SlideShare a Scribd company logo
1 of 63
Download to read offline
Near field communication and RFID
– opening for new business

Josef Noll1, Juan Carlos Lopez Calvet,
Telenor R&D, , N-1331 Fornebu
josef@unik.no, juan.calvet@telenor.com


1 from1.6.2005 Prof. stip.
University Graduate Studies (UniK)
N-2027 Kjeller




 Josef Noll, 26.4.2005   RFID - NFC tutorial   1
Agenda
0900 Welcome – interests                        – The upcoming digital world – need
                                                  for seamless authentication
0920 RFID – the means for
                                                – RFID basics, frequencies, …
 authentication
                                                – Applications: Sports, etc.
0950 Q & A
1010 RFID & NFC:
                                                – NFC technology
 technology and scenarios
                                                – Scenarios (travel scenario, DRM,
1045 Q & A                                        Information retrieval)
                                                – State of the art
1100 deep breath – break
1110 demonstrations
                                                 – Authentication – your own phone
1200 end of tutorial
                                                 – Infokiosk – imagine the world
                                                 – Payment and ticketing (Giesecke
                                                   & Devrient)
                                                 – NFC and mobile Commerce
                                                   (Nokia/Telenor)
 Josef Noll, 26.4.2005   RFID - NFC tutorial   2
Telenor R&D
                                Tromsø (17)

                                                    Important contributor to innovation and
                                                       value creation in Telenor
                                                    Demonstrating: “Ideas that simplify

                                                   Norway – what happened?


   Trondheim (23)




                          Fornebu (170)


                                                   International: NO, SE, DK, Hungary,
                                                   Austria, Montenegro, Malaysia, Ukraina,
                                                   Bangladesh, Thailand, Russland
 Josef Noll, 26.4.2005   RFID - NFC tutorial   3
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC: –The upcoming digital world – need for
                      seamless authentication
 technology and scenarios
                     – RFID basics, frequencies, …
1045 Q & A
                     – Applications: Sports, etc.
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   4
Service development

                                                                  Personalised broadband
                                     B3G:
                                                                  wireless services


                              3G:                                 Multimedia communication


                                                                  Mobile telephony, SMS, FAX,
                2G:
                                                                  Data

1G:
                                                                  Mobile telephony


      1970            1980         1990                    2010
                                                    2000

      Josef Noll, 26.4.2005   RFID - NFC tutorial            5
Service Network         Open Services Access                           Ubiquitous Services
                                                                                             Network   Cyberworld
  2G/GPRS           Packet and            Packet switched Community            Personal
   Services       circuit switched             only
Core Network
                                                           IP Backbone                                 Programmable
                      UMTS R5                                                                             Networks
    UMTS                                           QoS                   Modular
                                                            Mobility
                                                                         Protocols
Access Network
                                  WLAN ++
                                                                                                        Ubiquitous
                                        IP Access                            New Cellular                access
        WLAN
                      PAN                            Ad Hoc
   GERAN
                                                                                 MSS          HAS
Radio
Technology
                                                  MIMO
                                                                         UWB                           SW Radio
    CDMA
                            WRC’03                       OFDM                         WRC’06
    TDMA

Terminal
                                                                  reconfigurability
Technology                                                                                                 SW
                       Multi-
                                                                                                          Radio
                       mode
     Single-                                  PAN…wearables,
     mode                                     open architecture(s)



    2001 26.4.2005                              2005                                      2008/2010
    Josef Noll,         RFID - NFC tutorial                   6
                                                                                              Source: Eurescom P1145
Keep customers:
 Enable the Open Access Network


                                                           Open access network

            GSM/GPRS

                                               +                          Subscribers’
                                                                           fixed lines
                                                                 fixed


                        UMTS                       Millions of fixed lines function as
                                                   feeder lines for open pico-base
                                                   stations

                            Personalised and broadband services
         Supported by seamless authentication
         based on the Mobile Phone
Josef Noll, 26.4.2005    RFID - NFC tutorial   7
Future Service composition
(transparent for the end customer)                                     Interface
                                                         My
Next Generation Applications:                          Company
                                                     App App App
 –   Customized services                                                      Support
                                                      1   2   3
 –   Complex to manage                                                         Comp.
                                                                             WEB SAP
 –   High flexibility
                                                                                   Interface
 –   Short time to market                                        Interface
                                                                 platform
 –   Complex Telecom-IT integration
                                                                          Telecom
                                                   Alternative
Telecom challenges                                                        Operator
                                                                     Roaming Location
                                                                      Security Personal
                                Home Work
 – Support the customer:                                                        Profile
                                  Friend Train
   security, personalisation                                            Telecom access
                                     Hotel Car
 – Join forces with others
 – Adaptive & composed services



 Josef Noll, 26.4.2005   RFID - NFC tutorial   8
Need for an identifier
                                                   Virtual world: email,
                                                    web
Real world: see
                                                    Username, passwd
 and/or talk
                                                    SIM
 Voice
                                                    PKI
 Face

                                                   Service world
                                                    (between
                                                    providers)
                                                    Identity management
                                                    Service level
                                                    agreement (SLA)
                                                    Trust relation


 Josef Noll, 26.4.2005   RFID - NFC tutorial   9
Local interactions are a natural step
 toward multi-radio access of
 complementing radio technologies
                                    GPRS
  Cellular Access                                                        Hot Spot Access
                                      EDGE
                                                 WCDMA        WLAN
quot;personal,                                                                      quot;richest available
                                                      HSDPA
trustworthy,                                                                   content, browsing
             Cdma2000 1x
seamless global                                                              just for the fun of itquot;
roamingquot;
                CDMA 1x EV_DV



                                                                          Proximity world:
Broadcasting world:
                                                                             local services
     mass media                                               BT             personal area
                                      DVB-H
        TV
                                                               RFID   “local interactions, service
“CNN news, Sugar Bowl      FM radio
                                                                             discovery & access,
on the roadquot;
                                                                                        ticketing quot;
                 Visual radio
   Josef Noll, 26.4.2005   RFID - NFC tutorial           10
                                                                      Source: Andreas Lundin, Nokia
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC: –The upcoming digital world – need for
                      seamless authentication
 technology and scenarios
                     – RFID basics, frequencies, …
1045 Q & A
                     – Applications: Sports, etc.
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   11
What is RFID?
                                              Stands for Radio Frequency
                                              Identification
                                              Mostly used for Access Control and
                                              Vehicle Immobilizer
                                              The data carrier is generally called a
                                              “Tag” and attached to an item or
                                              location
                                              Tags are passive (battery-less), in
                                              sticker or disc format
                                              Radio frequency 13.56 Mhz globally
                                              the most widely used for RFID
                                              The data gatherer is termed a
                                              “Reader”, e.g. integrated to Nokia
                                              5140 phone
Josef Noll, 26.4.2005   RFID - NFC tutorial   12
                                                                Source: Andreas Lundin, Nokia
RFID Tag (Transponder)

