ITEC 810 Overview of Micropayment Technology

Slides:



Advertisements
Similar presentations
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
NFC Devices: Security and Privacy
RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Technology Update AVI Vehicle Management Systems Airport Ground Transportation Association Spring Conference April 8, 2008.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Beyond the Barcode RFIDs Radio Frequency Identification.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
R R FID Authentication : M inimizing Tag Computation CHES2006 Rump Session, Yokohama. Japan Ph.D. Jin Kwak Kyushu University, JAPAN
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
MICROCHIP IMPLANT NEGATIVE SIDES OF RADIO FREQUENCY IDENTIFICATION CHIPS.
Radio-Frequency Identification MBUS 626 IT Seminar Group 5 Kevin Frei Stephen Grant.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
The Influential Role Of Information Technology In SCM Prepared By : Inas M. Srour Arwa El Masri Arwa El Masri Zeiad Ramadan Zeiad Ramadan Supervised By:
NFC - Near Field Communication Technology
RFID’s By Samuel and Sabra. What is an RFID? RFID’s are microchips RFID’s are microchips Antenna emits radio signals to read/write Antenna emits radio.
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
A questionnaire is a effective way of gaining information quickly and directly from an audience, and the results from a questionnaire can be displayed.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
INNOVATIVE TECHNOLOGY TRENDS for LANDSIDE OPERATIONS Airport Ground Transportation Association Spring Conference March 20, 2007.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
RFID (RADIO FREQUENCY IDENTIFICATION)
Near Field Communication Systems Patras, July 2006.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Copyright © 2007 Wavetrend (US) Inc. 1 A World Leader in the Deployment of Active RFID (Radio Frequency Identification) Solutions.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Radio Frequency Identification
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Container e-seal implementation at Custom. Problems: Although cost effective – very limited function easy to be cut and replaced, can not really stop.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Where in the world is my PSP? RFID Triangulation Stuart Lenz North Star High School.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID A technology I advocate, despite the disadvantages Will cover what it is, how it’s used, its advantages, and its bad side.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
What is a Smart Card Reader & Terminal. What is a smart card reader? Smart card reader, also known as smart card terminal, such as point of sale terminal,
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Radio Frequency Identification composition - implementation – vision
English for Advance Learners I
Radio Frequency Identification (RFID)
Describe direct data entry and associated devices, e. g
Apple Pay Research on NFC and the security threat
یا حقّ.
Team 7 Technical Presentation
Chair Professor Chin-Chen Chang Feng Chia University
Radio Frequency Identification
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Overview of Micropayment Technology
Presentation transcript:

ITEC 810 Overview of Micropayment Technology Supervisor: Josef Pieprzyk Vishal Bharat Sharma Student ID: 41423682

Agenda Introduction Payment Systems Current Micropayment System in Use Radio Frequency Identification Operational & Security Issues Security Violations Conclusion

Introduction Payments systems Micro-payment System Traditional Payment System Electronic Payment System Technologies in use from while Magnetic Stripe Card Optical Memory Card Mobile & Internet Micro-payment System Radio Frequency Identification

Micropayment Systems in Use Electronic Toll Tax Collection System E-Tags Autopass Public Transport System London Hong Kong Smartrider For Fuel Payment ExxonMobil Consumer Transactions

RFID Radio Frequency IDentification How does it work Benefits of RFID Tags are of 2 types Active Passive How does it work Whenever tag comes in the range of reader it gets power and starts exchanging data Benefits of RFID Easy to use, do not require a contact pad for communications and power They can transmit data at far higher speeds than their analogues Operating them is much faster

Operational & Security Issues RFID Systems Can Be Easily Disrupted RFID Reader Collision RFID Tag Collision Unauthorized Tag Disabling Unauthorized Tag Cloning Unauthorized Tag Tracking Relay Attacks Forward-Security Side Channel Attacks Eavesdropping

Security Violations Speedpass Mifare Classic Card Fastrak ExxonMobil London Public Transport System Dutch Public Transport System Fastrak Electronic Toll Collection System

Conclusion Studied About Shortcomings of current system Micro-payment system based on RFID Main Components of RFID system Study of security violations Issues with operation and security What has not been covered Cryptography

Thank You