We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTurner Matherson
Modified about 1 year ago
© ZigBee Alliance. All rights reserved. 1 Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG, July 2012
CONFIDENTIAL © ZigBee Alliance. All rights reserved. 2 Natural Security provides the first efficient and really easy-to- use three-factor authentication solution by enabling a consumer to conduct a transaction without manipulating its personal device or card The transaction is executed using a mid-range distance contactless interface combined with biometric authentication of the consumer The solution provides a unique user experience to authenticate for a wide range of services: – Physical or logical access control – Payment, Cash withdrawal – Secure access to Internet services Biometrics are securely stored in a secure element embedded in the consumer device providing increased privacy (no biometrics data stored remotely in data base, no PIN entering) Natural Security key features
CONFIDENTIAL © ZigBee Alliance. All rights reserved. 3 How does it work ? Acceptance devicesConsumer devices Wireless network range: 3 to 9 feet Fob Card all-in-one Mobile handset
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Pilot implementation being launched in 2 locations in France Secured payment transaction using chip and PIN technologies – payment transaction executed in a few seconds – no card to manipulate, no PIN to enter First pilot in the world using 2 different biometric technologies (fingervein and fingerprint) in a real payment environment Pilot implementation: payment 4
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Real life transaction execution 5
CONFIDENTIAL © ZigBee Alliance. All rights reserved. 6 Natural Security innovation brings to the ZigBee Alliance the fast growing strong authentication market Corporate Healthcare Government & Administration Transportation School campus Retail Financial institution Market Verticals Targeted
CONFIDENTIAL © ZigBee Alliance. All rights reserved. 7 Services targeted & Market size Physical & Logical access> 1 billion badges* Secure access to web server> 2 billions PC* Payment2.5 billions cards** 37 millions POS** Cash withdrawal2.2 millions ATM** Market Segments Targeted * estimate ** source Eurosmart
CONFIDENTIAL © ZigBee Alliance. All rights reserved – Project started by banks and retailers 2008 – Company creation 2010 – General availability of the first version of the specs, first proofs of concept – Launch of the commercial phase – Several pilots planned in 2012: payment (open and close loop), access control (physical and logical), mobile payment – Development of industrial "off-the-shelf” NS products Timeline 8
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Our Partners 9 Shareholders First vendors Memberships Technical partners Other vendors coming soon naccu.org
© ZigBee Alliance. All rights reserved. 10 WPAN Components 10
CONFIDENTIAL © ZigBee Alliance. All rights reserved. NFC (not adopted) – Require the consumer to handle the device to execute a transaction which takes beyond the 3 sec. maximum transaction time – Does not provide a unique user experience for all types of transactions – Strong concern on the security and the confidentiality of the solution (data transmitted in clear between the merchant and the consumer devices) Bluetooth Smart (a.k.a. BTLE) (not adopted) – Modulation scheme susceptible to interference – NS-WPAN architecture challenging to implement – Latency variability too large for requirements IEEE (adopted) – Native support for NS-WPAN architecture – Acceptable, predictable latency Technologies evaluated 11
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Our WPAN implementation must respect several key requirements defined by government agencies such as : – Anonymous – No traceable protocol – Star topology (mesh topology cannot be used, introduces risk factors) – Fully reconfigurable, no coordinator And we add : – Dynamic and mobility – Mid range (between 1m to 3m) – High density of device – And low cost … Why do we need a « new » stack ? 12
CONFIDENTIAL © ZigBee Alliance. All rights reserved. matrix of market requirements against network features 13
CONFIDENTIAL © ZigBee Alliance. All rights reserved. AspectNFCBluetoothBluetooth Low Energy RFID compatibleISO activeActive StandardisationbodyISO/IECBluetooth SIG Network StandardISO etc.IEEE Network TypePoint-to-pointWPAN Cryptographynot with RFIDavailable Range< 0.2 m~100 m (class 1)~50 m Frequency13.56 MHz2.4–2.5 GHz Bit rate424 kbit/s2.1 Mbit/s~1.0 Mbit/s Set-up time< 0.1 s< 6 s< s Power consumption< 15mA (read)varies with classe< 15 mA (transmit or receive) Comparaison NFC / Bluetooth 14
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Natural security Network Topology 13 WAD WPD POS1 Retail A POS2 POS1 Retail B Retail C
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Our stack will be implemented by several vendors Large organizations such as payment schemes will adopt this protocol only if it is owned and supported by an open association We conducted research to use other stacks or protocols (ZigBee pro, RF4CE, Dash7, Bluetooth) They don't meet our key business, technical and security requirements BLE could also be a potential good candidate however, is considered as the best option at present Why do we need a « ZigBee » stack ? 16
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Technical specification developed by natural security Test plan developed by UL (RFI Global) The stack has been implemented on several chips used by multiple vendors: Atmel TI ST (being currently tested) Strong, active support of large retailers and financial institutions Current situation 17
CONFIDENTIAL © ZigBee Alliance. All rights reserved. Creation of a WG Natural Security proposes to act as technical editor and chair of the WG Natural Security will provide for free The specification The test plan Next steps … 18
© ZigBee Alliance. All rights reserved. 19 Thank you 19
© ZigBee Alliance. All rights reserved.www.zigbee.org
EMV 101 Michelle Lehouck EMV Product Manager CPI Card Group.