 Consist of microchip that stores
 data and antenna
 Active transponders have on-tag
 battery
 Passive transponders obtain all
 power from the interrogation
 signal of reader
 Active and passive only
 communicate when interrogate
 by transceiver
 Available in all forms




 Josef Noll, 26.4.2005   RFID - NFC tutorial   13
3
Some technology
RFID – available on tape


                    Induction
                      coile




                                                             The chip




                                                Price per. RFID tag: down to 0.04 €
  Josef Noll, 26.4.2005   RFID - NFC tutorial        14
                                                            Source: Tor Hjalmar Johannessen, Telenor
RFID Reader (Transceiver)

                                                    Consist of a RF module, a
                                                    control unit, and a coupling
                                                    element to interrogate tags via
                                                    RF communication
                                                    Also have secondary interface
                                                    to communicate with backend
                                                    systems
                                                    Reads tags located in hostile
                                                    environment and are obscured
                                                    from view




 Josef Noll, 26.4.2005   RFID - NFC tutorial   15
Example RFID Readers




 Josef Noll, 26.4.2005   RFID - NFC tutorial   16
                                                    Source: Andreas Lundin, Nokia
RFID Tag Average Selling Price
              0,60

              0,50
USD per tag




              0,40

              0,30

              0,20

              0,10

              0,00
                             2000          2001             2002   2003   2004   2005     2006       2007
              Josef Noll, 26.4.2005   RFID - NFC tutorial          17
                                                                                 Source: Andreas Lundin, Nokia
RFID – communication modes
  RFID tag:
  - microchip attached to an antenna
  - sends signals to a reader.
  - contains a unique serial number, but may have other information, such as a
  customers' account number.



  Reader (passiv RFID):
   - Inductor to create electromagnetic                                        Propagation
                                                          Inductive
   field in tag                                                                 Coupling
                                                          Coupling
   - Receiver for radio response from
   tag
     (ROM-value: up to 600 bytes,
   typical 64-128 bits



Aktive (own power) Range: ad lib (no limit)
Passive (inductive) Range: from mm to some metres
       Josef Noll, 26.4.2005   RFID - NFC tutorial   18
                                                             Source: Tor Hjalmar Johannessen, Telenor
Security:
Magnetic Field Power drop off




 Josef Noll, 26.4.2005   RFID - NFC tutorial   19
                                                    Source: Auracomm.com
Tag principles
- own processor
-w/ EEPROM /
flash
-ROM & RAM




RFID-tag

   Josef Noll, 26.4.2005   RFID - NFC tutorial   20
                                                      Source: Tor Hjalmar Johannessen, Telenor
Principle function – passive RFID

  1. RFID comes close to                                 RFID-tag
    a contact point

                                                                          3. Coil generates
                                                                            power for the chip
2. Contact point induces
                                                                            (which starts
  magnetic field
                                                                            immediately)
  (to the magnetic coil)




     To backend                                                           4. Chip generates RF
         system                                                             response (RFID)

                                       Reader




      Josef Noll, 26.4.2005   RFID - NFC tutorial   21
                                                               Source: Tor Hjalmar Johannessen, Telenor
Frequency area - applications

  Frequency Band                Characteristics               Typical Applications



  Low                           Short to medium read range    Access control
  100-500 kHz                   Inexpensive                   Animal identification
                                low reading speed             Inventory control
                                                              Car immobiliser


  Intermediate                  Short to medium read range    Access control
  10-15 MHz                                                   Smart cards
                                potentially inexpensive
                                medium reading speed


  High                          Long read range               Railroad car monitoring
                                                              Toll collection systems
  850-950 MHz                   High reading speed
  2.4-5.8 GHz (*)               Line of sight required
                                Expensive

(*) 2 megabits per second data rates may be achieved,
     with added noise immunity provided by the spread spectrum modulation approach.
   Josef Noll, 26.4.2005   RFID - NFC tutorial      22
                                                             Source: Tor Hjalmar Johannessen, Telenor
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC: –The upcoming digital world – need for
                      seamless authentication
 technology and scenarios
                     – RFID basics, frequencies, …
1045 Q & A
                     – Applications: Sports, etc.
1100 deep breath – break
                     – Potential Risks
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   23
Applications
- steadily increasing…


                                             Reality:
Brand Protection
                                             - Identification of animals: cats, horses (value,
Logistics
Anti counterfeiting                             identity), …, salmon (origin), farms (feeding)
Positioning
                                             - Logistic: Transport, parcels (DHL), bagage (airports),
Locating
                                                stocks
Talking medicines for the blind
Auto rejecting wrong parts                   - Purchase: Wal-Mart, Gillette, Bennetton (automatic
Transactions
                                                cashier)
Merchandising
                                             - Loan: library
Entertainment
                                             - Traffic: rush hour charging, traffic light priority, bus
Secure Access
eCommerce fulfilment                            information in Edingburgh
Controlling grey markets
                                             - Border control (USA-Canada)
Real time theft detection
                                             - Credit card: alternative to magnetic stripe, AMEX &
Real time tampering detection
The Internet of Things                          MasterCard WWW.PAYPASS.COM
Fast Track
                                             - Sports: Boston Marathon, Birkebeiner
Behaviour monitoring
                                             - Theft alarm: clothes, cars,.., car key/start control
Market research
                                             - Security: Admission control
Virtual queuing
Automated diagnostics
Automated performance record
And more...
    Josef Noll, 26.4.2005   RFID - NFC tutorial           24
                                                                    Source: Tor Hjalmar Johannessen, Telenor
Sports & Money
  The Boston Marathon
                                                           RFID-tag
  Real-time Tracking of Runners
  -every 5 km
  -introduced in 1999

  http://www.ti.com/tiris/docs/solutions/sports.shtml &
  http://www.championchip.com/chips/




 Money identification:

Euro bank notes to embed RFID chips by 2005
http://www.eetimes.com/story/OEG20011219S0016




    Josef Noll, 26.4.2005   RFID - NFC tutorial   25
                                                       Source: Tor Hjalmar Johannessen, Telenor
Credit card
-developments towards RFID




Josef Noll, 26.4.2005   RFID - NFC tutorial   26
                                                   Source: Mastercard
Mastercard PayPass
www.paypass.com




Josef Noll, 26.4.2005   RFID - NFC tutorial   27
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC: –The upcoming digital world – need for
                      seamless authentication
 technology and scenarios
                     – RFID basics, frequencies, …
1045 Q & A
                     – Applications: Sports, etc.
1100 deep breath – break
                     – Potential Risks
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   28
Potential Security Problems

 1. Authentication: Cloning – theft of RFID
 2. Confidentiallity – Uncontrolled surveillance
Security problem 1: RFID is easy to clone
                                                                     WARNING
- hide a reader in a lift door, a chair, or other places you come close
   Read respons and programme a separate tag with same RFID id.
   The user can’t know where reading took place. Difficult to trace later on




Security problem 2: Uncontrolled Surveillance
                                                                     WARNING
-With hidden tags in clothes, money, credit card the user has no longer control
when/where/how he can be detected.

