Secure Dynamic Messaging Feature

NXP MIFARE Team
NXP MIFARE TeamMIFARE is the leading contactless development platform used in more than 40 different applications worldwide.
EXTERNAL
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V.
ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.
A U G 2 0 2 0
Joo Ming CHUA
Senior Product Manager
SECURE DYNAMIC
MESSAGING (SDM)
A MIFARE® DESFire® EV3 KEY FEATURE
VIDEO
1EXTERNAL
CONFIDENTIAL AND INTEGRITY PROTECTED DATA EXCHANGE USING NDEF READING
V I A S EC U R E D Y N AM I C M ES SAG I N G ( S D M ) FE AT U R E
• MIFARE DESFire EV3 IC can be programmed to store NDEF messages as defined in the NFC Forum Tag Type 4 specification
• A unique IC individual message is generated on each tap, e.g. an NDEF message holding a URL linking to a website
• SDM feature allows to add security to the NDEF message
− By attaching confidentiality and integrity protected meta-data to the URI (e.g. UID, SDM counter, CMAC)
− Reading with standard NDEF readers (standard NFC enabled mobile device), no specific mobile app is needed
• It allows confidential and integrity protected data exchange without requiring a preceding authentication
• SDM is compatible and already known from NTAG® 424 DNA
Unique IC individual
NDEF message is
generated on each
tap
Communication
works with
standard NFC data
exchange format
(NDEF) – no special
app or hardware is
needed
Backend server can
evaluate the
confidential data
that was generated
by the IC
2EXTERNAL
CONFIDENTIAL AND INTEGRITY PROTECTED DATA EXCHANGE USING NDEF READING
V I A S EC U R E D Y N AM I C M ES SAG I N G ( S D M ) FE AT U R E
Backend
OK Unique Message
NDEF Message
with SDM protection
SDM Key
SDM Key
Browser
App
1) MIFARE DESFire EV3 IC contains NDEF message and SDM configuration
2) Tapping the MIFARE DESFire EV3 product-based card to an NFC Forum compliant reading device (e.g. mobile phone)
3) Card calculates SDM authentication code (CMA, SDM counter increase, data encryption, etc.) upon each tap
4) Device reads tap-unique URL with SDM authentication code and sends information to the server backend
5) Server backend verifies SDM data and authentication code
6) Based on the verification result, server backend sends information back to the device
3EXTERNAL
TECHNICAL DETAILS: HOW TO ENABLE THE SDM FEATURE ON THE CARD
On MIFARE DESFire EV3
• Can be enabled for an application that is NDEF formatted (contains a CC File and a NDEF File including an appropriate NDEF message)
• The SDM feature enablement is done during the creation of the NDEF File, a Standard Data File inside the MIFARE DESFire application
• SDM specific settings and configurations for the NDEF File can be afterwards done using the ChangeFileSettings command
− Here it is defined with data that shall be attached to the NDEF message (to the URL) and how the data shall be protected (encrypted or MACed)
− Example data that can be attached to the NDEF message include the SDM counter, UID, some encrypted data, a secure checksum (CMAC), etc.
• Once enabled, the specified data is automatically generated and attached to the NDEF message upon a new card tap
https://www.nxp.com/ & & &Encrypted
UID
Encrypted
Data
CMAC
4EXTERNAL
MORE INFORMATION ABOUT THE SECURE DYNAMIC MESSAGING FEATURE
Item Number Availability
Datasheet - MIFARE DESFire EV3 DS4489 NXP DocStore (confidential)
Application Note - MIFARE DESFire EV3 Quick-Start Guide AN5755 NXP website (public)
Application Note - MIFARE DESFire EV3 Features and Hints AN5881 NXP DocStore (confidential)
Application Note - Feature and Functionality Comparison between
MIFARE DESFire EV2 and MIFARE DESFire EV3
AN5756 NXP website (public)
RFID Discover Software SW1866 NXP DocStore (confidential)
NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.
1 of 6

Recommended

SL1SL3 MixMode Feature by
SL1SL3 MixMode FeatureSL1SL3 MixMode Feature
SL1SL3 MixMode FeatureNXP MIFARE Team
350 views6 slides
Security Level 3 (SL3) Capabilities by
Security Level 3 (SL3) CapabilitiesSecurity Level 3 (SL3) Capabilities
Security Level 3 (SL3) CapabilitiesNXP MIFARE Team
820 views6 slides
Transaction Timer Feature by
Transaction Timer FeatureTransaction Timer Feature
Transaction Timer FeatureNXP MIFARE Team
279 views6 slides
Cluster api - koss 2019 by
Cluster api - koss 2019Cluster api - koss 2019
Cluster api - koss 2019Esther Kim
224 views27 slides
Deep dive into Kubernetes Networking by
Deep dive into Kubernetes NetworkingDeep dive into Kubernetes Networking
Deep dive into Kubernetes NetworkingSreenivas Makam
9.3K views30 slides
Cloud stack troubleshooting by
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting AlexTian
2.3K views27 slides

