SlideShare ist ein Scribd-Unternehmen logo
1 von 122
Downloaden Sie, um offline zu lesen
ARCHITECTURE & DEVELOPMENT OF NFC APPLICATIONS  MOBILE JAVA DEVELOPMENT, JAVA CARD, USIM AND TOUCH-BASED SERVICES Thomas de Lazzari Smart-University 2009
Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Campus Nova ,[object Object]
Ticket TAP mobile is digital, targeted and personal Present Future Come & see us: Get 10% off ladies bags until  tomorrow 50% reduction for girl students at the star light Dance Club  ? VS.
Partners
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Objectives
Objectives (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobiquity ,[object Object],[object Object],One of the major added value for NFC is the security of third party applications provided by the SIM card.
Google Android
ATAWAD ,[object Object],[object Object],[object Object],[object Object],[object Object]
Needs of NFC ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PART 1 Introduction to NFC,  its Ecosystem
RFID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Frequencies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Best compromise for most cards and tickets ANIMALS, BEER BERRELS, GAS CYLINDERS, SHOES OF MARATHON RUNNERS CONVEYANCES, VEHICLES, LIBRARY, LAUNDRY, ITEM LEVEL TAGGING, BANKNOTES, ERROR PREVENTION, SECURE ACCESS, AIRPORT BAGGAGE
From RFID to NFC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contactless Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],85%+ of the access control / Ticketing ISO14443 market is Mifare®
NFC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NFC FORUM http://www.nfc-forum.org
Standardization bodies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NFC FORUM SPECS Applications LLCP (Logical Link Control Protocol) RTD (Record Type Definition) & NDEF (Data Exchange Format) Card  Emulation (Smart Card Capability  for Mobile Devices) RF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCa Peer to peer mode Read/Write mode Card emulation mode
Smart Poster ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],From SMS push to Smart Poster « pull »
Smart Poster RTD MAY SHALL For example, the Smart Poster record defines a URI plus some added metadata about that URI. Action record values Value Action 0 Do the action (send the SMS, launch the browser, make the telephone call)  1 Save for later (store the SMS in INBOX, put the URI in a bookmark, save the telephone number in contacts)  3 Open for editing (open an SMS in the SMS editor, open the URI in an URI editor, open the telephone number for editing).
NFC Forum tag types http://www.nfc-forum.org/specs/   ,[object Object],[object Object],[object Object],[object Object],[object Object]
NFC Roles and actors Service provider Trusted Service Manager  (MNO or TTP) Application owner SIM Card Manufacturer (Smart Card provider) Card Issuer MNO (SIM Card management system) Contactless service management platform OTA NFC Service Management POS SIM NFC Mobile station holder
NFC service provider Mobile domain Mobile operator NFC applications repository Webapp NFC service operator SIM management system SIM card Application Customers management database cardlets Service profile platform Profile data KS  FS Final user Customers management database Life cycle management system for mobile NFC applications KS  FS Application data GUI SDD management system KS  SSD Card management system KS ISD Network access Customer service Subscribe a service Subscribe a service Subscribe a service Interfaces 3 1 Customer Operator information system Customers data 2
Use case: phone is lost Service provider TSM Mobile operator Customer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global Platform - security domains By Gemalto Low TRUST High Mandated DAP (applications integrity at plaform level) DAP Verification (application integrity by SSD) Issuer Centric (only ISD management) Delegated Management (token management) Authorized Management (dual management) High CONTROL Low
NFC on a Mobile Phone one thing among all Contactless Screen with a user interface Security GPS Loudspeaker and Microphone Keyboard Camera Network TV etc.
NFC Architecture
PART 2 NFC in a SIM Card
Smart Card ,[object Object],[object Object],[object Object],[object Object]
Smart Card used in France for healthcare refunds (Carte Vitale)
Smart Card history ,[object Object],[object Object],[object Object],[object Object],1968 1974 1977 1978
Smart Card until today ,[object Object],[object Object],[object Object],[object Object],[object Object],1983 1987 1992 1997 2006
Smart Card categories Microprocessor card Memory card Contact card Contactless card
The memory card ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Microprocessor card ,[object Object],[object Object],[object Object],Very secure for a reasonable cost
Smart Card security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card anatomy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card connectors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contactless Card ,[object Object]
Smart Card applications ,[object Object],[object Object],[object Object],[object Object]
Smart card applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pyramid of Authentication Technologies Higher level of security offered for highly valued information User private key is kept in a device such as a smart card. Biometrics are also used to protect key. User’s private key is stored on a portable computer device such as a disk. User name and password authenticates User – PGP encrypts data. SSL encrypts data.
Part 3 NFC potential, services and devices
NFC on iPhone http://www.nearfield.org/ NFC already on iPhone: Stickers, 30-pin RFID readers, SIM add-on…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Added value services
NFC Use cases by Nokia
Mobile Ticketing ,[object Object],[object Object],[object Object],[object Object],14 millions RFID tickets were produced by ASK for Olympic Games in China -  http://www.ask-rfid.com ,[object Object],[object Object]
NFC in the World (2009) http://www.nearfieldcommunicationsworld.com   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NFC in France (2009) ,[object Object],[object Object],[object Object],[object Object],[object Object]