Organisations are active to stop RFID. Ref: www.stop-rfid.org
Potential restrictions on the way in the USA.


  Josef Noll, 26.4.2005   RFID - NFC tutorial   29
                                                       Source: Tor Hjalmar Johannessen, Telenor
Vulnerability
  Security in RFID is weak if not enhanced by an extra layer,
  e.g. PKI
  (encryption is not resistant against replay, if content is not shifted)


  Remember:
                           JQLOSXR& HYLWFXGQ,       JQLOSXR& QRLWDJDSRU3




                                                                                         Controlled case



                                                                                             Reader
                                                                                        Uncontrolled reader
                                                                                          Reading up to
                                                                                           several cm



    This is also recognised by the public: www.stoprfid.org
   Josef Noll, 26.4.2005      RFID - NFC tutorial             30
                                                                           Source: Tor Hjalmar Johannessen, Telenor
Enhancement


     RFID security can be enhanced:
        - ”on/off” switch if the circuit is activated
             - under user’s control

     Suggestion: Combination with SIM/PKI (two factor authentication)
     a) RFID = trigger
     b) RFID signal routes to SIM for explicit verification




Josef Noll, 26.4.2005   RFID - NFC tutorial   31
                                                   Source: Tor Hjalmar Johannessen, Telenor
Boycott Gillette Products!
                                                   Click for details.

                                                   Others:
                                                   - Wal-Mart
                                                   -Benetton: http://boycottbenetton.or
                                                    Benetton was considering putting RFID tracking chip
                                                    in their clothing that can be read from a distance and
                                                    used to monitor the people wearing them.




                                                   Annet: http://www.epic.org/privacy/rfid/

Josef Noll, 26.4.2005   RFID - NFC tutorial   32
                                                                         Source: www.stop-rfid.org
Agenda
                         – Speed?
0900 Welcome – interests – Understanding?
0920 RFID – the means for …
                         –
 authentication          - I want to hear more of…
0950 Q & A
1010 RFID & NFC:
 technology and scenarios
1045 Q & A
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   33
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC:
                                                    – NFC technology
 technology and scenarios
                                                    – Scenarios (travel scenario, DRM,
1045 Q & A                                            Information retrieval)
                                                    – State of the art
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   34
Future scenario: „My services at home“


1.
                                                    5. eGovernment, el. signature

     2.

             3.
      4.Status of my family




      Josef Noll, 26.4.2005   RFID - NFC tutorial   35
Security in the virtual world

                                                                       Examples:


                        Security Requirement
                                                                       mHandel,
                                                          Have         VPN
                                                        to know

                                                         Need             Intranet, email,
                                                       to know            Admittance



                                                                            Network access
                                                  Nice to know



Josef Noll, 26.4.2005                 RFID - NFC tutorial         36
Security infrastructure
 Security depends on application
    – Nice to know: WLAN network access
    – Need to know: email, Intranett
    – Have to know: VPN, (eCommerce)
 Higher level require more than just username & password
 http://www.openauthentication.org/ suggests 3 methods
    – SIM authentication (GSM, EAP-SIM,…)
    – Public Key Infrastructure (PKI)
    – One-Time-Password (OTP)
 In-line with requirements from Norwegian government for
 eSignature
 Depending on application: username & password or PKI
 The Mobile phone has all three: SIM, PKI, and OTP
 Challenge: Usability and exchange of credentials to “my
 working devices”
 Josef Noll, 26.4.2005   RFID - NFC tutorial   37
The only thing you need:
 Your Mobile Phone




                                                      SIM with
                                                    RFID & PKI



 Josef Noll, 26.4.2005   RFID - NFC tutorial   38
Four-in-one:
                       Your mobile integrates them all
                                                                                                     RFID,
                                                                                             *
                                                                                                     SIM & PKI
                                                            Examples:
                                                                                        &
Security Requirement




                                                              mHandel,
                                        Have                  VPN
                                      to know

                                                                                                 *   RFID &
                                      Need                           Intranet, email,
                                                                                                     SIM
                                    to know                          Admittance
                                                                                                     passwd
                                                                                                 &

                                                                                            *&       RFID
                                                                       Network access
                               Nice to know                                                          (& SIM)


                                                                                            *Patent pending
                       Josef Noll, 26.4.2005   RFID - NFC tutorial            39
Seamless
                                                      authentication




Service                                                                Home access,
                                      Physical
                                                        VPN
access                                                                  .mp3, .jpg
                                      access




Josef Noll, 26.4.2005   RFID - NFC tutorial      40
Timeline: Phone with RFID & PKI

                                                    Near Field Communication
SIM card with integrated RFID
                                                    (NFC)
Prototypes available from:
                                                    Standardisation of Philips,
  – Giesecke & Devrient:
                                                    Nokia, Sony, …
    demonstrated on Siemens
                                                    Phones with RFID chip
    phones
  – Gemplus: both on one chip,                      Phone status:
    (terminated)  NFC                               Nokia: on stock,
                                                    Siemens: prototypes




 Josef Noll, 26.4.2005   RFID - NFC tutorial   41
Near Field Communication (NFC) is a touch-
based RFID technology
                      • NFC works in the globally available 13.56 MHz band
Technology            • The effective working distance is up to a few centimeters
                      • Based on ISO 18092 including ISO14443A MiFare and FeliCa
                        standards, ie compatible with the most broadly established
                        smart card infrastructure covering >80% of the market
                    • Tags in smart objects are powered by the radio signal of the
                      reader, and do not require any battery or other source of
  Tags
                      power
                    • The tags contain some memory that can store URLs, SMS
                      and similar information
                    • Costs currently a few ten EUR cents and decreasing rapidly
                   • Devices do not contain tags, but can communicate using the
Devices
                     same interface
                   • Devices can not only read tags, but also write to enabled tags




    Josef Noll, 26.4.2005   RFID - NFC tutorial        42
       Sources: Nokia, Froster & Sullivan; Forrester
NFC changes the role of the mobile
operator
 The mobile operator is the communication provider
    – Everybody has a mobile phone
    – People know that they can reach me – and not my parents
    – Companies have identified the value of personal phones and change their
      infrastructure
    – The phone carries all my contacts
    – Connected 24/7 (all the time, not just 4 h a day)


