implement mutual authentication mechanisms when sending end user personal data or mobile network operator data. Rule : The Mobile Application shall use encrypted communications when sending end user personal data or mobile network operator data. Rule : The design of the Mobile Application should not permit replay attacks. This is the only server-oriented security requirement mentioned in this document as it has some impact on the implementation of the local agent. In particular requests to remote servers should be protected against replay attacks, especially authentication requests, as it should not be possible for an attacker to illegally authenticate on servers. Rule : The Mobile Application shall be able to handle the cases when the Cardlet is not present on the UICC. Rule : The Mobile Application shall not send any executable program to remote entities. A Mobile Application shall not be a vector to propagate malware programs among the network. The Mobile Applications that send some files are intended to verify these files are not executable files. Rule : The Mobile Application shall not send binary SMS/MMS messages containing executable code. This rule is an extension of the previous rule, to precise that is also applies to SMS or MMS binary messages: executable code shall be prohibited in the body of these messages. Rule : The Mobile Application shall not intensively use network resources. In particular, the Mobile Application shall not massively send s or any kind of data because: - It implies a cost to the end user; - It could have a significant impact on the bandwidth; - It could be associated to spam operations. (*) In this column, the rules are marked: if this rule is, compared with the previous version of the specification Upd. if this rule has been Updated from the previous version of the specification Suppr. if this rule was in the previous version of the specification and has been Suppressed If a rule has been kept as-is from the previous version of the specification, it is not marked END OF DOCUMENT AFSCM NFC Windows Phone Applications Development Guidelines v1.0 p19/19

NFC Android Applications

NFC Android Applications NFC Android Applications Development Guidelines RELEASE 2.0.8 Date 30/01/2015 Reference afscm-android-development-guidelines-v2.0.8-20150130.doc AFSCM Android development guidelines v2.0.7 ( p1/39 Copyright

More information

NFC Mobile Handset High Level Requirements V2

NFC Mobile Handset High Level Requirements V2 NFC Mobile Handset High Level Requirements V2 Release 2.0 Date : 28/09/2011 Reference: 110928 - AFSCM TECH - LIVBL - NFC Mobile Handset High Level Requirements - v2.0.doc AFSCM NFC Mobile Handset High

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Smartcard Web Server Enabler Architecture

Smartcard Web Server Enabler Architecture Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use

More information

SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum

SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum Version 1.00 November 8, 2013 Addendum to: SD Specifications Part 1 Physical Layer Simplified Specification Version

More information

PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING

PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING SUMMARY The use and downloading of the SDK is subject to the signing of the TomTom Mutual NDA for Apps. The TomTom SDK Terms of Use are applicable

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

DailyMailz may collect and process the following personal information about you:

DailyMailz may collect and process the following personal information about you: Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and

More information

COLOCATION AGREEMENT. 1. Term and Payment for Services

COLOCATION AGREEMENT. 1. Term and Payment for Services COLOCATION AGREEMENT This Colocation Agreement ( Agreement ) governs your purchase and use of all colocation and related services (the Services ), as described in the Order Form, that you order and Oracast,

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Automatic Recurring Payment Application

Automatic Recurring Payment Application Automatic Recurring Payment Application Schedule your payment to be automatically charged to your credit card. Just complete and sign this form to get started! Here s How Recurring Payments Work: You authorize

More information

The Role of the Trusted Service Manager in Mobile Commerce

The Role of the Trusted Service Manager in Mobile Commerce About the GSMA The GSMA represents the interests of mobile operators worldwide. Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators with 250 companies in the broader

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4 Mobile MasterCard PayPass UI Application Requirements February 2013 - Version 1.4 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

DEVELOPING NFC APPS for BLACKBERRY

DEVELOPING NFC APPS for BLACKBERRY 1 DEVELOPING NFC APPS for BLACKBERRY NFC Forum, Developers Showcase March 21 st, 2014 Larry McDonough, Principal Evangelist @LMCDUNNA 2 CONTENTS Development on BlackBerry BlackBerry NFC Support 5 most

More information

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.

