NFC based payment: how will it develop relative to upcoming alternative approaches? Hong Kong | March 2014.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Accelerate the on-boarding of Service Providers in Trusted Infrasturcture Virginia Chan, Vice President Hong Kong Mar 19 th, 2014.
Ecosystem Scenarios for Cloud-based NFC Payments
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
0 © 2011 Silver Spring Networks. All rights reserved. Building the Smart Grid.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
The GSMA July 2014 Restricted - Confidential Information
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
NFC Devices: Security and Privacy
© ZigBee Alliance. All rights reserved. 1 Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG, July 2012.
Květen 2014 Co se stane s kartami ve světě chytrých věcí? Jan Němec.
NFC Technology and Applications Assaf Sella CTO Texas Instruments Israel Feb
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
© 2012 Presented by: Preparation For EMV Chip Technology Keith Swiat.
Our Eyes are on the watch for you! One Stop Shop Payment Automation: Innovative and Smart platform that: Increase Sales and Merchant Retentions Creates.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Dongyan Wang GlobalPlatform Technical Program Manager
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
PCI and how it affects College Stores… ROBIN MAYO | PCIP ECOMMERCE MANAGER EAST CAROLINA UNIVERISTY.
THE TRANSFORMATION OF PAYMENTS. NFC Hosted Payments EMV in the US End-to-End Encryption Mobile POS.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Bluetooth Low Energy Based Ticketing Systems 11 th February, 2015 Sriharsha Kuchimanchi Supervisor: Prof. Riku Jantti Instructor: Shkumbin Hamiti.
Thriving in a Hybrid World Dean J. Marsh Vice President, Client Success IBM Analytic Solutions.
Olivier Amiot Director, Enterprise Marketing Sierra Wireless mHealth.
Lessons Learned in Smart Grid Cyber Security
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Copyright © 2009 Pearson Education, Inc. Slide 5-1 Chapter 5 Online Security and Payment Systems.
·
Future Tense: Contemplating the Impending Transition to Digital Wallets and Mobile Prepaid Platforms Over the Next 5 Years Thursday, June 11, 2:25 p.m.
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
Near Field Communication Systems Patras, July 2006.
Mobile App NFC Urbana & Moneta september 2014
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
1 Progress Report from NFC Working Group General Meeting Copenhagen 18 April 2013 Round Table 1.
Mobile Wallets Tackling the multi-wallet problem to achieve mass market adoption of contactless payment services.
Innovation in Business Tom Henriksson Director, Nokia Emerging Business Unit October 3, 2006.
Mobile Payments: Key IT Law Issues Sony Gokhale October 26, 2015
Payment and Wireless Technologies. Engineering Services. July 2015.
verifone HQtm Estate Management Solution
Global Product Marketing
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
Tekla Model Sharing and Microsoft Azure Create Secure and Seamless Collaboration Environment for Construction Projects, Locally and Globally MICROSOFT.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
WMO WIS strategy – Life cycle data management WIS strategy – Life cycle data management Matteo Dell’Acqua.
Santa Clara 2008 Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing
A catalyst for mobile contactless payments adoption?
SIMalliance Members & Strategic Partners
English for Advance Learners I
SIMalliance Members & Strategic Partners
SIMalliance Members & Strategic Partners
Microsoft /21/ :25 AM THR3060 Empowering education for students through the power of Microsoft Azure & Server 2016 Annur Sumar CTO, MaeTech.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
ALSO Network - Microsoft update
Near Field Communication (NFC) Market
Chapter 4 E-commerce Security and Payment.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 mPOS Terminal Market unit shipment.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
ideas to mobile apps in record time,
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
PLANNING A SECURE BASELINE INSTALLATION
Automated Fare Collection 2.0 Next Generation MBTA Fare System
Zendos Tecnologia Utilizes the Powerful, Scalable
Payment Innovations PAYMENT INNOVATIONS DIGITAL PAYMENT SOLUTIONS.
Presentation transcript:

NFC based payment: how will it develop relative to upcoming alternative approaches? Hong Kong | March 2014

Promoting safe living and working environments Safe products Safe buildings Safe workplaces Safe water, food & health Safe, clean energy About UL… Promoting safe living and working environments Certify Validate Test Inspect Audit Advice & Educate We Be the best, and achieve meaningful size in all that we do

About UL Transaction Security Compliance Security Working towards a safer world by being the number one independent center in Transaction Security Technology Unrivalled expertise across industry domains State-of-the-art services/products portfolio Recognition in our local markets – Thought Leadership Scalable offering Service offering

Mobiel Betalen Nederland UL supports worldwide many mCommerce initiatives with advisory services Weve ISIS “UL staff has been extremely valuable to ISIS in supporting the testing and integration of our TSM.” “.. the UL team always considered any issues beyond just the technical aspects and looked at the wider commercial and customer implications, which was and is invaluable for us.” “The strategic workshops hosted by UL TS at the start of our project were crucial to create a common vision and helped us to speed up the project” “The effort from the UL team has been crucial for our project. Their competence, attitude and hard work have been inspiring for us all.” Customer References DNB & Telenor Mobiel Betalen Nederland