 From access to communication
    – Provide communication: voice, SMS, MMS, IM,
      email,….
    – Seamless login (wap.telenormobil.no) – my
      email, last 10 visited
      Provide presence and community services
      Provide authentication and security
 Josef Noll, 26.4.2005   RFID - NFC tutorial   43
Near field communication (NFC)
Based on RFID technology at 13.56                   ECMA-340, ISO/IEC 18092 &
MHz                                                 ECMA-352, …standards
Typical operating distance 10 cm                    Powered and non-self powered
Compatible with RFID                                devices
Data rate today up to 424 kbit/s
Philips and Sony




 Josef Noll, 26.4.2005   RFID - NFC tutorial   44
NFC applications




 Josef Noll, 26.4.2005   RFID - NFC tutorial   45
                                                    Source: ecma, tc32-tg19-205-013.pdf
Near field communication (NFC)
- Applications and Compatibility
Applications
 Transmit pictures from Camera to PC or TV
 Download applications or games
 Configure communication parameters in e.g. home
 network

Smart card compatibility (Philip’s MIFARE and Sony’s
 Felica)
 Secure NFC (NFC + smart card)
 Active or passive operation


 Josef Noll, 26.4.2005   RFID - NFC tutorial   46
“How does it work?”
Nokia Field Force Solutions
 http://www.nokia.com/nokia/0,,70857,00.html




Better service idea?




              Click to start flash
  Josef Noll, 26.4.2005   RFID - NFC tutorial   47
NFC standardisation

ECMA-340
 Specifies the RF signal
 interface
 Initialisation, anti-
 collision and protocols
 Communication mode
                                                     ECMA 352 (v1, Dec 2003)
 selection mechanism
                                                      Selects communication
                                                      modes: NFC, PCD, and
                                                      VCD
                                                      Enables communication in
                                                      that mode




  Josef Noll, 26.4.2005   RFID - NFC tutorial   48
Near Field Communication Interface
Protocol (NFCIP) - finalised




 Josef Noll, 26.4.2005   RFID - NFC tutorial   49
NFCIP-2 Interface and protocol
 (ISO/IEC 21481)




 Interface
Standards




                                                  ISO/IEC 14443     ISO/IEC 15693
                           ECMA-340                 PCD mode          VCD mode
                                                 (MIFARE, FeliCa)   (facility access)
   Josef Noll, 26.4.2005   RFID - NFC tutorial       50
NFC Interface and Protocol
Summary




 Josef Noll, 26.4.2005   RFID - NFC tutorial   51
ECMA: NFC work items & future plans
Work items
 ECMA-356: RF interface tests for ECMA-340 devices
 ECMA-362: Protocol Test Methods
Future working items
 A mapping of NFC to other communication protocols including
 the Internet Protocol (IP), GSM and Bluetooth
    – Advanced Logical Link Control with addressing and segmentation support
 Support for Data Link and end-to-end security and key
 management
 Air-to-wired interface specification
 Application extensions in NFCIP-1
    – Power control as an example application extension


 Josef Noll, 26.4.2005   RFID - NFC tutorial   52
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC:
                                                    – NFC technology
 technology and scenarios
                                                    – Scenarios (travel scenario, DRM,
1045 Q & A                                            Information retrieval)
                                                    – State of the art
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   53
Josef Noll, 26.4.2005   RFID - NFC tutorial   54
Josef Noll, 26.4.2005   RFID - NFC tutorial   55
                                                   Source: GemPlus
RFID payment usage
coffee machines in Telenor R&D
                                                            RFID card in 2005

                                                            Tests in OSL and
                                                            Arlanda

                                                            RFID cards

                                                            Think



                                               Planned Q4.2005, Univ. Tromsø (N)
Payment on coffee machine
                                               Payment
Entrance to door B6e
                                               Entrance
                                               Electronic access (VPN) - Telenor
 Josef Noll, 26.4.2005   RFID - NFC tutorial    56
NFC – near field communication in praxis
[copyright: www.nfc-forum.org]

- Example: travelling
  Josef Noll, 26.4.2005   RFID - NFC tutorial   57
NFC – near field communication in praxis
[copyright: www.nfc-forum.org]

- Example: streaming DRM
  Josef Noll, 26.4.2005   RFID - NFC tutorial   58
NFC – near field communication in praxis
[copyright: www.nfc-forum.org]

- Example: Poster Information
  Josef Noll, 26.4.2005   RFID - NFC tutorial   59
SIM City Platform                            Banks

                              Ticketing     Payment   ID




                                                                         Service Providers


                                                                Send
Telenor CPA                                                     Ticket




                   Buy
                  Ticket




  Josef Noll, 26.4.2005    RFID - NFC tutorial             60
Conclusions
“The last time we were
connected by a wire was at
birth!” [Motorola]
No cable, that’s the
challenge
 – Various radio systems: GSM,
   UMTS; WLAN, Bluetooth,
   DVB, …
 – Limitations: battery,
   integration
All services from your
mobile
Your mobile is the
authentication centre
Telecom as authentication
provider
 Josef Noll, 26.4.2005   RFID - NFC tutorial   61
Agenda
0900 Welcome – interests
0920 RFID – the means for
 authentication
0950 Q & A
1010 RFID & NFC:
                                                    – NFC technology?
 technology and scenarios
                                                    – State of the art?
1045 Q & A                                          –…
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial   62
Agenda
0900 Welcome – interests
0920 RFID – the means for
                                               – Authentication – your own phone
 authentication
                                               – Infokiosk – imagine the world
0950 Q & A                                     – Payment and ticketing (Giesecke
1010 RFID & NFC:                                 & Devrient)
 technology and scenarios                      – NFC and mobile Commerce
                                                 (Nokia/Telenor)
1045 Q & A
1100 deep breath – break
1110 demonstrations
1200 end of tutorial



 Josef Noll, 26.4.2005   RFID - NFC tutorial    63

More Related Content

What's hot

Designing low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of ThingsDesigning low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of ThingsAndreas Schaller
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirMohammed Mudassir
 
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communicationMADHANRAJXBOX360
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
NFC Technology
NFC TechnologyNFC Technology
NFC TechnologyNeha Singh
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPENFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPEIJCI JOURNAL
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)Bharat Kachhwaha
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primeramsanjeev
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)Yi (Eve) Zhao
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshLogesh Kumar
 
Introduction to nfc_v1_1_en
Introduction to nfc_v1_1_enIntroduction to nfc_v1_1_en
Introduction to nfc_v1_1_enopen-src
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
 
NFC (Windows 8/ Windows Phone 8 )
NFC (Windows 8/ Windows Phone 8 )NFC (Windows 8/ Windows Phone 8 )
NFC (Windows 8/ Windows Phone 8 )Bill Chung
 

What's hot (20)

Designing low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of ThingsDesigning low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of Things
 
NFS - Company presentation 2015
NFS - Company presentation 2015NFS - Company presentation 2015
NFS - Company presentation 2015
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPENFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Nfc
NfcNfc
Nfc
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
 