More information

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015 WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Website & Email Hosting Terms & Conditions

Website & Email Hosting Terms & Conditions Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Application Note. Gemalto s SA Server and OpenLDAP

Application Note. Gemalto s SA Server and OpenLDAP Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that

More information

The BlackBerry Internet Solution from Sure Service Specific Terms and Conditions

The BlackBerry Internet Solution from Sure Service Specific Terms and Conditions The BlackBerry Internet Solution provides access to the Internet and email via a bespoke handheld device, known as a BlackBerry. It is a secure and reliable solution that delivers mobile email and Internet

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

PHP POINT OF SALE TERMS OF USE

PHP POINT OF SALE TERMS OF USE PHP POINT OF SALE TERMS OF USE This Terms of Use Agreement (the Agreement ) states the terms and conditions that govern the contractual agreement between PHP Point of Sale, LLC, (the Company ) and you

More information

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT PLEASE READ THIS LICENSE AND REMOTE HOSTED SERVICES AGREEMENT CAREFULLY BEFORE USING THIS WEB SITE BY CHOOSING THE ACCEPT BUTTON YOU ARE (1)

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Rhea Help Desk Software End User License Agreement

Rhea Help Desk Software End User License Agreement Rhea Help Desk Software End User License Agreement THIS "END USER LICENSE AGREEMENT" (THE "EULA") IS A LEGAL AGREEMENT BETWEEN THE INDIVIDUAL OR LEGAL ENTITY OR ASSOCIATION INTENDING TO USE THE SOFTWARE

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

B. Terms of Agreement; Google Terms of Service; Conflicting Provisions

B. Terms of Agreement; Google Terms of Service; Conflicting Provisions OHSU Email Address for Life Terms and Conditions These Terms and Conditions govern your activation, receipt, and use of an @alumni.ohsu.edu email account. Activating an @alumni.ohsu.edu email account constitutes

More information

Guidelines for smart phones, tablets and other mobile devices

Guidelines for smart phones, tablets and other mobile devices Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website.

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website. Terms and Conditions of Use Your online payroll is run via for MyPAYE Online Payroll Service Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online

More information

Technical Help Desk Terms of Service

Technical Help Desk Terms of Service Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection

More information

3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract

3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract 3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08 Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End

More information

NBT Bank Personal and Business Mobile Banking Terms and Conditions

NBT Bank Personal and Business Mobile Banking Terms and Conditions This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

computer to identify you as a unique user and to take into account your personal preferences and technical information. We use:

computer to identify you as a unique user and to take into account your personal preferences and technical information. We use: BMS CONSULTING WEBSITE TERMS AND RULES OF USE www.bms-consulting.com This site and associated websites referenced by links (collectively, the Site) provide information on services, projects, solutions

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting your privacy.

Public Health England, an executive agency of the Department of Health (We) are committed to protecting and respecting your privacy. PRIVACY POLICY 2015 PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

ETSI TS 102 176-2 V1.2.1 (2005-07)

ETSI TS 102 176-2 V1.2.1 (2005-07) TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms

More information

PrivyLink Internet Application Security Environment *

PrivyLink Internet Application Security Environment * WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Authorize.Net Mobile Application

Authorize.Net Mobile Application Authorize.Net Mobile Application ios User Guide October 2015 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC ( Authorize.Net ) has made

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE THESE TERMS OF USE CONTAIN LEGAL OBLIGATIONS. PLEASE READ THESE TERMS OF USE BEFORE USING THIS WEBSITE. Acceptance of these Terms of Use and any

More information

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions Table of Content Introduction Overview System Requirements Software Install and Uninstall Install Uninstall Software Features and GUI Software Menu Options Software Navigation Quick Getting Started Guide

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Technical Specifications (GPGPU)

Technical Specifications (GPGPU) TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

Terms and Conditions

Terms and Conditions Terms and Conditions The following Terms and Conditions define the conditions of use of the website http://www.adbuddiz.com/ (hereinafter the Website ), edited by SAS PURPLE BRAIN, registered at the Paris

More information

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected

More information

Two-Factor Authentication: Tailor-Made for SMS

Two-Factor Authentication: Tailor-Made for SMS SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor

More information

Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers.

Computer Scene Technical Ltd (We) are committed to providing the best service and protecting & respecting all our customers. Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers. INFORMATION ABOUT US Our site is operated by Computer Scene Technical Ltd

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.

Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................

More information

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview M2M Machine-to-Machine Intelligence Corporation M2M Intelligence Architecture Overview M2M Intelligence - Essential platform for the M2M and IoT Economy Architecture Overview Revised styles and edits 6/3/2016

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

SSL Overview for Resellers

SSL Overview for Resellers Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an

More information

Sage CRM Connector Tool White Paper

Sage CRM Connector Tool White Paper White Paper Document Number: PD521-01-1_0-WP Orbis Software Limited 2010 Table of Contents ABOUT THE SAGE CRM CONNECTOR TOOL... 1 INTRODUCTION... 2 System Requirements... 2 Hardware... 2 Software... 2

More information

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information