1 GP Confidential ©2013 1 GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)

Slides:



Advertisements
Similar presentations
Multi-Application in Smart Card-based Devices Christophe Colas, Chief Software Architect August 2002.
Advertisements

Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
The GSMA July 2014 Restricted - Confidential Information
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Amdocs Unified Communications solution.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Secure Communication Architectures.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Dongyan Wang GlobalPlatform Technical Program Manager
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
02/12/00 E-Business Architecture
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Web Cryptography & Utilizing ARM TrustZone® based TEE for Authentication & Cryptography Ilhan Gurel September 10th & 11th, 2014.
Simple Online Accounts for Your Business – With Help from Microsoft Azure, Big Red Cloud Makes Accounting Easier for Thousands of Businesses MICROSOFT.
Grow Your Business with the Mitel Applications Suite PSG Networks Mitel Business Partner.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Sales Card Dell Confidential – Internal Use Only Microsoft Windows 10 OVERALL DELL MESSAGE: Let Dell help you migrate to take advantage of new Windows.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Hosted on the Powerful Microsoft Azure Platform, Advent Countdown Lets Companies Run Reliable and Scalable Holiday Marketing Campaigns MICROSOFT AZURE.
Software Licensing, Made Simple SELECT Server XM Edition
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Week #7 Objectives: Secure Windows 7 Desktop
Using the Powerful Microsoft Azure Platform, e-SUAP Properly and Securely Manages All Steps for Customizable Business Activities Permissions MICROSOFT.
Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee.
·
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Increasing Manufacturing Uptime Is Made Easier with RtTech’s Industrial Facilities Application RtDuet, Powered by the Microsoft Azure Cloud MICROSOFT AZURE.
VMob Mobile Marketing Platform Delivers Highly Targeted Marketing Directly into Shoppers’ Existing Smartphone Apps from the Microsoft Azure Cloud MICROSOFT.
Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment.
PAYWARE MOBILE API – APP TO APP INTEGRATION. PAYWARE MOBILE API OVERVIEW VeriFone’s PAYware Mobile API provides iPhone developers the ability to easily.
CloudWay.ro Gives Clients Fast Invoicing, Stock Management, and Resource Planning via Microsoft Azure and Azure SQL Database MICROSOFT AZURE ISV PROFILE:
Powered by Microsoft Azure, Auctori Is the Next Generation in Multilingual, Global, Search Engine Optimized Web Content Management Systems MICROSOFT AZURE.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
GP Confidential GlobalPlatform’s Modular Approach to its Compliance and certification.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
MICROSOFT AZURE ISV PROFILE: eMyPA BUSINESS SOLUTIONS eMyPA is a cloud-based, mobile-enabled digital business card holder. It allows users to access their.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
Hardware-based secure services past and future Olivier POTONNIEE, Aurélien COUVERT, Virginie GALINDO April 2016.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Building the Next Generation Mobile Value Added Services 18 th April 2016 Ritz Carlton DIFC Hotel in Dubai – UAE Hisham Hammoud Chief Business Officer.
CLOUDENTIFY.
A catalyst for mobile contactless payments adoption?
LAS16-203: Platform Security Architecture for embedded devices
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
5/25/2018 2:39 AM © 2006 Microsoft Corporation. All rights reserved.
Hardware Cryptographic Coprocessor
BY GAWARE S.R. DEPT.OF COMP.SCI
Secure Element API An introduction.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Masterpass: Bill Payments July 18, 2017
Public Key Infrastructure from the Most Trusted Name in e-Security
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
Presentation transcript:

1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS) Dongyan Wang GlobalPlatform Technical Program Manager Wednesday 19 March GP Confidential

TM GlobalPlatform Members TM

Introducing GlobalPlatform Standards... With GlobalPlatform standards: Create once based on: o Stable and interoperable application programming interfaces (APIs) o Stable security requirement Deploy ‘everywhere’ 3 GlobalPlatform

