Mobile/NFC Security Fundamentals. NFC Application Use Cases: Security Perspectives. Smart Card Alliance and NFC Forum Webinar May 9, 2013
|
|
|
- Edward Jeffery Wright
- 9 years ago
- Views:
Transcription
1 Mobile/NFC Security Fundamentals NFC Application Use Cases: Security Perspectives Smart Card Alliance and NFC Forum Webinar May 9, 2013
2 Introductions Randy Vanderhoof Executive Director, Smart Card Alliance
3 Mobile & NFC Council Raise awareness and accelerate the adoption of all applications using NFC Access control, identity, loyalty, marketing, payments, peer-to-peer, promotion/coupons/offers, transit, Accelerate the practical application of NFC, providing a bridge between technology development/specifications and the applications that can deliver business benefits to industry stakeholders.
4 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance Isis Mobile Wallet and Payment: Tony Sabetti, Merchant Integration Leader, Isis Mobile Commerce Using NFC Devices for Logical Access: Christian Ali, Vice President, Product Management, SecureKey Technologies NFC Forum Tag Use Cases: Jonathan Main, NFC Forum Technical Committee, MasterCard Physical Access Control Use Cases: Steve Rogers, President, IQ Devices Q&A: Randy Vanderhoof, Smart Card Alliance
5 NFC Application Use Cases: Security Perspectives ISIS Mobile Wallet & Payment Tony Sabetti Merchant Integration Leader Isis Mobile Commerce
6 What Is an NFC Mobile Wallet? Application for Smart Phone Holds credentials on Secure Element Presentment via Near Field Communications Your current balance and most recent purchases Your credit and debit cards A prepaid Cash Card Loyalty cards Offers, deals and promotions Contactless indicator is property of EMVCo, LLC
7 Anatomy of an NFC Smart Phone NFC phones contain special hardware Secure Element: Stores sensitive data (e.g. payment card information) NFC Controller: Manages traffic and RF signals NFC Antenna: Collects & transmits the RF Secure Elements protect data via: Encryption keys / Crypto engines Secured Communications Secured memory Secure Element Form Factors: UICC / SIM Cards Embedded MicroSD Cards NFC Antenna Phone Processor NFC Controller NFC Secure Element
8 Secure Element Java Card Operating Platform Secure memory Contact and contactless interfaces ISO7816 and Single Wire Protocol (SWP) Implements Global Platform Smart card specification that defines card components, command sets, transaction sequences Systems specification that standardizes back end systems for personalization, security, key management and application loading Supports multiple security domains - One bank can have its own separate domain for secure credentials and Java applets
9 End to End Security 3 SE runs Global Platform and a JavaCard OS. 4 The Isis wallet running in the Only the bank has the keys to access its handset s host processor does customers payment credentials in the SE. not even know what the payment credentials are. It does provide basic data for display purposes. 1 Bank sends payment credentials via secure connection to the Trusted Service Manager (TSM). Credentials can be encrypted. Phone Processor 5 The credentials are sent through the contactless interface when power is induced by a payment terminal at 4 cm or less distance. 2 TSM uses secure carrier channel used by mobile operator to communicate and transfer credentials directly into the Secure Element (SE) on the UICC (SIM). The credential is never stored in handset memory. NFC 6 All 4 payment networks use Dynamic CVV CVV is changed for each transaction.
10 Security - Consumer Experience Wallet PIN can be set Extremely short distance between handset and payment terminal making it difficult to eavesdrop Dynamic CVV protects against any replay attacks All sensitive data is stored only on the Secure Element and not accessible to the app or phone OS One call to freeze your Isis Mobile Wallet if phone lost or stolen
11 NFC Application Use Cases: Using NFC Devices for Logical Access Christian Ali Vice President, Product Management SecureKey Technologies Inc.
