Apple Pay Research on NFC and the security threat

Slides:



Advertisements
Similar presentations
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Advertisements

Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
NFC Devices: Security and Privacy
NEAR-FIELD COMMUNICATION MAKING LIFE EASY Presenter: Grace Chen NFC Technology.
NFC Technology and Applications Assaf Sella CTO Texas Instruments Israel Feb
Mobile Payments Commerce Without Cash or Credit Cards.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Wireless Security.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand
University of Minnesota MOBILE PAYMENTS [1] CSCI )Tootu kurra 2)Kaustubh Rawoorkar.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Presented By: Arpit Jain Guided By: Prof. D.B. Phatak.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. iOS.
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Chapter 2: Information Technology and AISs
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Confidential & proprietary M2M communications in Transportation industry.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Data Collection Methods Libby Wise Contents Content Questionnaires Optical Mark Recognition Sensors Optical Character Recognition Bar codes Quick Response.
Week #6: Discussion results NFC technology and its components Group #33 Group member: Tianhao Han Ximeng Sun(Susie) Xing Cao(Star) Zhuoran Yang.
Ignite Presentation: Near Field Communication Harry Yang.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
1 Progress Report from NFC Working Group General Meeting Copenhagen 18 April 2013 Round Table 1.
Team 13 Prathibha and Shrimi 11/12/13 Mobile Credit Card Processing.
Security in Near Field Communication Strengths and Weaknesses
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
 SafePay: Protecting against Credit Card Forgery with Existing Magnetic Card Readers Yinzhi Cao †, Xiang Pan §, Yan Chen § † Lehigh University § Northwestern.
Saahithi Chillara Radhika Goyal ECE Fall Senior Design Project.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Radio frequency identification (RFID) Opportunities for mobile telecommunication services ______________ ______________.
Near field communication (NFC)
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
Wi-Fi Technology.
Samsung Pay RAO Lu KONG Shuyi
NETWORK AND COMMUNICATIONS
Near Field Communication (NFC)
Facebook privacy policy
Fundamentals of Information Systems, Sixth Edition
A catalyst for mobile contactless payments adoption?
English for Advance Learners I
SHORT DISTANCE WIRELESS COMMUNICATION
Mobile RFID Topics in Internet JinKyu, Yoo
Most popular IoT Devices (hardware)
THE ABC’s OF NFC.
NFC AND WIRELESS COMMUNICATION STANDARDS
National Mining University
Cesar Lomeli.
CompTIA Security+ Study Guide (SY0-501)
N-Guard: a Solution to Secure Access to NFC tags
The protector card RFID PROTECTOR.
Hacking mobile devices
PRODUCT AND SERVICE INNOVATION
Near field communication (NFC)
Instructor: Mort Anvari
Near field communication (NFC)
Security in SDR & cognitive radio
Presentation transcript:

Apple Pay Research on NFC and the security threat

Hello! Dennis Ho Asher Kam

In the recent year, as the number of user in using Apple Pay to make transaction is increasing and more widely acceptance by Hong Kong

Introduction Architecture of Apple Pay Background of Near Field Communication (NFC) Background of Apple Pay Security threat of the NFC mobile payment Potential security Issue on using (RFID) Others main security problem Apple Pay solution on these threats How Apple Inc tackle the potential risk

1a. Architecture Of Apple Pay Background of Near field communication (NFC)

Background Of NFC Based on radio-frequency identification(RFID) Wireless connection within 10cm distance More communication modes are added in. The most updated protocol now currently used is ISO/IEC 21481:2012

Steps On Using NFC Placing the user’s phone at the payment terminal Hold the phone from the distance not exceeding 10 cm and wait for the transaction to complete Transaction will be complete after certain approval time by the device 


1b. Architecture Of Apple Pay Background of Apple Pay

Background Of Apple Pay A type of mobile wallets Perform on IOS perform. The main purpose of the above are to replace the traditional credit card with mobile phone so that user can use mobile phone NFC function to pay without showing a real credit card. 


Five Main Components To Conduct The Apple Pay System Secure element NFC controller Wallet Secure enclave Apple pay servers

Card Enrolment Part

Card Enrolment Part

Payment Authorization Part

Payment Authorization Part

Potential risk of using NFC 2a. Security Threats Potential risk of using NFC

Security Issue On Using (RFID) Eavesdropping Signal can be collected with antenna or some equipment. Data Corruption A misleading signal is sent to the mobile device and the receiver. Data Modification Destory the original signal and send a new modified signal to the mobile device and the receiver.

Others Main Security Problem Lost or stolen mobile device NFC system cannot detect any device is a lost or stolen device. Interference of servers and cloud service During the transmission of cardholder data from the mobile device to the server terminal, compromise of data might be conducted. DDos attack

3. How Apple Does On Facing The Above Threats A complex solution will be listed and explained

Solution On The Threats The isolation design of secure element Find my iPhone setting Insensitive information Record in Apple Server

Thanks! Any questions? Q&A