Nfc
NfcNfc
Nfc
 
Introduction to nfc_v1_1_en
Introduction to nfc_v1_1_enIntroduction to nfc_v1_1_en
Introduction to nfc_v1_1_en
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
NFC (Windows 8/ Windows Phone 8 )
NFC (Windows 8/ Windows Phone 8 )NFC (Windows 8/ Windows Phone 8 )
NFC (Windows 8/ Windows Phone 8 )
 

Viewers also liked

Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagDeyaa Ahmed
 
Nfc tutorial
Nfc tutorialNfc tutorial
Nfc tutorialRoy Chen
 
Guide du tag NFC : quels usages dans quels contextes ?
Guide du tag NFC : quels usages dans quels contextes ?Guide du tag NFC : quels usages dans quels contextes ?
Guide du tag NFC : quels usages dans quels contextes ?Olivier Devillers
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016Laurent Dardé
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full PresentationDILIN RAJ DS
 
Near field communication
Near field communication Near field communication
Near field communication Siddharth Dc
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technologyshrien_sahi
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overviewMaarten Weyn
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...ST_World
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Androidtodbotdotcom
 

Viewers also liked (20)

Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tag
 
Nfc tutorial
Nfc tutorialNfc tutorial
Nfc tutorial
 
Project
ProjectProject
Project
 
Guide du tag NFC : quels usages dans quels contextes ?
Guide du tag NFC : quels usages dans quels contextes ?Guide du tag NFC : quels usages dans quels contextes ?
Guide du tag NFC : quels usages dans quels contextes ?
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Nfc
Nfc Nfc
Nfc
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 
Near field communication
Near field communication Near field communication
Near field communication
 
Nfc technology ppt
Nfc technology pptNfc technology ppt
Nfc technology ppt
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Nfc kdr
Nfc kdrNfc kdr
Nfc kdr
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
Norme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUGNorme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUG
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 

Similar to Near field communication and RFID - opening for new business

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Pieter Geldenhuys
 
La technologie NFC
La technologie NFCLa technologie NFC
La technologie NFCPoken_fr
 
Evolution of wireless technology 1 g 5g1 (2)
Evolution   of   wireless   technology   1 g   5g1 (2)Evolution   of   wireless   technology   1 g   5g1 (2)
Evolution of wireless technology 1 g 5g1 (2)Adarsh Kumarmn
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systemsAmar
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology TutorialAPNIC
 
Evolution from 1_g_to_5g
Evolution from 1_g_to_5gEvolution from 1_g_to_5g
Evolution from 1_g_to_5gDIKSHA_LAHRANI
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPLbhattsipl
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technologyTanvir Taj
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056mashiur
 
Lattice corporate profile 11 vf
Lattice corporate profile 11 vfLattice corporate profile 11 vf
Lattice corporate profile 11 vfJose Luis Mendez
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technologyTauseef khan
 
4g technology
4g technology4g technology
4g technologyMano27
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh DeshmukhGanesh Deshmukh
 
99164545 presntasi3 g
99164545 presntasi3 g99164545 presntasi3 g
99164545 presntasi3 gDEUZEN
 
Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile SystemsJosef Noll
 

Similar to Near field communication and RFID - opening for new business (20)

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...
 
La technologie NFC
La technologie NFCLa technologie NFC
La technologie NFC
 
Evolution of wireless technology 1 g 5g1 (2)
Evolution   of   wireless   technology   1 g   5g1 (2)Evolution   of   wireless   technology   1 g   5g1 (2)
Evolution of wireless technology 1 g 5g1 (2)
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systems
 
4g technology
4g technology4g technology
4g technology
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
Evolution from 1_g_to_5g
Evolution from 1_g_to_5gEvolution from 1_g_to_5g
Evolution from 1_g_to_5g
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
 
Udit
UditUdit
Udit
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056
 
Lattice corporate profile 11 vf
Lattice corporate profile 11 vfLattice corporate profile 11 vf
Lattice corporate profile 11 vf
 
3g basic
3g basic3g basic
3g basic
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technology
 
4g technology
4g technology4g technology
4g technology
 
4 g
4 g4 g
4 g
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh
 
99164545 presntasi3 g
99164545 presntasi3 g99164545 presntasi3 g
99164545 presntasi3 g
 
4g technology
4g technology4g technology
4g technology
 
Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile Systems
 

More from Josef Noll

Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Josef Noll
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Josef Noll
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKJosef Noll
 
Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksJosef Noll
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationJosef Noll
 
The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...Josef Noll
 
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic PerspectiveJosef Noll
 
Towards Global Mobility
Towards Global MobilityTowards Global Mobility
Towards Global MobilityJosef Noll
 
What is Semantic Service provisioning
What is Semantic Service provisioningWhat is Semantic Service provisioning
What is Semantic Service provisioningJosef Noll
 
Semantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersSemantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersJosef Noll
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and paymentJosef Noll
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environmentsJosef Noll
 
Introduction to Personalisation
Introduction to PersonalisationIntroduction to Personalisation
Introduction to PersonalisationJosef Noll
 
Who ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networksWho ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networksJosef Noll
 

More from Josef Noll (14)

Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIK
 
Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile Networks
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptation
 
The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...
 
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
 
Towards Global Mobility
Towards Global MobilityTowards Global Mobility
Towards Global Mobility
 
What is Semantic Service provisioning
What is Semantic Service provisioningWhat is Semantic Service provisioning
What is Semantic Service provisioning
 
Semantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersSemantic Service Creation for Mobile Users
Semantic Service Creation for Mobile Users
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environments
 
Introduction to Personalisation
Introduction to PersonalisationIntroduction to Personalisation
Introduction to Personalisation
 
Who ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networksWho ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networks
 

