Mobile RFID Service and Its Security in Korea 17 Nov. 2005 Keon Woo Kim.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

Wireless Testbed in Tsinghua University Fenghua Li Network Research Center of Tsinghua University AsianFI 2008.
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Eclipse, M2M and the Internet of Things
Eclipse, M2M and the Internet of Things
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
M2M middleware service Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
RFID in China for CERP Wenfeng Wang RFID research officer, senior engineer China Electronic Standardization Institute Science honesty faith service.
1 RFID and Telecommunication Services 25th May 2004 DATA BASE forum RFID and Your Phone Sebastian Nyström Nokia Ventures Organization.
1 RFID and Telecommunication Services 25th May 2004 DATA BASE forum THE EPC SYSTEM Sophie Le Pallec Gencod EAN France EPCglobal Project Manager.
A Media Subscription Service By Peter Kriens CEO aQute OSGi Technology Officer
©2003 aQute, All Rights Reserved Tokyo, August 2003 : 1 OSGi Service Platform Tokyo August 28, 2003 Peter Kriens CEO aQute, OSGi Fellow
1 Copyright © 2005, Oracle. All rights reserved. Introduction.
Copyright 2004, NTT1 Triple A (Any device, Anytime, Anywhere): services in ubiquitous networks and their impacts on the AN architecture and systems Jay.
0 - 0.
1 Loosely coupled OPC client used to animate GIS Mariusz Postół Maciej Zbrzezny
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
Overview Environment for Internet database connectivity
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Multi-Application in Smart Card-based Devices Christophe Colas, Chief Software Architect August 2002.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Home control model for smart devices Ho-Jin Park ETRI, Korea ISO/IEC JTC1/SC25/WG1-N1536.
Application Server Based on SoftSwitch
Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
YesTurnkey Network Application Switch Provider 1 RFID Applications for School Campuses Yuh-Rong Leu, Ph.D. CEO 9/1/2010 YesTurnkey Technology, Inc.
Mobile Communication MMS.
Ecosystem Scenarios for Cloud-based NFC Payments
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Omniran ecsg 1 Introduction to OmniRAN EC SG Max Riegel (OmniRAN SG Chair)
NFC Devices: Security and Privacy
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Secure Communication Architectures.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Dongyan Wang GlobalPlatform Technical Program Manager
Mobile Payments Index: Introduction Technologies Payment methods
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
WAP: Wireless Application Protocol Mike Mc Ardle ACSG April, 2005.
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
Online Game JAVA for PDA WAP for Mobile Phone. Java for PDA  Hardware limit - Java API Power Memory  JDK 2M byte. Connectivity Display size.
Programming mobile devices Part II Programming Symbian devices with Symbian C++
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Introduction of Information Security Research Division Dowon Hong, Ph. D. Cryptography Research Team
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Martin Schmidt / The Silent Revolution Mobile Java.
1 授課教授:黃秋煌 學生:賴志勇 學號: M Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.
Mobile Middleware for Energy-Awareness Wei Li
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Jini Architectural Overview Li Ping
FriendFinder Location-aware social networking on mobile phones.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
By Adam Reimel. Outline Introduction Platform Architecture Future Conclusion.
Radio frequency identification (RFID) Opportunities for mobile telecommunication services ______________ ______________.
Introduction to Computers, the Internet and the World Wide Web
MOBILE DEVICE OPERATING SYSTEM
Soohak KIM TTA N-ID Related Standardization of TTA Soohak KIM TTA.
28 May ~ 2 June, 2006 HyoungJun KIM TTA/ETRI
IMS & Wireline to Wireless Convergence
28 May ~ 2 June, 2006 Hyoungjun KIM TTA/ETRI
Presentation transcript:

Mobile RFID Service and Its Security in Korea 17 Nov Keon Woo Kim

Proprietary::: ETRI, The Future Wave ::: 1 Contents 1.Introduction to mobile RFID 2.Mobile RFID Forum in Korea and security issues 3.Mobile RFID service 4.Mobile RFID system with Privacy 5.Mobile RFID terminal platform

Proprietary::: ETRI, The Future Wave ::: 2 Introduction about mobile RFID service NFC(Near Field Communication) 13.56MHz Nokia, Philips, Sony, etc.. Mobile RFID in Korea Mobile RFID forum – –Starts at 03 Feb –6 forum division Cooperating with TTA – One infra structure of IT 839 Interworking of 900MHz RFID system and mobile network RFID reader is built in mobile phone (Portable reader)

Proprietary::: ETRI, The Future Wave ::: 3 Mobile RFID Forum in Korea Terminal division H/W interface such as RFID tag chip and reader chip Air interface between mobile phone and reader RFID – WIPI HAL extension Network division Communication interface between tag and reader RFID – WIPI Middleware Message transport protocol RFID data storage

Proprietary::: ETRI, The Future Wave ::: 4 Mobile RFID Forum in Korea Application division Mobile RFID service presentation & profile Air interface between mobile phone and reader Mobile RFID service User Profile Interworking for RFID mobile phone location tracking PML DTD for mobile RFID service Security division Privacy protection RFID data protection Authentication protocol between tag and reader

Proprietary::: ETRI, The Future Wave ::: 5 Mobile RFID Forum in Korea Main issues in security division Mobile RFID security requirement –Security framework and security requirement for mobile RFID service Mobile RFID service terminal security –Security extension of terminal for security service such as authentication/key management/transport protection Mobile RFID middleware security –Middleware security framework and security protocol Mobile RFID key management –Key transport for tag access control Privacy protection issue

Proprietary::: ETRI, The Future Wave ::: 6 Mobile RFID Forum in Korea Standard item about Security Mobile RFID privacy guideline –To provide the solution to limit the connection with personal information in RFID tags and product information. –To perform the Privacy Impact Assessment and validate adult grade before providing mobile RFID services Security Requirements for Mobile RFID Services –Classification of mobile RFID services and –Defines security and privacy considerations –Fundamental security requirements of mobile RFID service network according to the defined security and privacy considerations.

Proprietary::: ETRI, The Future Wave ::: 7 Mobile RFID Forum in Korea Standard item about Security WIPI Security APIs for Mobile RFID Services –RFID security API for mobile RFID application to guarantee the security for RFID services WIPI Platform Security Model for Mobile RFID Services Adult certification for mobile RFID service –When mobile RFID service provides adult contents, RFID tag gives adult grade stored in RFID user memory area –Mobile RFID reader decides to grant service to user according to adult grade

Proprietary::: ETRI, The Future Wave ::: 8 Mobile RFID Forum in Korea Test division Test/validation Inter-operability test Planning division Policy, IPR management International standardization

Proprietary::: ETRI, The Future Wave ::: 9 Mobile RFID service terminal network application privacy Mobile RFID Terminal security - Requirement for Security framework - Security extension for terminal service Mobile RFID Service infra security - mobile RFID security middleware - mobile RFID privacy framework Secure middleware WIPI based

Proprietary::: ETRI, The Future Wave ::: 10 Privacy problem in mobile RFID service When does privacy problem happen? When a man obtains goods attached tag When a personal information(name/ID/mobile number) is connected to a tag information(Object information) What is privacy information provided in mobile RFID environment? According to privacy policy and profile

Proprietary::: ETRI, The Future Wave ::: 11 Mobile RFID Architecture with Privacy System Mobile phone RFID Reader ODS OTS OIS A Middleware mRFID Application RFID Service Network Mobile Network Root ODS Local ODS RFID User Privacy Service mRFID Privacy System OIS B RFID Middleware

Proprietary::: ETRI, The Future Wave ::: 12 One scenario for privacy protection After buying, access by another man not owner information No.659, Black Color \188, Screen by Privacy Policy DVD 6,900 \ Privacy policy and protection by mRFID Privacy System Top Privacy Level No Privacy Level No.659, Black Color \188, No.659, Black Color \188, Medium Privacy Level No.659, Black Color \188, No.659, Black Color \188,000 Not accessible

Proprietary::: ETRI, The Future Wave ::: 13 Privacy Profile Privacy profile for each service Privacy preference profile Schema by service provider Privacy profile for commercial transaction OII information (P1) : EPC code Personal information (P5) Goods information (P3) Manufacture information(P2) Distribution information (P2) Payment information (P4) Privacy profile for commercial transaction OII information (P1) : EPC code Personal information (P5) Goods information (P3) Manufacture information(P2) Distribution information (P2) Payment information (P4) Privacy profile for medical service OII information (P1) : Tag Identifier Personal information (P5) Medical care insurance number (P4) Illness history information (P5) Cure information (P4) Payment information (P3) Privacy profile for medical service OII information (P1) : Tag Identifier Personal information (P5) Medical care insurance number (P4) Illness history information (P5) Cure information (P4) Payment information (P3)

Proprietary::: ETRI, The Future Wave ::: 14 Mobile RFID terminal platform Mobile RFID terminal Supports RFID application in the WIPI based platform with RFID reader mRFID security on WIPI architecture Whats WIPI? –Wireless Internet Platform for Interoperability WIPI Handset Hardware HAL (Handset Application Layer) HAL (Handset Application Layer) WIPI Run Time Engine WIPI Crypto Library Basic WIPI Spec APIs WIPI Application Manager WIPI Application Manager CletJletMIDlet WIPI Application Contents WIPI-C/Java, J2ME WIPI-C/Java, J2ME Handset Basic Software (Native System Software) RFID Device Handler RFID Engine RFID C/JAVA API RFID C/JAVA API RFID Security API RFID Security API Mobile RFID Application

Proprietary::: ETRI, The Future Wave ::: 15 Mobile RFID security service technology RFID RFID Mobile RFID secure Reader and RFID middleware CDMA / LAN RFID secure M/W - data filterig/logger - System monitering - Server authentication - Access control - Security log-in Security Reader platform based on WIPI RFID security server - Secure communication - Message/tag authentication - Monetering, security policy - XML security mobile RFID Application service RFID Reader RFID Privacy service IBSApplication G/W

Proprietary::: ETRI, The Future Wave ::: 16 Thank You !!