NFC gives sense to touch based services Object Tag + URL Mobile device Reader Display Wireless service provider Information on Objects Components of an object hyperlinking scheme ,[object Object],[object Object],[object Object],[object Object],[object Object]
NFC tomorrow ,[object Object],[object Object],[object Object],[object Object]
In a recent presentation,  Sony Ericsson  says mobile NFC will take more than 5 years to become mass market. NFC tomorrow
NFC keys of success ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Complex value chain  +  Mobile OTA B2C battle
NFC Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NOKIA 6212 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jeremy Belostock on the future of NFC http://fr.youtube.com/watch?v=BoOH7AtCT_E
Nokia 6216 ,[object Object],[object Object],http://toptunniste.fi/topshop/product_catalog.php?c=72 normal availability appr. Q1/2010 See video, Jeremy Belostock, NFC, and operators http://www.youtube.com/watch?v=53dhyDPXmH8
Security and memory for RFID tags vs cost National ID card Aircraft part tag Passport label / page Secure access or credit card Transit card Transit ticket Library book label Item drug label Retail pallet / case label Specification typically ISO 14443 or 15693 (r ead distance to 50 cm) 7cents Chip cost   3dollars Security and/or memory size
NFC requirements
Part 4 NFC for developers
Developing on a Mobile Phone is  Different operating systems, browsers, etc. What are the solutions to develop a 3rd party application on a mobile phone except on iPhone  
UICC SIM NFC antenna External env. Applications CPU OS J2ME NFC Chip OTA OS Apps NFC Phone Architecture ,[object Object],[object Object],F rom a developer's point of view it does not matter at all where the SE is located. You will still code against the GlobalPlatform specs. The only difference comes with the distribution/lifecycle model; and since in most cases, the operators control both the SIM card and the phone, the difference is largely academical anyway. Of course, business people may think differently, but that's their problem. Jalkanen, Nokia discussion boards
NFC and C (with Java Native Interface) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NFC and Java ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Development Kits
JCOP Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],public void process(APDU apdu){ byte[] buf = apdu.getBuffer();  // Ignore Select instruction. if (buf[ISO7816.OFFSET_CLA] == 0x00 &&  buf[ISO7816.OFFSET_INS] == (byte)0xA4) { return; }
Gemalto Developer suite
Gemalto Developer suite
Nokia 6212 SDK Compatible with Netbeans and Eclipse http://www.forum.nokia.com/main/resources/tools_and_sdks/nokia_6212_nfc_sdk/
JSR-257 Contactless communication API ,[object Object],[object Object],[object Object],[object Object]
MIFARE ,[object Object],[object Object],[object Object],Security in a MIFARE 1K CARD
MIFARE Anti-collision ,[object Object],[object Object],[object Object],Request Anti-collision Read/Write Authentication Select card Card id ? Transaction time GSMA tech guide: NFC mobile device and reader shall be less than or equal to 250ms to meet Service Provider  requirements.
Receive read-only data from NDEF tag NDEF push The MIDlet can see that it was launched by touching a tag, by reading the DiscoveryManager property LaunchType.
Java Card ,[object Object],[object Object],[object Object],[object Object],[object Object]
Java Card description ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card protocols ,[object Object],[object Object],T=0 Byte-level transmission protocol, defined in ISO/IEC 7816-3 T=1 Block-level transmission protocol, defined in ISO/IEC 7816-3 APDU  transmission via contactless interface, defined in ISO/IEC 14443-4
ISO 7816-4: APDU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
APDU command types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AID ,[object Object],[object Object],[object Object]
Java Card ,[object Object]
Java Card: CAP A smart  card  is inserted into a  Card Acceptance Device  (CAD) to power on the integrated circuit.
Java Card features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Java Card features ,[object Object],[object Object],[object Object],[object Object]
Java Card security ,[object Object]
Java Card applet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],See articles on Sun website http://developers.sun.com/mobility/javacard/articles/intro/index.html
Wallet.java
Java Card applet Wallet ,[object Object],[object Object],[object Object],package com.sun.javacard.samples.wallet;  import javacard.framework.*;
Java Card: applet Wallet ,[object Object],public class Wallet extends Applet
Java Card 2 modes ,[object Object],[object Object],[object Object]
Applet PIN code ,[object Object],[object Object],[object Object]
CLA and INS ,[object Object],[object Object],[object Object],Wallet_CLA =(byte)0xB0;
INS ,[object Object],final static byte VERIFY = (byte) 0x20; final static byte CREDIT = (byte) 0x30; final static byte DEBIT = (byte) 0x40; final static byte GET_BALANCE = (byte) 0x50
Other values ,[object Object],[object Object],// maximum balance final static short MAX_BALANCE = 0x7FFF; // maximum transaction amount final static byte  MAX_TRANSACTION_AMOUNT = 127; // maximum number of incorrect tries before the // PIN is blocked final static byte PIN_TRY_LIMIT =(byte)0x03; // maximum size PIN final static byte MAX_PIN_SIZE =(byte)0x08;  OwnerPIN pin; short balance;
Applet structure ,[object Object],[object Object],[object Object],[object Object],[object Object],public void process(APDU apdu) {
Send and receive APDUs ,[object Object],[object Object],[object Object],[object Object],[object Object],byte[] apduBuffer = apdu.getBuffer(); apduBuffer[0] = byte1; apduBuffer[1] = byte2; apduBuffer[2] = byte3; //0-offset, 3-number of bytes to send apdu.setOutgoingAndSend(0, 3);  byte[] buffer = apdu.getBuffer(); short bytes_left = (short) buffer[ISO.OFFSET_LC]; short readCount = apdu.setIncomingAndReceive(); while (bytes_left > 0) { //{process received data in buffer} … bytes_left -= readCount; //get more data readCount = apdu.receiveBytes (ISO.OFFSET_CDDATA); }
Get Balance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
JSR-177 SATSA ,[object Object],[object Object],[object Object],[object Object]
Gemalto examples ,[object Object],[object Object]
Gemalto developer suite: Instance AID
 