© ASSA ABLOY. All rights reserved. Data Connectors HID Global January 2010.
Smart Cards & RFID Name: Yousef Yahya Foad ajjawi Dr. Loai Tawalbeh.
© 2011 Cisco and/or its affiliates. All rights reserved.Cisco ConfidentialIP in Smart Object Networks V1.7 1 IP in Smart Object Networks Jeff Apcar, Distinguished.
Introduction to Zigbee Wireless Sensor Networks. Sensor Network Challenges Low computational power Less than 10 MIPS Low memory budget: 4-10 KB Limited.
© University of Cancun, Mexico1 Chapter 8: Green computing and Communication Architecture 1 Tarik Guelzim, 1 Mohammad S. Obaidat, Fellow of IEEE 1 Monmouth.
The Smart Card Platform Gaby Lenhart Project leader ETSI Technical Committee Smart Card Platform (TB SCP)
Wireless Networks. Presentation Outline Wireless Technology overview The IEEE WLAN Standards Securing Wireless LANs.
Chapter  Internet And Other Technologies Created By Manish Mathur.
Bank of America Merchant Services ASTRA Meeting Shirley Davis, Relationship Manager JD Wilks, Technical Relationship Manager Melinda Speer, Strategic Account.
1 Distance Banking Services (DBS) Maria Gorchakova (BSUEL, Russia) Introduction of Distance Banking Services 1. Definition of Distance Banking Services.
Wireless Communications UniForum Chicago October 26,2004 Bill Latura.
Chapter 9 Mobile Computing and Commerce And Pervasive Computing.
Wireless Markup Language - Vedantis. Copyright © [Vedantis Inc.]. All rights reserved Wireless Markup Language o Introduction Internet today has made.
Communication for the open minded Study on user identification methods in card payments, e-payments and mobile payments Summary of recommendations (WP5)
The Single Chip Wireless Solutions Company. Introducing BlueCore2-External, the second generation Bluetooth solution Cambridge Silicon Radio Unit 300,
MOBILE PAY PRODUCT SUITE MOBILE PAYMENT APPLICATION GENERAL PURPOSE RELOADABLE (GPR) CARD SOLUTION MERCHANT CASH ADVANCE PROGRAM CLOUD BASED POINT OF SALE.
Submission November 2008 Bob Heile, ZigBee Alliance November 2008 Myung Lee, CUNYSlide EC Agenda Items Bob Heile Nov. 14, 2008.
M-COMMERCE Md. Rashedul Hasan. The Wireless Revolution We are seeing a widespread convergence in wireless technology and the services it offers. If content.
National Safety Compliance, Inc. …because safety is never an accident… Presentation works best if displayed on a computer with an active internet connection.
PROPRIETARY INFORMATION. Do not reproduce, distribute or disclose. No authorized use. ® 2007 HID Global Corporation. All rights reserved. RFID / ID Security:
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
1 open alliance to network the physical world 2 Nov David E. Culler.
© 2008 Cisco Systems, Inc. All rights reserved.C Cisco Confidential Secure Wireless Plant ETSI Hells Kitchen. June 2008 Patrick Wetterwald.
CHTP REVIEW. HFTP Todays Session Structure Four-Hour Review Designed for Exam Review Sectioned Same as Exam Breaks when needed.
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013.
Auto-ID (RFID) Solution Proposal Business and Technical Objectives for Low-Cost Smart Items Dr. Richard Swan SAP Corporate Research Center Palo Alto
1 / 99 E - Banking 2 / 99 Outline Introduction to e-Banking What is an e-Bank and why to do e-Banking Some facts about e-Banking Bankers’ Point of.
© 2016 SlidePlayer.com Inc. All rights reserved.