More Related Content

What's hot

531: Controlling access to your IBM MQ system by
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
493 views49 slides
OpenID for Verifiable Credentials by
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
934 views38 slides
FIDO2 & Microsoft by
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & MicrosoftFIDO Alliance
1.1K views21 slides
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru... by
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...Vietnam Open Infrastructure User Group
89 views16 slides
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで - by
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
1.7K views56 slides
Session 3 - i4Trust components for Identity Management and Access Control i4T... by
Session 3 - i4Trust components for Identity Management and Access Control i4T...Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...FIWARE
561 views123 slides

What's hot(20)

531: Controlling access to your IBM MQ system by Robert Parker
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
Robert Parker493 views
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで - by Naoto Miyachi
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
Naoto Miyachi1.7K views
Session 3 - i4Trust components for Identity Management and Access Control i4T... by FIWARE
Session 3 - i4Trust components for Identity Management and Access Control i4T...Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...
FIWARE561 views
Deep Dive into Keystone Tokens and Lessons Learned by Priti Desai
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons Learned
Priti Desai7.8K views
Introduction - vSphere 5 High Availability (HA) by Eric Sloof
Introduction - vSphere 5 High Availability (HA)Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere 5 High Availability (HA)
Eric Sloof18.9K views
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx by Carlo Sacchi
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Carlo Sacchi306 views
APIC/DataPower security by Shiu-Fun Poon
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
Shiu-Fun Poon1.6K views
Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C... by WSO2
Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C...Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C...
Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C...
WSO2313 views
Kubernetes Webinar - Using ConfigMaps & Secrets by Janakiram MSV
Kubernetes Webinar - Using ConfigMaps & Secrets Kubernetes Webinar - Using ConfigMaps & Secrets
Kubernetes Webinar - Using ConfigMaps & Secrets
Janakiram MSV1.4K views
Container Security Deep Dive & Kubernetes by Aqua Security
Container Security Deep Dive & Kubernetes Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes
Aqua Security2.6K views
Fido Technical Overview by FIDO Alliance
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
FIDO Alliance1.9K views
Veritas Managed Backup Services Presentation by Ideba
Veritas Managed Backup Services PresentationVeritas Managed Backup Services Presentation
Veritas Managed Backup Services Presentation
Ideba587 views
FIDOセキュリティ認定の概要と最新状況 by FIDO Alliance
FIDOセキュリティ認定の概要と最新状況FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況
FIDO Alliance823 views
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George by SSIMeetup
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup6.1K views
Developer Tutorial: WebAuthn for Web & FIDO2 for Android by FIDO Alliance
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
FIDO Alliance10.2K views

Similar to Secure Dynamic Messaging Feature

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg by
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgEric Vanderburg
667 views36 slides
Transaction MAC Feature by
Transaction MAC FeatureTransaction MAC Feature
Transaction MAC FeatureNXP MIFARE Team
369 views6 slides
Security Issues related with cloud computing by
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
284 views4 slides
Android Application for Mobile Attendance using NFC by
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCIRJET Journal
155 views5 slides
Cisco DNA by
Cisco DNACisco DNA
Cisco DNAMohammad ali Safvati
651 views5 slides
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT) by
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
412 views47 slides

Similar to Secure Dynamic Messaging Feature(20)

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg by Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg667 views
Security Issues related with cloud computing by IJERA Editor
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
IJERA Editor284 views
Android Application for Mobile Attendance using NFC by IRJET Journal
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
IRJET Journal155 views
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT) by zOSCommserver
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
zOSCommserver412 views
ioT and Machine 2 Machine Computing by Vikram Nandini
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
Vikram Nandini396 views
Hardwar based Security of Systems by Jamal Jamali
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali168 views
Understanding Telecom SIM and USIM/ISIM for LTE by ntel
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
ntel62.4K views
NFC Basic Concepts by Ade Okuboyejo
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
Ade Okuboyejo14.9K views
NFiD: An NFC based system for Digital Business Cards by IRJET Journal
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
IRJET Journal33 views
International Journal of Computational Engineering Research(IJCER) by ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline733 views
Hydraulische Wiegesysteme by ZeljkoJurca
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
ZeljkoJurca69 views
Brochure skidweigh Defender by Ted Jurca
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
Ted Jurca13 views
Secure sigfox ready devices recommendation guide by Sigfox
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
Sigfox2.9K views
IRJET- Anchoring of Cloud Information under Key Presentation by IRJET Journal
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal11 views
Forklift Impact Management in Real Time by Ted Jurca
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
Ted Jurca49 views
Forklift Fleet Management, SkidWeigh Technology by Ted Jurca
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
Ted Jurca13 views