12 Logical Access Options NFC enabled devices support strong logical access use cases for: Government Healthcare Banking Payments Enabled through a trusted device: as a reader of external credentials (various form factors e.g. phone, tablet, laptop, peripheral device) as a proxy credential (mobile)
13 Improved Online Experience Password Baseline Security Password + Intel IPT Improved Website Security Hardware based multi-factor authentication for sign-up/into Improved Security + Better Experience Intel IPT + NFC Sensor All Intel Core & vpro PC (notebook, desktop, convertible, and tablets) will have IPT features enabled for multifactor (device) authentication OEMs adding NFC capabilities to select SKUs Tap and Pay Tap to Authenticate Intel Identity Protection Technology (Intel IPT) + NFC
14 Proxy Credential in Phone Tap card to load credential to verified NFC phone Use phone as credential Requires retrieving credential from Secure Element Tap NFC enabled phone on NFC enabled device Drives a mobile-centric, customer-centric user experience
15 Access Online Gov t Services
16 BYOC
17 Device as your UserID
18 Enter your Passcode
19 Access Granted
20 Secure Healthcare Applications Identity Validation : 1 Patient Taps Card or Phone 2 Checks Credential is Valid Provides Digitally Signed Photo to Authenticate On-line Services : Done! Patient Access To Personal Health Records Click to view health records Government Health Portal Prompt Patient to Tap Card or Phone Device is already verified
21 Secure Healthcare Applications Allows for citizen access to health information when coupled with strong authentication Allows for healthcare provider access to records with citizen consent Login
22 Secure Banking Applications
23 Transfer Funds
24 Confirm Txn Online
25 Multi-Factor with NFC
26 Transfer Complete
27 Securely Extend Online Services
28 NFC Forum Tag Use Cases and Security Jonathan Main NFC Forum Technical Committee, MasterCard
29 NFC Security NFC is a secure technology Security standards are in place Solutions providers and manufacturers can easily add application-appropriate security features Many highly-effective mitigation measures available for tags
30 NFC Enables 3 Different Actions Card in a Phone Reading Tags Making Connections Moves payment, event or ticketing information into a mobile phone Store and redeem with a touch. Get information back at the same time(coupons, receipts, warranties, loyalty points, etc) Enables mobile phones to read inexpensive tags that hold pertinent information Examples include product comparisons, coupons, health care instructions, transit timetables Enables devices to communicate with one another just by touching Examples include connecting laptops and printers. sharing photos between a camera and TV, simple set up of Bluetooth and WiFi
31 Advertising Tap the movie poster to see a film trailer and/or buy a theatre ticket Source: Blue Bite
32 Ensuring Advertising Security Potential vulnerability Tag information changed to direct user to a different (possibly malicious) web address Mitigations Lock the tag prevent overwriting Physical controls to prevent replacement of the tag e.g. display poster behind glass
33 Retail In Aug. 2012, a top 5 consumer packaged food and beverage company piloted a shelf-talker with an embedded NFC tag Shoppers tapped their phones to access recipes, download an app or share on Facebook 36% of shoppers who tapped took an action Engagement with NFC was 12 times higher than QR codes Engagement time increased from 5 sec. to 48 sec. Source: Mobile Commerce Daily
34 Retail A major Australian supermarket chain Tap your phone to the smart poster and receive: Free recipes from a celebrity chef Cookbook videos Source: NFC World
35 Ensuring Retail Security Potential vulnerabilities Modification of information Redirection to malicious web site Mitigations Lock tags prevent overwriting Design displays to prevent physical replacement of tags Sign tags provide integrity of information using NFC Forum Signature RTD Mobile app may verify information source
36 Health Care Tags on prescription jars Provides usage/dosage information for consumers
37 Ensuring Health Care Security Potential vulnerability Modification of prescription information Mitigations Lock tags prevent overwriting Digitally sign tags using Signature RTD Use an app to read tag information and verify signature and information source Include (and check) patient identification information prevent swapping of valid tags
38 NFC and Active Packaging Commercial Uses Package tracking Content identification Temperature exposure log Authentication Source: Kovio
39 Ensuring Active Packaging Security Potential vulnerabilities Modification of data Moving tag to another bottle Mitigations Active tags allow security at application level Include digital signatures on tag using Signature RTD Use tamper-evident labels with tags