Near field communication and RFID - opening for new business

  • 1. Near field communication and RFID – opening for new business Josef Noll1, Juan Carlos Lopez Calvet, Telenor R&D, , N-1331 Fornebu josef@unik.no, juan.calvet@telenor.com 1 from1.6.2005 Prof. stip. University Graduate Studies (UniK) N-2027 Kjeller Josef Noll, 26.4.2005 RFID - NFC tutorial 1
  • 2. Agenda 0900 Welcome – interests – The upcoming digital world – need for seamless authentication 0920 RFID – the means for – RFID basics, frequencies, … authentication – Applications: Sports, etc. 0950 Q & A 1010 RFID & NFC: – NFC technology technology and scenarios – Scenarios (travel scenario, DRM, 1045 Q & A Information retrieval) – State of the art 1100 deep breath – break 1110 demonstrations – Authentication – your own phone 1200 end of tutorial – Infokiosk – imagine the world – Payment and ticketing (Giesecke & Devrient) – NFC and mobile Commerce (Nokia/Telenor) Josef Noll, 26.4.2005 RFID - NFC tutorial 2
  • 3. Telenor R&D Tromsø (17) Important contributor to innovation and value creation in Telenor Demonstrating: “Ideas that simplify Norway – what happened? Trondheim (23) Fornebu (170) International: NO, SE, DK, Hungary, Austria, Montenegro, Malaysia, Ukraina, Bangladesh, Thailand, Russland Josef Noll, 26.4.2005 RFID - NFC tutorial 3
  • 4. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: –The upcoming digital world – need for seamless authentication technology and scenarios – RFID basics, frequencies, … 1045 Q & A – Applications: Sports, etc. 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 4
  • 5. Service development Personalised broadband B3G: wireless services 3G: Multimedia communication Mobile telephony, SMS, FAX, 2G: Data 1G: Mobile telephony 1970 1980 1990 2010 2000 Josef Noll, 26.4.2005 RFID - NFC tutorial 5
  • 6. Service Network Open Services Access Ubiquitous Services Network Cyberworld 2G/GPRS Packet and Packet switched Community Personal Services circuit switched only Core Network IP Backbone Programmable UMTS R5 Networks UMTS QoS Modular Mobility Protocols Access Network WLAN ++ Ubiquitous IP Access New Cellular access WLAN PAN Ad Hoc GERAN MSS HAS Radio Technology MIMO UWB SW Radio CDMA WRC’03 OFDM WRC’06 TDMA Terminal reconfigurability Technology SW Multi- Radio mode Single- PAN…wearables, mode open architecture(s) 2001 26.4.2005 2005 2008/2010 Josef Noll, RFID - NFC tutorial 6 Source: Eurescom P1145
  • 7. Keep customers: Enable the Open Access Network Open access network GSM/GPRS + Subscribers’ fixed lines fixed UMTS Millions of fixed lines function as feeder lines for open pico-base stations Personalised and broadband services Supported by seamless authentication based on the Mobile Phone Josef Noll, 26.4.2005 RFID - NFC tutorial 7
  • 8. Future Service composition (transparent for the end customer) Interface My Next Generation Applications: Company App App App – Customized services Support 1 2 3 – Complex to manage Comp. WEB SAP – High flexibility Interface – Short time to market Interface platform – Complex Telecom-IT integration Telecom Alternative Telecom challenges Operator Roaming Location Security Personal Home Work – Support the customer: Profile Friend Train security, personalisation Telecom access Hotel Car – Join forces with others – Adaptive & composed services Josef Noll, 26.4.2005 RFID - NFC tutorial 8
  • 9. Need for an identifier Virtual world: email, web Real world: see Username, passwd and/or talk SIM Voice PKI Face Service world (between providers) Identity management Service level agreement (SLA) Trust relation Josef Noll, 26.4.2005 RFID - NFC tutorial 9
  • 10. Local interactions are a natural step toward multi-radio access of complementing radio technologies GPRS Cellular Access Hot Spot Access EDGE WCDMA WLAN quot;personal, quot;richest available HSDPA trustworthy, content, browsing Cdma2000 1x seamless global just for the fun of itquot; roamingquot; CDMA 1x EV_DV Proximity world: Broadcasting world: local services mass media BT personal area DVB-H TV RFID “local interactions, service “CNN news, Sugar Bowl FM radio discovery & access, on the roadquot; ticketing quot; Visual radio Josef Noll, 26.4.2005 RFID - NFC tutorial 10 Source: Andreas Lundin, Nokia
  • 11. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: –The upcoming digital world – need for seamless authentication technology and scenarios – RFID basics, frequencies, … 1045 Q & A – Applications: Sports, etc. 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 11
  • 12. What is RFID? Stands for Radio Frequency Identification Mostly used for Access Control and Vehicle Immobilizer The data carrier is generally called a “Tag” and attached to an item or location Tags are passive (battery-less), in sticker or disc format Radio frequency 13.56 Mhz globally the most widely used for RFID The data gatherer is termed a “Reader”, e.g. integrated to Nokia 5140 phone Josef Noll, 26.4.2005 RFID - NFC tutorial 12 Source: Andreas Lundin, Nokia
  • 13. RFID Tag (Transponder) Consist of microchip that stores data and antenna Active transponders have on-tag battery Passive transponders obtain all power from the interrogation signal of reader Active and passive only communicate when interrogate by transceiver Available in all forms Josef Noll, 26.4.2005 RFID - NFC tutorial 13
  • 14. 3 Some technology RFID – available on tape Induction coile The chip Price per. RFID tag: down to 0.04 € Josef Noll, 26.4.2005 RFID - NFC tutorial 14 Source: Tor Hjalmar Johannessen, Telenor
  • 15. RFID Reader (Transceiver) Consist of a RF module, a control unit, and a coupling element to interrogate tags via RF communication Also have secondary interface to communicate with backend systems Reads tags located in hostile environment and are obscured from view Josef Noll, 26.4.2005 RFID - NFC tutorial 15
  • 16. Example RFID Readers Josef Noll, 26.4.2005 RFID - NFC tutorial 16 Source: Andreas Lundin, Nokia
  • 17. RFID Tag Average Selling Price 0,60 0,50 USD per tag 0,40 0,30 0,20 0,10 0,00 2000 2001 2002 2003 2004 2005 2006 2007 Josef Noll, 26.4.2005 RFID - NFC tutorial 17 Source: Andreas Lundin, Nokia
  • 18. RFID – communication modes RFID tag: - microchip attached to an antenna - sends signals to a reader. - contains a unique serial number, but may have other information, such as a customers' account number. Reader (passiv RFID): - Inductor to create electromagnetic Propagation Inductive field in tag Coupling Coupling - Receiver for radio response from tag (ROM-value: up to 600 bytes, typical 64-128 bits Aktive (own power) Range: ad lib (no limit) Passive (inductive) Range: from mm to some metres Josef Noll, 26.4.2005 RFID - NFC tutorial 18 Source: Tor Hjalmar Johannessen, Telenor
  • 19. Security: Magnetic Field Power drop off Josef Noll, 26.4.2005 RFID - NFC tutorial 19 Source: Auracomm.com
  • 20. Tag principles - own processor -w/ EEPROM / flash -ROM & RAM RFID-tag Josef Noll, 26.4.2005 RFID - NFC tutorial 20 Source: Tor Hjalmar Johannessen, Telenor