TM GlobalPlatform Positioning Across several market sectors and in converging sectors GlobalPlatform is the standard for managing applications on secure chip technology Trusted Execution Environment Secure Element AND Premium Content

TM Mobile as a Center of the New Service Deployment Trusted Execution Environment The trusted execution environment (TEE) provides with a unique capability to ensure that a transaction: Is approved by the right end user Is on the right and trusted device Takes place between the application and cloud or back-end service

TM What is a TEE? TEE provides hardware-based isolation from rich operating systems (OS) such as Android TEE runs on the main device chipset and relies on hardware roots of trust (crypto keys and secure boot) TEE has privileged access to platform and device resources (user interface, memory controller, video / audio hardware, crypto accelerators, biometry…) Technology already massively deployed Premium content protection is currently a major use case 6 Open to malware and rooting / jailbreaking Isolation of sensitive assets

TM GlobalPlatform TEE Functions Code and data isolation Secure cryptography Secure storage Secure clock Trusted user interface Secure element (SE) interface Administration scheme Hardware-based TEE Functions = ToolBox Device authentication User authentication Protection of any sensitive software engine Digital signature and encryption Secure communication to server and / or SE Upgradable environment Value for Secure App Providers includes

TM Unique Feature for mPOS : Trusted User Interface (UI) Message to be signed ▪ Transaction summary displayed by TEE ▪ Rich OS environment cannot tamper with the message ▪ The user signs exactly what s/he is seeing Explicit Validation Means ▪ PIN / password entry  rich OS environment cannot have access to entered credential Security Indicator ▪ Text or image ▪ ‘Sign-in seal concept’ ▪ Information securely configured by the user and securely controlled by the TEE ▪ Prove to the user that the screen is TRUSTED by seeing this known information  Tools to build ‘what you see is what you sign’, anti-phishing and non repudiation   

TM Near field communication (NFC) smartphone can be used as card reader A trusted channel is opened between the card and the mPOS Trusted mPOS (1/3) Secure Channel Rich OS My Store

TM When needed the end user enters a PIN to confirm a contactless transaction A trusted application will use the trusted UI feature to protect the PIN from any rich OS application Trusted mPOS (2/3) PIN

TM mPOS needs to be integrated with back and front office applications TEE protects the credential required to ensure a trusted channel is opened between the mPOS and the server Trusted mPOS (3/3) Rich OS My Store Secure Channel

TM Thanks to the GlobalPlatform open architecture supporting multiple applications, a smartphone with a qualified TEE is able to support different mPOS applications – Such as mPOS APPs world, mobile, loyalty programs, actionable intelligence, cross-channel and in-store marketing programs. But also barcode scanning, LBS, eReceipts, coupons, QR codes, wallets, click & collect, geo-targeted mobile advertising and alternative in-store payments. TEE Supports Value Added Services on mPOS Rich OS My Bank

TM Thanks to the GlobalPlatform open architecture supporting multiple applications from multiple actors, a smartphone with a qualified TEE is able to support different POS TEE security certification offers a real insurance for the mPOS deployment TEE administration will provide a standard language to manage a mPOS application – Load, install, delete – Update TEE Supports Multiple mPOS Model Rich OS My Bank

TM Support Different Use Cases 14  eCommerce mPOS installed in end- user smartphone End-user enters his PIN on his mobile  Commerce mPOS installed in merchant smartphone End-user enters his PIN on merchant mobile  Hybrid mPOS installed in merchant smartphone BUT End-user enters his PIN on his mobile

TM Summary Collaboration between TEE and card allows the best of both worlds – High level security of smart card/SEs and usability of smartphone The massive deployment of GlobalPlatform SE and TEE generates a standardized infrastructure for: – Enhancing the usability and security of today’s services – Deploying new payment services (peer-to-peer, remote payment) Compliancy is needed to deploy a mobile service across different devices from different providers Security across different device and suppliers is a must that is central to the GlobalPlatform technology 15

TM 16