40 NFC Tag Security Landscape Vulnerability Attack Mitigation Note Data modification e.g. smart poster Replace tag with another i.e. phishing attack NFC Forum Signature RTD - Data integrity Adds no cost to the tag Eavesdropping e.g. medical history Listen from a distance Encrypt the tag contents or password protected URL Adds no cost to the tag - Tag could have an encryption engine (cost) Data corruption/replace ment e.g. any tag Destroy the tag i.e. denial of service Physical protection Tag replacement can be detected using web analytics Man in the middle e.g.. ticketing Intercept and modify data without parties knowing Secure challengeresponse and/or encryption engine Tag must have a crypto engine e.g. ticketing
41 NFC Application Use Case: Physical Access Control (PACS) Steve Rogers, CSCIP President IQ Devices
42 Traditional PACS Controlled Door Includes Reader, Controller, Locking and Exit Devices LAN / WAN Ethernet TCP/IP Network Server Door Control Panel mount on secure side of door Power Door Contact Typical Door Smart Card Reader Smart Card REX Request to Exit (REX) Electric Strike -mount on secure side of door- mount reader above floor per ADA Traditional PACS Components
43 Traditional PACS Credential ISO14443 Smart Card Student ID Small, Rugged, Reliable Familiar, Easy-to-Carry Form Factor Identity & Identifiers Stored Securely High Resistance to Use by Non-Owner High Resistance to Alteration, Forgery, Duplication (Authenticators) Inexpensive, Well Standardized No Battery or Internal Power Requirement Easily Lost or Stolen
44 Secure NFC Credential NFC Technology in Smart Phones, Offers New Possibilities: Interoperability With ISO14443 Standards-Based Credentials Secure Elements, UICC, SAM, TEE Support Access Rules Keyboard, PIN & Biometric Verification, Screen, Power, Enable Strong Binding Users Control Release of Information, Specific Access Privileges & Authorization, Rules for Each Function Reader & Credential Communication Security, Strong Authentication OTA Provisioning, Just-in-Time Credentials (e.g. Visitors) Access Cloud Identity Infrastructure
45 NFC Smart Phone Security Device Integrity Self Check, App and Hardware Image Isolation of Stored Data Protected Storage and De-Provisioning OTA SAM Management If Smart Phone Lost or Stolen: Issue Temp Key to Alternate Wipe Phone Remove PACS Privilege
46 NFC PACS Pilot Details November Present Phase 1 30 Students & 12 Staff 6 dorms, office, etc. Phase 2 Over 100 students and staff 2 major residence halls 80 AD Locks 4 people per room, 201 residents Ecosystem expanded substantially Vending, Point of Sale, Laundry, PACS Phase 1 Access Control & Laundry 12 main doors,3 elevators w/ floor control Phase 2 Explore alternate student demographics & feedback Executive MBA graduate students at Branch Campus
47 NFC PACS Pilots Physical Access Use your phone as your key! Laundry Vending Machines Bookstores College meal programs
48 Campus Pilot Results 70%-80% = Student Physical Keys & Student Access Cards Lost or Stolen 91% of Students Said Ease-of-Use or Convenience Was The Best Part of NFC. Over 70% Preferred Using Smart Phone to Enter Buildings Over UsingTheir Student ID (Smart Card). 100% of Students Surveyed Would Be Interested in Owning NFC Technology Built Into Their Own Smart Phone BYOD
49 Relative Importance of Benefits Faster 15 Less Likely to Lose/Break 14 Innovative Technology 11 More Secure 6 More Convenient/ Easy to Use 43 Student Survey Data Easy to Replace 6 Reduces Environmental Waste 5
50 Convenience Security A Frictionless Solution Requires the Balance of Convenience & Security Convenience: Always On - Tap and Go Activation Key - Shortcut No Battery = No Problem - Inductive Security: PIN or BIO to activate SE Smart Phone Challenge the Reader Mutual Authentication Support
51 Overwhelming Student Benefit Most common student quote: I sometimes forget my keys, my ID, my watch, my wallet but I NEVER forget my phone
52 NFC Revolutionize PACS Topology?
53 NFC Industry Trends & Growth Drivers NFC-based mobile transactions are expected to reach nearly $50 billion worldwide by Juniper Research Expected 46% of all mobile smart phones will be NFC enabled by Market Research
54 Questions & Answers
55 Mobile & NFC Security Webinar Series Recordings Mobile & NFC Webinar Series Recordings Anatomy of a Mobile Device: Security Architecture and Secure Provisioning Mobile/NFC Security Fundamentals: Secure Elements 101 Mobile/NFC Security Fundamentals : NFC Forum Tags and Security Considerations Mobile/NFC Security Fundamentals : NFC Application Use Cases Security Perspectives Available at:
56 NFC Solutions Summit 2013
57 Randy Vanderhoof, Tony Sabetti, Christian Ali, Jonathan Main, Steve Rogers, Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ (800)
Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance
Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS
MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS MAY 2013 THESE TECHNOLOGIES ARE BECOMING CONVENIENT AND SIMPLE WAYS TO PAY. Every day merchants seek better ways to grow their business and improve efficiency.