Agenda Alternative approaches to NFC-based payments Alternative to SE-based NFC implementation Impact and Outlook

QR/Bar codes: remotely-based Merchant’s physical shop Trigger redirects payment transaction to e-money transfer Internet Lifecycle management E-Money Service Authentication and payment transaction (e-money transfer) Internet

Bluetooth Low Energy: remotely-based Merchant’s physical shop Trigger redirects payment transaction to e-money transfer Internet Lifecycle management E-Money Service Authentication and payment transaction (e-money transfer) Internet

BLE: How does it work? User experience perspective The Beacon network at the store is aware that consumer is in the area and “checks him in” after he approves so. Proximity marketing when consumer passes nearby B&M store Consumer is checked in at the store As the consumer enters a micro-region at the store, he receives personalized deals or coupons Cashier submits payment from the POS by selecting customer from list of nearby checked-in customers Consumer approaches cash register to choose payment scheme and give verbal approval for payment Cashier verifies identity of consumer using visual inspection. Customer chooses payment scheme POS detects presence of customer nearby. List of customers nearby is re-sorted The POS is equiped with a beacon as well

BLE: Business opportunities Proximity marketing Micro Location-based notification Customized marketing Specific directions Indoor mapping “Contactless payments”

The principle underlying use for both technologies is different BLE versus NFC BLE and NFC are both short range wireless data transfer technologies, even though the range at which BLE operates is much longer. Tens of meters compared to a few centimeters for NFC Between both technologies there are minor differences in power consumption Whereas NFC is focused on one-to-one data exchange, BLE allows for multiple simultaneous connections Both BLE and NFC utilize AES-128 bit data encryption and pairing modes The principle underlying use for both technologies is different

“Traditional” NFC Handset Host CPU Secure Element Read / Write mode Scope Read / Write mode Peer 2 peer mode Card emulation mode Tag Handset Terminal

SE-based NFC: proximity-based SEI-TSM SP-TSM Merchant’s physical shop Lifecycle management NFC

Challenge for SE-based NFC Card Emulation: SEI ≠ SP High investments Complex network Immature business arrangements ... Low degree of standardisation High degree of collaboration needed Physical cards: SEI = SP NFC Card emulation: SEI ≠ SP Perso bureau Card vendor BPO Supply contract SP SP TSM SEI TSM BPO Supply contract Card vendor Supply contract SP SEI

Android KitKat’s HCE promises to change that

Host-based Card Emulation AID Routing Rule Default Host AID Y Secure Element Android device Host CPU Android OS Contactless smartcard reader Select AID “x” NFC Controller Secure Element NFC controller Registry Select AID “y”

HCE takes place in environment that is not secure: the host Android has in-built security mechanisms (e.g. sandboxing). These may be over-ruled in case the device is rooted. Android device Host CPU Android OS Device rooting Contactless smartcard reader Select AID “x” NFC Controller Secure Element

HCE & Cloud solutions. Device Authentication. Key Management. Date HCE & Cloud solutions. App 1 Device Authentication. Key Management. Tokenization. Token storage. PCI requirements. Host physical and logical requirements. App 2 Wallet

HCE accelerates the NFC ecosystem NFC Ecosystem is getting ready to scale up: Device support Consumers are used to access services from mobile devices Infrastructure is growing SE access discussions are however delaying development, while many services do not require top-level security from day one With HCE SPs have the freedom to choose for the HW security or not

HCE impact on NFC ecosystem Explanation SPs Are given an additional degree of freedom SEI (& SEI TSM) The role of the SEI is removed (or much lighter) for HCE services TSM The role of (SP-)TSMs may change from the personalization of an applet to the personalization of an HCE service. App development Enhancing the security of HCE applications Existing wallet and payment apps to be updated

Example 1: HCE for open-loop high value payments Pro Convenience Reduced costs Less players + no SE issuers Con Decreased security High potential losses Certification unclear (yet) HCE as an NFC driver takes into account the value of HCE services helping to streamline the use of NFC. Since HCE services are ‘easier’ to deploy than current SE based NFC implementations, then it is assumed that wider spread would mean NFC is driven positively (+). On the other hand, end-users using HCE services would not distinguish between SE and HCE based NFC services. Therefore a security breach encountered in an HCE service could drive perception of NFC being unsafe. Thus, having a negative driver effect (-). SP’s compromise point-of-view

Example 2: HCE for low value payments, closed loop systems, transit, access control Pro Convenience Reduced costs Less players + no SE issuers Con Decreased security Low potential losses Compatibility SP’s compromise point-of-view

Summary Alternatives approaches are available, all bring their own challenges. Cash and Physical cards are still the most commonly deployed

THANK YOU.