  • 21. Principle function – passive RFID 1. RFID comes close to RFID-tag a contact point 3. Coil generates power for the chip 2. Contact point induces (which starts magnetic field immediately) (to the magnetic coil) To backend 4. Chip generates RF system response (RFID) Reader Josef Noll, 26.4.2005 RFID - NFC tutorial 21 Source: Tor Hjalmar Johannessen, Telenor
  • 22. Frequency area - applications Frequency Band Characteristics Typical Applications Low Short to medium read range Access control 100-500 kHz Inexpensive Animal identification low reading speed Inventory control Car immobiliser Intermediate Short to medium read range Access control 10-15 MHz Smart cards potentially inexpensive medium reading speed High Long read range Railroad car monitoring Toll collection systems 850-950 MHz High reading speed 2.4-5.8 GHz (*) Line of sight required Expensive (*) 2 megabits per second data rates may be achieved, with added noise immunity provided by the spread spectrum modulation approach. Josef Noll, 26.4.2005 RFID - NFC tutorial 22 Source: Tor Hjalmar Johannessen, Telenor
  • 23. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: –The upcoming digital world – need for seamless authentication technology and scenarios – RFID basics, frequencies, … 1045 Q & A – Applications: Sports, etc. 1100 deep breath – break – Potential Risks 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 23
  • 24. Applications - steadily increasing… Reality: Brand Protection - Identification of animals: cats, horses (value, Logistics Anti counterfeiting identity), …, salmon (origin), farms (feeding) Positioning - Logistic: Transport, parcels (DHL), bagage (airports), Locating stocks Talking medicines for the blind Auto rejecting wrong parts - Purchase: Wal-Mart, Gillette, Bennetton (automatic Transactions cashier) Merchandising - Loan: library Entertainment - Traffic: rush hour charging, traffic light priority, bus Secure Access eCommerce fulfilment information in Edingburgh Controlling grey markets - Border control (USA-Canada) Real time theft detection - Credit card: alternative to magnetic stripe, AMEX & Real time tampering detection The Internet of Things MasterCard WWW.PAYPASS.COM Fast Track - Sports: Boston Marathon, Birkebeiner Behaviour monitoring - Theft alarm: clothes, cars,.., car key/start control Market research - Security: Admission control Virtual queuing Automated diagnostics Automated performance record And more... Josef Noll, 26.4.2005 RFID - NFC tutorial 24 Source: Tor Hjalmar Johannessen, Telenor
  • 25. Sports & Money The Boston Marathon RFID-tag Real-time Tracking of Runners -every 5 km -introduced in 1999 http://www.ti.com/tiris/docs/solutions/sports.shtml & http://www.championchip.com/chips/ Money identification: Euro bank notes to embed RFID chips by 2005 http://www.eetimes.com/story/OEG20011219S0016 Josef Noll, 26.4.2005 RFID - NFC tutorial 25 Source: Tor Hjalmar Johannessen, Telenor
  • 26. Credit card -developments towards RFID Josef Noll, 26.4.2005 RFID - NFC tutorial 26 Source: Mastercard
  • 27. Mastercard PayPass www.paypass.com Josef Noll, 26.4.2005 RFID - NFC tutorial 27
  • 28. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: –The upcoming digital world – need for seamless authentication technology and scenarios – RFID basics, frequencies, … 1045 Q & A – Applications: Sports, etc. 1100 deep breath – break – Potential Risks 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 28
  • 29. Potential Security Problems 1. Authentication: Cloning – theft of RFID 2. Confidentiallity – Uncontrolled surveillance Security problem 1: RFID is easy to clone WARNING - hide a reader in a lift door, a chair, or other places you come close Read respons and programme a separate tag with same RFID id. The user can’t know where reading took place. Difficult to trace later on Security problem 2: Uncontrolled Surveillance WARNING -With hidden tags in clothes, money, credit card the user has no longer control when/where/how he can be detected. Organisations are active to stop RFID. Ref: www.stop-rfid.org Potential restrictions on the way in the USA. Josef Noll, 26.4.2005 RFID - NFC tutorial 29 Source: Tor Hjalmar Johannessen, Telenor
  • 30. Vulnerability Security in RFID is weak if not enhanced by an extra layer, e.g. PKI (encryption is not resistant against replay, if content is not shifted) Remember: JQLOSXR& HYLWFXGQ, JQLOSXR& QRLWDJDSRU3 Controlled case Reader Uncontrolled reader Reading up to several cm This is also recognised by the public: www.stoprfid.org Josef Noll, 26.4.2005 RFID - NFC tutorial 30 Source: Tor Hjalmar Johannessen, Telenor
  • 31. Enhancement RFID security can be enhanced: - ”on/off” switch if the circuit is activated - under user’s control Suggestion: Combination with SIM/PKI (two factor authentication) a) RFID = trigger b) RFID signal routes to SIM for explicit verification Josef Noll, 26.4.2005 RFID - NFC tutorial 31 Source: Tor Hjalmar Johannessen, Telenor
  • 32. Boycott Gillette Products! Click for details. Others: - Wal-Mart -Benetton: http://boycottbenetton.or Benetton was considering putting RFID tracking chip in their clothing that can be read from a distance and used to monitor the people wearing them. Annet: http://www.epic.org/privacy/rfid/ Josef Noll, 26.4.2005 RFID - NFC tutorial 32 Source: www.stop-rfid.org
  • 33. Agenda – Speed? 0900 Welcome – interests – Understanding? 0920 RFID – the means for … – authentication - I want to hear more of… 0950 Q & A 1010 RFID & NFC: technology and scenarios 1045 Q & A 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 33
  • 34. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: – NFC technology technology and scenarios – Scenarios (travel scenario, DRM, 1045 Q & A Information retrieval) – State of the art 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 34
  • 35. Future scenario: „My services at home“ 1. 5. eGovernment, el. signature 2. 3. 4.Status of my family Josef Noll, 26.4.2005 RFID - NFC tutorial 35
  • 36. Security in the virtual world Examples: Security Requirement mHandel, Have VPN to know Need Intranet, email, to know Admittance Network access Nice to know Josef Noll, 26.4.2005 RFID - NFC tutorial 36
  • 37. Security infrastructure Security depends on application – Nice to know: WLAN network access – Need to know: email, Intranett – Have to know: VPN, (eCommerce) Higher level require more than just username & password http://www.openauthentication.org/ suggests 3 methods – SIM authentication (GSM, EAP-SIM,…) – Public Key Infrastructure (PKI) – One-Time-Password (OTP) In-line with requirements from Norwegian government for eSignature Depending on application: username & password or PKI The Mobile phone has all three: SIM, PKI, and OTP Challenge: Usability and exchange of credentials to “my working devices” Josef Noll, 26.4.2005 RFID - NFC tutorial 37
  • 38. The only thing you need: Your Mobile Phone SIM with RFID & PKI Josef Noll, 26.4.2005 RFID - NFC tutorial 38
  • 39. Four-in-one: Your mobile integrates them all RFID, * SIM & PKI Examples: & Security Requirement mHandel, Have VPN to know * RFID & Need Intranet, email, SIM to know Admittance passwd & *& RFID Network access Nice to know (& SIM) *Patent pending Josef Noll, 26.4.2005 RFID - NFC tutorial 39
  • 40. Seamless authentication Service Home access, Physical VPN access .mp3, .jpg access Josef Noll, 26.4.2005 RFID - NFC tutorial 40
  • 41. Timeline: Phone with RFID & PKI Near Field Communication SIM card with integrated RFID (NFC) Prototypes available from: Standardisation of Philips, – Giesecke & Devrient: Nokia, Sony, … demonstrated on Siemens Phones with RFID chip phones – Gemplus: both on one chip, Phone status: (terminated) NFC Nokia: on stock, Siemens: prototypes Josef Noll, 26.4.2005 RFID - NFC tutorial 41
  • 42. Near Field Communication (NFC) is a touch- based RFID technology • NFC works in the globally available 13.56 MHz band Technology • The effective working distance is up to a few centimeters • Based on ISO 18092 including ISO14443A MiFare and FeliCa standards, ie compatible with the most broadly established smart card infrastructure covering >80% of the market • Tags in smart objects are powered by the radio signal of the reader, and do not require any battery or other source of Tags power • The tags contain some memory that can store URLs, SMS and similar information • Costs currently a few ten EUR cents and decreasing rapidly • Devices do not contain tags, but can communicate using the Devices same interface • Devices can not only read tags, but also write to enabled tags Josef Noll, 26.4.2005 RFID - NFC tutorial 42 Sources: Nokia, Froster & Sullivan; Forrester
  • 43. NFC changes the role of the mobile operator The mobile operator is the communication provider – Everybody has a mobile phone – People know that they can reach me – and not my parents – Companies have identified the value of personal phones and change their infrastructure – The phone carries all my contacts – Connected 24/7 (all the time, not just 4 h a day) From access to communication – Provide communication: voice, SMS, MMS, IM, email,…. – Seamless login (wap.telenormobil.no) – my email, last 10 visited Provide presence and community services Provide authentication and security Josef Noll, 26.4.2005 RFID - NFC tutorial 43
  • 44. Near field communication (NFC) Based on RFID technology at 13.56 ECMA-340, ISO/IEC 18092 & MHz ECMA-352, …standards Typical operating distance 10 cm Powered and non-self powered Compatible with RFID devices Data rate today up to 424 kbit/s Philips and Sony Josef Noll, 26.4.2005 RFID - NFC tutorial 44
  • 45. NFC applications Josef Noll, 26.4.2005 RFID - NFC tutorial 45 Source: ecma, tc32-tg19-205-013.pdf
  • 46. Near field communication (NFC) - Applications and Compatibility Applications Transmit pictures from Camera to PC or TV Download applications or games Configure communication parameters in e.g. home network Smart card compatibility (Philip’s MIFARE and Sony’s Felica) Secure NFC (NFC + smart card) Active or passive operation Josef Noll, 26.4.2005 RFID - NFC tutorial 46
  • 47. “How does it work?” Nokia Field Force Solutions http://www.nokia.com/nokia/0,,70857,00.html Better service idea? Click to start flash Josef Noll, 26.4.2005 RFID - NFC tutorial 47
  • 48. NFC standardisation ECMA-340 Specifies the RF signal interface Initialisation, anti- collision and protocols Communication mode ECMA 352 (v1, Dec 2003) selection mechanism Selects communication modes: NFC, PCD, and VCD Enables communication in that mode Josef Noll, 26.4.2005 RFID - NFC tutorial 48
  • 49. Near Field Communication Interface Protocol (NFCIP) - finalised Josef Noll, 26.4.2005 RFID - NFC tutorial 49
  • 50. NFCIP-2 Interface and protocol (ISO/IEC 21481) Interface Standards ISO/IEC 14443 ISO/IEC 15693 ECMA-340 PCD mode VCD mode (MIFARE, FeliCa) (facility access) Josef Noll, 26.4.2005 RFID - NFC tutorial 50
  • 51. NFC Interface and Protocol Summary Josef Noll, 26.4.2005 RFID - NFC tutorial 51
  • 52. ECMA: NFC work items & future plans Work items ECMA-356: RF interface tests for ECMA-340 devices ECMA-362: Protocol Test Methods Future working items A mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth – Advanced Logical Link Control with addressing and segmentation support Support for Data Link and end-to-end security and key management Air-to-wired interface specification Application extensions in NFCIP-1 – Power control as an example application extension Josef Noll, 26.4.2005 RFID - NFC tutorial 52
  • 53. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: – NFC technology technology and scenarios – Scenarios (travel scenario, DRM, 1045 Q & A Information retrieval) – State of the art 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 53
  • 54. Josef Noll, 26.4.2005 RFID - NFC tutorial 54
  • 55. Josef Noll, 26.4.2005 RFID - NFC tutorial 55 Source: GemPlus
  • 56. RFID payment usage coffee machines in Telenor R&D RFID card in 2005 Tests in OSL and Arlanda RFID cards Think Planned Q4.2005, Univ. Tromsø (N) Payment on coffee machine Payment Entrance to door B6e Entrance Electronic access (VPN) - Telenor Josef Noll, 26.4.2005 RFID - NFC tutorial 56
  • 57. NFC – near field communication in praxis [copyright: www.nfc-forum.org] - Example: travelling Josef Noll, 26.4.2005 RFID - NFC tutorial 57
  • 58. NFC – near field communication in praxis [copyright: www.nfc-forum.org] - Example: streaming DRM Josef Noll, 26.4.2005 RFID - NFC tutorial 58
  • 59. NFC – near field communication in praxis [copyright: www.nfc-forum.org] - Example: Poster Information Josef Noll, 26.4.2005 RFID - NFC tutorial 59
  • 60. SIM City Platform Banks Ticketing Payment ID Service Providers Send Telenor CPA Ticket Buy Ticket Josef Noll, 26.4.2005 RFID - NFC tutorial 60
  • 61. Conclusions “The last time we were connected by a wire was at birth!” [Motorola] No cable, that’s the challenge – Various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, … – Limitations: battery, integration All services from your mobile Your mobile is the authentication centre Telecom as authentication provider Josef Noll, 26.4.2005 RFID - NFC tutorial 61
  • 62. Agenda 0900 Welcome – interests 0920 RFID – the means for authentication 0950 Q & A 1010 RFID & NFC: – NFC technology? technology and scenarios – State of the art? 1045 Q & A –… 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 62
  • 63. Agenda 0900 Welcome – interests 0920 RFID – the means for – Authentication – your own phone authentication – Infokiosk – imagine the world 0950 Q & A – Payment and ticketing (Giesecke 1010 RFID & NFC: & Devrient) technology and scenarios – NFC and mobile Commerce (Nokia/Telenor) 1045 Q & A 1100 deep breath – break 1110 demonstrations 1200 end of tutorial Josef Noll, 26.4.2005 RFID - NFC tutorial 63