Samsung Pay RAO Lu KONG Shuyi

Slides:



Advertisements
Similar presentations
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Advertisements

FIT3105 Smart card based authentication and identity management Lecture 4.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 1 Patented QR code solutions James Wu We Simplify Security.
Online Decision Process
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
1 Authentication Celia Li Computer Science and Engineering York University.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
Presented by David Cole CVM Methods.  CVM Methods in the End-to-End Process  What is a CVM List?  Risk protection tool  Types of PIN processing 
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
Transaction Flow end-end
Crypto in information security
GSM SECURITY AND ENCRYPTION
Cryptography and Network Security
IEEE CyberTrust workshop
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Triple DES.
SECURITY FEATURES OF ATM
Outline What does the OS protect? Authentication for operating systems
Hardware Cryptographic Coprocessor
Secure Electronic Transaction
Merging Security and Convenience with Seos® Credential Technology
Chapter 8 Network Security.
EMV® 3-D Secure - High Level Overview
Apple Pay Research on NFC and the security threat
Installation & User Guide
Outline What does the OS protect? Authentication for operating systems
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
By Theodora Kontogianni
My Settings allows a user to manage their Business Banking personal information and preferences, including: Contact information Username and Password Security.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
September 2016 EQUIPMENT FOR PROCESSING.
Cesar Lomeli.
Cryptography and Network Security
Cryptography Basics and Symmetric Cryptography
Cesar Lomeli.
PART VII Security.
Secure Electronic Transaction (SET) University of Windsor
Installation & User Guide
The Secure Sockets Layer (SSL) Protocol
From Web Security by Lincoln pp – 35-51
Secure Electronic Transactions (SET)
Module 2 OBJECTIVE 14: Compare various security mechanisms.
DieboldNixdorf.com Tokenization Roman Cinkais |
International Data Encryption Algorithm
Security in Distributed Systems
Cryptography and Network Security
NCSA Duo.
Presentation transcript:

Samsung Pay 1155089782 RAO Lu 1155081944 KONG Shuyi 1155082141 ZHANG Hui

Outline Function of Samsung Pay Details of Security in Samsung Pay Tokenization KNOX

Function of Samsung Pay Credit & gift cards QR & Bar code (Alipay) Transportation cards

Function of Samsung Pay 1. Credit & gift cards Support both Near Field Communication (NFC) and Magnetic Secure Transaction (MST), which means that Samsung Pay can also work on all traditional POS terminals, include terminals those do not support NFC. NFC: a set of communication protocols that enable two electronic devices to communication by bringing them within 4 cm of each other. (require POS support NFC) MST: incorporates an electromagnetic transmission system, which means that Samsung Pay can also work on payment terminals that only support magnetic stripe cards.

Function of Samsung Pay 1. Credit & gift cards or 1. Choose card: Slide the screen from the button up to launch the payment function, then choose the card you want to use. 2. Validate: fingerprint on the home key or input password of your phone. 3. Payment: put your phone beside the POS terminal and wait for payment complete.

Function of Samsung Pay 2. QR & Bar code (Alipay) Samsung pay can also bound with Alipay and generate an QR & Bar code card. Follow the previous payment steps to finish payment using Alipay.

Function of Samsung Pay 3. Transportation card After adding the transportation card into Samsung pay, people can use Samsung phone as a transportation card, even the phone is power off. At present, this function is available in Beijing and Shanghai.

Security in Samsung Pay Overview of Samsung Pay Secured Communication End-to-end 3DES encryption plus Tokenization TrustZone: KNOX Framework Reference: http://developer.samsung.com/tech-insights/pay

Security in Samsung Pay Terminology PAN: Primary Account Number(16-digit) Token: An authorized voucher to interchange for goods or services. A substitute value of PAN. Also called DPAN. Cryptogram: An element contains ①encrypted data derived from the token;②timestamp;③Application Transaction Counter TSP: Token Service Provider ID&V: Identity and Verification

Security in Samsung Pay Samsung Preference TSP: Global payment networks Key type: Static key Security in Samsung Pay Tokenization Payment Workflow ID&V ① ID&V Token Requester TSP ② ③ ④ t ⑤ t t ④ ID&V t ① ⑤ Acquirer Payment network Issuer ③ ⑥ ② t t

Security in Samsung Pay 3DES Encryption 3DES = Triple DES = Triple Data Encryption Algorithm Symmetric-key Block cipher Applies DES three times to each block Cipher Details Ciphertext = EK3(DK2(EK1(plaintext))) Plaintext = DK1(EK2(DK3(ciphertext))) Block sizes : 64 Rounds: 48 (16×3) Key option1: K1≠ K2 ≠ K3 Key option2: K1= K3 ≠ K2 Key option3: K1= K2 = K3(DES)

Security in Samsung Pay End-to-end Authentication: Fingerprint of PIN Pad Cryptogram computation: Based on the key, only after successful authentication, one cryptogram per authentication Key access: Only particular card network TA Cryptogram security: cannot be brute-forced outside of the card network TA Guarantee Every Transaction using a token is explicitly authorized by the user.

Security in Samsung Pay Token + Cryptogram

Security in Samsung Pay Token + Cryptogram Example 4012300001234567 21041010647020079616 16 digits token 20 digits heart Reference: Black Hat USA 2016,Samsung pay: tokenized numbers flaws and issues,  Salvador Mendoza

Details of Security in Samsung Pay KNOX KNOX is Samsung's defense-grade mobile security platform built into our devices. Simply turn on the device, and you're protected. The security platform of Samsung mobile devices since 2013, provides the total approach to mobile security, ensuring that your device is secure, out-of-the-box.

Details of Security in Samsung Pay KNOX Multi-layered security SE for Android Trust Zone Secure Boot & Trusted Boot Hardware Root of Trust

Details of Security in Samsung Pay Three layers of security: Biometric authentication KNOX Tokenization