 
Nokia 6131 Secure Element ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Protected by Issuer specific secret keys Protected by transport keys
PC/SC readers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
javax.smartcardio Java 6 introduces  Smart Card I/O API defined by  JSR 268 .
Dev tools and architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MIDlet proxy Phone OTA Server Secure Element Mifare Applet MIDlet OTA provisioning can be done through HTTP / HTTPS or BIP/TCP. BIP  is a new generation protocol allowing remote SIM management over the air (remote file management, remote application management).
Physical layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
J2ME Java Midlet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
J2ME Signature and certificate ,[object Object],[object Object],[object Object],[object Object]
SmartCard Web Server ,[object Object],[object Object],[object Object],[object Object]
SCWS Demo
Example of applications NFC Applications – My Keys Office Home Car Edit Delete Parking P5 New key received. Open application ? Yes No Writing key 75% Installing key… Key added Exit Yes Access granted. Add a shortcut ? Lock A PAMS Zone 1 PAMS Zone 2 Credential for PAMS Zone 2 can unlock A and B Lock B
[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Signature Service Provider MSSP Operator Service Provider Certification authority
Ex: eBanking authentication ,[object Object],[object Object],[object Object],[object Object],Enter PIN code Back Ok The application needs to verify your identity Back Ok Secure Application Ok You are now authenticated
DEMO
HelloKiosk
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For developers
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Special thanks to  Nicolas Pastorelly w ho helped me on some slides
Contact me ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Near field communication
Near field communicationNear field communication
Near field communicationJwal Dakwala
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)divyakalra200
 
NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료봉조 김
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC Forum
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFCTouroxy
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Seminar Links
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full PresentationDILIN RAJ DS
 

Was ist angesagt? (20)

NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Nfc technology ppt
Nfc technology pptNfc technology ppt
Nfc technology ppt
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
NFC tech
NFC techNFC tech
NFC tech
 
Mobile payment
Mobile paymentMobile payment
Mobile payment
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer Experience
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 

Ähnlich wie Architecture and Development of NFC Applications

Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
NFC architecture and standards involved -C&T RF Antennas Inc
NFC architecture and standards involved -C&T RF Antennas IncNFC architecture and standards involved -C&T RF Antennas Inc
NFC architecture and standards involved -C&T RF Antennas IncAntenna Manufacturer Coco
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and MoneyVikram Dahiya
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariSandip Murari
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET Journal
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...Axel Nennker
 
My best effort
My best effortMy best effort
My best effortsujataray
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationSabiha M
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)GHADA SALEH
 
SmartCard Forum 2010 - Chytré karty opět o rok dál
SmartCard Forum 2010 - Chytré karty opět o rok dálSmartCard Forum 2010 - Chytré karty opět o rok dál
SmartCard Forum 2010 - Chytré karty opět o rok dálOKsystem
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET Journal
 

Ähnlich wie Architecture and Development of NFC Applications (20)

Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
NFC architecture and standards involved -C&T RF Antennas Inc
NFC architecture and standards involved -C&T RF Antennas IncNFC architecture and standards involved -C&T RF Antennas Inc
NFC architecture and standards involved -C&T RF Antennas Inc
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
EETimes_Euro_MAX66x40
EETimes_Euro_MAX66x40EETimes_Euro_MAX66x40
EETimes_Euro_MAX66x40
 
Near field communication
Near field communicationNear field communication
Near field communication
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
Card reader
Card readerCard reader
Card reader
 
Smart cards
Smart cardsSmart cards
Smart cards
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
 
My best effort
My best effortMy best effort
My best effort
 
Rfid report
Rfid reportRfid report
Rfid report
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Co Je A Bude Nfc Jan Nemec Gemalto
Co Je A Bude Nfc Jan Nemec GemaltoCo Je A Bude Nfc Jan Nemec Gemalto
Co Je A Bude Nfc Jan Nemec Gemalto
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
SmartCard Forum 2010 - Chytré karty opět o rok dál
SmartCard Forum 2010 - Chytré karty opět o rok dálSmartCard Forum 2010 - Chytré karty opět o rok dál
SmartCard Forum 2010 - Chytré karty opět o rok dál
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
 

Kürzlich hochgeladen

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Kürzlich hochgeladen (20)

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Architecture and Development of NFC Applications

  • 1. ARCHITECTURE & DEVELOPMENT OF NFC APPLICATIONS MOBILE JAVA DEVELOPMENT, JAVA CARD, USIM AND TOUCH-BASED SERVICES Thomas de Lazzari Smart-University 2009
  • 2.
  • 3.
  • 4. Ticket TAP mobile is digital, targeted and personal Present Future Come & see us: Get 10% off ladies bags until tomorrow 50% reduction for girl students at the star light Dance Club ? VS.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12. PART 1 Introduction to NFC, its Ecosystem
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. NFC FORUM SPECS Applications LLCP (Logical Link Control Protocol) RTD (Record Type Definition) & NDEF (Data Exchange Format) Card Emulation (Smart Card Capability for Mobile Devices) RF Layer ISO 18092 + ISO 14443 Type A, Type B + FeliCa Peer to peer mode Read/Write mode Card emulation mode
  • 20.
  • 21. Smart Poster RTD MAY SHALL For example, the Smart Poster record defines a URI plus some added metadata about that URI. Action record values Value Action 0 Do the action (send the SMS, launch the browser, make the telephone call) 1 Save for later (store the SMS in INBOX, put the URI in a bookmark, save the telephone number in contacts) 3 Open for editing (open an SMS in the SMS editor, open the URI in an URI editor, open the telephone number for editing).
  • 22.
  • 23. NFC Roles and actors Service provider Trusted Service Manager (MNO or TTP) Application owner SIM Card Manufacturer (Smart Card provider) Card Issuer MNO (SIM Card management system) Contactless service management platform OTA NFC Service Management POS SIM NFC Mobile station holder
  • 24. NFC service provider Mobile domain Mobile operator NFC applications repository Webapp NFC service operator SIM management system SIM card Application Customers management database cardlets Service profile platform Profile data KS FS Final user Customers management database Life cycle management system for mobile NFC applications KS FS Application data GUI SDD management system KS SSD Card management system KS ISD Network access Customer service Subscribe a service Subscribe a service Subscribe a service Interfaces 3 1 Customer Operator information system Customers data 2
  • 25.
  • 26. Global Platform - security domains By Gemalto Low TRUST High Mandated DAP (applications integrity at plaform level) DAP Verification (application integrity by SSD) Issuer Centric (only ISD management) Delegated Management (token management) Authorized Management (dual management) High CONTROL Low
  • 27. NFC on a Mobile Phone one thing among all Contactless Screen with a user interface Security GPS Loudspeaker and Microphone Keyboard Camera Network TV etc.
  • 29. PART 2 NFC in a SIM Card
  • 30.
  • 31. Smart Card used in France for healthcare refunds (Carte Vitale)
  • 32.
  • 33.
  • 34. Smart Card categories Microprocessor card Memory card Contact card Contactless card
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Pyramid of Authentication Technologies Higher level of security offered for highly valued information User private key is kept in a device such as a smart card. Biometrics are also used to protect key. User’s private key is stored on a portable computer device such as a disk. User name and password authenticates User – PGP encrypts data. SSL encrypts data.
  • 44. Part 3 NFC potential, services and devices
  • 45. NFC on iPhone http://www.nearfield.org/ NFC already on iPhone: Stickers, 30-pin RFID readers, SIM add-on…
  • 46.
  • 47. NFC Use cases by Nokia
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. In a recent presentation, Sony Ericsson says mobile NFC will take more than 5 years to become mass market. NFC tomorrow
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Security and memory for RFID tags vs cost National ID card Aircraft part tag Passport label / page Secure access or credit card Transit card Transit ticket Library book label Item drug label Retail pallet / case label Specification typically ISO 14443 or 15693 (r ead distance to 50 cm) 7cents Chip cost 3dollars Security and/or memory size
  • 60. Part 4 NFC for developers
  • 61. Developing on a Mobile Phone is Different operating systems, browsers, etc. What are the solutions to develop a 3rd party application on a mobile phone except on iPhone 
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 69. Nokia 6212 SDK Compatible with Netbeans and Eclipse http://www.forum.nokia.com/main/resources/tools_and_sdks/nokia_6212_nfc_sdk/
  • 70.
  • 71.
  • 72.
  • 73. Receive read-only data from NDEF tag NDEF push The MIDlet can see that it was launched by touching a tag, by reading the DiscoveryManager property LaunchType.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81. Java Card: CAP A smart  card  is inserted into a  Card Acceptance Device  (CAD) to power on the integrated circuit.
  • 82.
  • 83.
  • 84.
  • 85.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100. Gemalto developer suite: Instance AID
  • 101.  
  • 102.  
  • 103.
  • 104.
  • 105. javax.smartcardio Java 6 introduces Smart Card I/O API defined by JSR 268 .
  • 106.
  • 107. MIDlet proxy Phone OTA Server Secure Element Mifare Applet MIDlet OTA provisioning can be done through HTTP / HTTPS or BIP/TCP. BIP is a new generation protocol allowing remote SIM management over the air (remote file management, remote application management).
  • 108.
  • 109.
  • 110.
  • 111.
  • 113. Example of applications NFC Applications – My Keys Office Home Car Edit Delete Parking P5 New key received. Open application ? Yes No Writing key 75% Installing key… Key added Exit Yes Access granted. Add a shortcut ? Lock A PAMS Zone 1 PAMS Zone 2 Credential for PAMS Zone 2 can unlock A and B Lock B
  • 114.
  • 115.
  • 116. DEMO
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.