More from NXP MIFARE Team

NTA's Leap Card - Expanding Ticketing while Shrinking Costs by
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNXP MIFARE Team
145 views2 slides
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables by
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Team
1.4K views18 slides
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud by
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
3.8K views21 slides
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur... by
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Team
1.4K views19 slides
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment by
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Team
2.3K views17 slides
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag... by
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
1.6K views18 slides

More from NXP MIFARE Team(9)

NTA's Leap Card - Expanding Ticketing while Shrinking Costs by NXP MIFARE Team
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking Costs
NXP MIFARE Team145 views
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables by NXP MIFARE Team
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Team1.4K views
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud by NXP MIFARE Team
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Team3.8K views
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur... by NXP MIFARE Team
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Team1.4K views
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment by NXP MIFARE Team
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Team2.3K views
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag... by NXP MIFARE Team
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Team1.6K views
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations by NXP MIFARE Team
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Team1.5K views
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow by NXP MIFARE Team
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Team2.7K views
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside by NXP MIFARE Team
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Team7.8K views

Secure Dynamic Messaging Feature

  • 1. EXTERNAL NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V. A U G 2 0 2 0 Joo Ming CHUA Senior Product Manager SECURE DYNAMIC MESSAGING (SDM) A MIFARE® DESFire® EV3 KEY FEATURE VIDEO
  • 2. 1EXTERNAL CONFIDENTIAL AND INTEGRITY PROTECTED DATA EXCHANGE USING NDEF READING V I A S EC U R E D Y N AM I C M ES SAG I N G ( S D M ) FE AT U R E • MIFARE DESFire EV3 IC can be programmed to store NDEF messages as defined in the NFC Forum Tag Type 4 specification • A unique IC individual message is generated on each tap, e.g. an NDEF message holding a URL linking to a website • SDM feature allows to add security to the NDEF message − By attaching confidentiality and integrity protected meta-data to the URI (e.g. UID, SDM counter, CMAC) − Reading with standard NDEF readers (standard NFC enabled mobile device), no specific mobile app is needed • It allows confidential and integrity protected data exchange without requiring a preceding authentication • SDM is compatible and already known from NTAG® 424 DNA Unique IC individual NDEF message is generated on each tap Communication works with standard NFC data exchange format (NDEF) – no special app or hardware is needed Backend server can evaluate the confidential data that was generated by the IC
  • 3. 2EXTERNAL CONFIDENTIAL AND INTEGRITY PROTECTED DATA EXCHANGE USING NDEF READING V I A S EC U R E D Y N AM I C M ES SAG I N G ( S D M ) FE AT U R E Backend OK Unique Message NDEF Message with SDM protection SDM Key SDM Key Browser App 1) MIFARE DESFire EV3 IC contains NDEF message and SDM configuration 2) Tapping the MIFARE DESFire EV3 product-based card to an NFC Forum compliant reading device (e.g. mobile phone) 3) Card calculates SDM authentication code (CMA, SDM counter increase, data encryption, etc.) upon each tap 4) Device reads tap-unique URL with SDM authentication code and sends information to the server backend 5) Server backend verifies SDM data and authentication code 6) Based on the verification result, server backend sends information back to the device
  • 4. 3EXTERNAL TECHNICAL DETAILS: HOW TO ENABLE THE SDM FEATURE ON THE CARD On MIFARE DESFire EV3 • Can be enabled for an application that is NDEF formatted (contains a CC File and a NDEF File including an appropriate NDEF message) • The SDM feature enablement is done during the creation of the NDEF File, a Standard Data File inside the MIFARE DESFire application • SDM specific settings and configurations for the NDEF File can be afterwards done using the ChangeFileSettings command − Here it is defined with data that shall be attached to the NDEF message (to the URL) and how the data shall be protected (encrypted or MACed) − Example data that can be attached to the NDEF message include the SDM counter, UID, some encrypted data, a secure checksum (CMAC), etc. • Once enabled, the specified data is automatically generated and attached to the NDEF message upon a new card tap https://www.nxp.com/ & & &Encrypted UID Encrypted Data CMAC
  • 5. 4EXTERNAL MORE INFORMATION ABOUT THE SECURE DYNAMIC MESSAGING FEATURE Item Number Availability Datasheet - MIFARE DESFire EV3 DS4489 NXP DocStore (confidential) Application Note - MIFARE DESFire EV3 Quick-Start Guide AN5755 NXP website (public) Application Note - MIFARE DESFire EV3 Features and Hints AN5881 NXP DocStore (confidential) Application Note - Feature and Functionality Comparison between MIFARE DESFire EV2 and MIFARE DESFire EV3 AN5756 NXP website (public) RFID Discover Software SW1866 NXP DocStore (confidential) NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
  • 6. NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.