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
Bringing Security & Interoperability to Mobile Transactions. Critical Considerations
Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
Inside the Mobile Wallet: What It Means for Merchants and Card Issuers
Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)
D200 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D200 with Mobile Phone 5 Using D200 with wireless (Wi-Fi) router 6 Using D200 with GPRS (requires
U.S. Mobile Payments Landscape NCSL Legislative Summit 2013
U.S. Mobile Payments Landscape NCSL Legislative Summit 2013 Marianne Crowe Vice President, Payment Strategies Federal Reserve Bank of Boston August 13, 2013 2 Agenda Overview of Mobile Payments Landscape
GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1. MasterCard M/Chip Mobile Solution
INTRODUCING M/Chip Mobile SIMPLIFYING THE DEPLOYMENT OF SECURE ELEMENT MOBILE PAYMENTS OCTOBER 2015 GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1 Research into
Innovation with a difference
Innovation with a difference The Smallest, Super Stylish User Engagement Tool Available Today Just 38cm high Perfect for Desk Top Use In Store Shelf Edge Use Mini Kiosk And so much more Not much bigger
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Contactless Payments with Mobile Wallets. Overview and Technology
Contactless Payments with Mobile Wallets Overview and Technology History of Contactless Systems Upass (smartcard) a pre-paid card for the transportation system in Seoul and its suburbs, first used in
Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.
Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,
Mobile Cloud & Mobile Ticketing
Mobile Cloud & Mobile Ticketing T-109.4300 Network Services Business Models Lecture Antero Juntunen Researcher [email protected] Contents Mobile Cloud Introduction Drivers Restraints Conclusions Mobile
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
Security of Proximity Mobile Payments
Security of Proximity Mobile Payments A Smart Card Alliance Contactless and Mobile Payments Council White Paper Publication Date: May 2009 Publication Number: CPMC-09001 Smart Card Alliance 191 Clarksville
Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
THE FUTURE OF SHOPPING INDOOR ANALYTICS AND MOBILE PAYMENT
THE FUTURE OF SHOPPING INDOOR ANALYTICS AND MOBILE PAYMENT Cem Ergün-Müller (Head of Communications, Telekom Innovation Laboratories) March 2014 Streng vertraulich, Vertraulich, Intern Autor / Thema der
Evolving Mobile Payments Industry Landscape
Evolving Mobile Payments Industry Landscape Mobile Banking: Can the Unbanked Bank on It? Sargent Shriver National Center on Poverty Law webinar August 16, 2012 Marianne Crowe Federal Reserve Bank of Boston
Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.
About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
NFC in Public Transport
January 2011 This document is copyright 2005 2011 by the NFC Forum. All rights, including the right to copy and further distribute, are reserved. NFC Forum, Inc. 401 Edgewater Place, Suite 600 Contents
C23: NFC Mobile Payment Ecosystem & Business Model. Jane Cloninger Director
C23: NFC Mobile Payment Ecosystem & Business Model Jane Cloninger Director The mobile phone is the most successful communication device in history Global mobile subscribers (millions) 5,000 4,500 4,000
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
Mobile Financial Services
Mobile Financial Services CANTO AGM 2014 January 27, 2014 27 janvier 2014 1 Agenda MoreMagic and Oberthur Technologies International TopUp and White label The Digital Revolution The Caribbean Opportunity
PopimsCard. Franck GUIGAN [email protected] +33 6 14 63 93 36. The magic card. February 16. 2016
PopimsCard The magic card February 16. 2016 Franck GUIGAN [email protected] +33 6 14 63 93 36 We all need to identify other persons, but official documents are not safe: Authenticating an ID card
Guard All Security Symposium. Identity and Access Management
Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing
CONTACTLESS INTEROPERABILITY IN TRANSIT
NEW SCIENCE TRANSACTION SECURITY ARTICLE CONTACTLESS INTEROPERABILITY IN TRANSIT SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
Opinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments
Opinion piece The mobile wallet already exists! It s called mobile banking By Simon Cadbury Head of Strategy & Innovation Intelligent Environments What do we mean by a Mobile Wallet? The term Mobile Wallet
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors [email protected] 914.325.8111
Fundamentals of EMV Guy Berg Senior Managing Consultant MasterCard Advisors [email protected] 914.325.8111 EMV Fundamentals Transaction Processing Comparison Magnetic Stripe vs. EMV Transaction Security
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Latest and Future development of Mobile Payment in Hong Kong
Latest and Future development of Mobile Payment in Hong Kong About oti Founded in 1990 (NASDAQ: OTIV). Offices in US, Europe, Africa, Asia Global provider of cashless payment solutions Experts in secured
Use Cases for Mobile NFC Meeting Retail
Use Cases for Mobile NFC Meeting Retail, 2012 Neil Garner Founder & CEO Who are Proxama? Enabling Your Mobile Contactless World Proxama is the next generation mobile commerce company that connects the
EMV/NFC/MOBILE PAYMENTS THE TIME IS NOW THE OPPORTUNITY IS HUGE
EMV/NFC/MOBILE PAYMENTS THE TIME IS NOW THE OPPORTUNITY IS HUGE REMEMBER WHEN. What year did VeriFone release the Tranz 330 2 REMEMBER WHEN. 1987 3 WHAT IS CHANGING? EVERYTHING Legislation PCI EMV NFC
The Hang Seng Mobile Payment - FAQs
The Hang Seng Mobile Payment - FAQs A. Introduction to the Service B. Application Requirements C. About the Passcode for the Hang Seng Mobile Payment App D. About Application / Download / Re-activation
Credential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
Deeper Levels of Security with Intel Identity Protection Technology
WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal
Social Media Payment Applications. June 6, 2011
Social Media Payment Applications June 6, 2011 5 th Annual Mobile Banking and Emerging Applications Summit Our Panel Heather Mark, PhD Senior Vice President Market Strategy Preston W. Thornton III Director,
DEVELOPING NFC APPS for BLACKBERRY
1 DEVELOPING NFC APPS for BLACKBERRY NFC Forum, Developers Showcase March 21 st, 2014 Larry McDonough, Principal Evangelist @LMCDUNNA 2 CONTENTS Development on BlackBerry BlackBerry NFC Support 5 most
Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"
!!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$
Secure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Introductions 1 min 4
1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
NFC technology user guide. Contactless payment by mobile
Contactless payment by mobile Table of contents 1. What is contactless payment by mobile? 2. What do I need to shop with my mobile phone? 3. How can I manage a Mobile Card? 4. How do I shop with my mobile
How to connect your D210 using Bluetooth. How to connect your D210 using GPRS (SIM Card)
D210 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D210 with Mobile Phone 5 Using D210 with wireless (Wi-Fi) router 6 Using D210 with GPRS (requires
Desktop Terminals. UK Terminals and Monthly Lease Payments (VAT Excluded) Ingenico ICT250CC. 22.97 + VAT per month. 48 month lease.
UK Terminals and Monthly Lease Payments (VAT Excluded) Desktop Terminals Ingenico ICT250CC 22.97 + VAT per month. 48 month lease. The ict250 has been designed with the goal of ensuring maximum ease- of-
Security on NFC-Enabled Platforms
Security on NFC-Enabled Platforms Building Trust in the New Mobile Applications Ecosystem Whitepaper www.infineon.com/nfc Content A New Stage in the Evolution of Personal Mobility 4-7 The Need for Hardware-based
MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0
MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Chair: Russell Schrader, Visa, Inc., San Francisco, California Vice Chair: Veronica K. McGregor, Jones Day, San Francisco, California
American Bar Association Committee on Consumer Financial Services Electronic Banking and Internet Delivery Subcommittee Winter Meeting Park City, Utah January 7-10, 2012 ELECTRONIC BANKING AND INTERNET
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
HOW TO OPTIMIZE THE CONSUMER CONTACTLESS EXPERIENCE? THE PERFECT TAP
HOW TO OPTIMIZE THE CONSUMER CONTACTLESS EXPERIENCE? THE PERFECT TAP CONTACTLESS PAYMENTS COULD BE 50-60% FASTER THAN PAYING WITH CASH.* By accepting contactless payments, merchants open the door to the
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC
