1st NFC phone based transport in Europe04/200950pcs Nokia 6212 – Pilsen Transport cardMifare Classic card emulation in mobile phone05/20101.000 pcs of Nokia 6212 – commercial roll out12/2010NFC Phone as card validator11/2011Samsung NFC devices with USIM centric solutionPilsen transport card + payment card from City2
GE Money bank (MasterCard)01/20131st NFC phone based payments in CZ and SK3Komerční banka (VISA) 08/2012Tatrabanka [SK] (VISA) 01/20133 NFC phones from beginningLimited edition2000 SIMs with pre-personalized appletNow 7 NFC phones and rising…Standard O2 CZ NFC SIM card,3 different payment cards availableStarted with 6 NFC phones5000 SIM with pre-personalized applet
Our approach to SIM based applications (1/2)Access/Identification(Will of the accepting party)Authorization(Will of the card holder)8Abstraction levelBuilding entrance, computer andintranet logon, VPN authentication,transport applications, coupons…Remote payment authorization,document signature, moneytransfer authorization …Possible use casesThanks to high level of abstraction for the core SIMapplications we are able to cover virtually all use casesneeded for both corporate and retail users.
Our approach to SIM based applications (2/2)Single device approach• NFC interface might not beneeded for some use-cases• Handset application use theservices available from SIMcurrently inserted• PIN protected or PIN-lessinformation availableDouble device approach• Data are exchanged betweentwo devices sing the NFCinterface.• Data exchange between thehandset and:› Handset› Tablet› PC with contactless reader› POS, kiosks, …› Virtually any NFC capabledevice*• PIN protected or PIN-lessinformation available* Depending on the applicationneeds9
SIM.me – SIM stored identitySensitive information stored on the card (SIM.me)Personal information repository for handset applications• Name, address, certificate …Biometric information if needed• Photo, fingerprints, eye color …Trusted source of personal information• Telefónica in the role of registration authority• Some biometrics may require verification by 3rd party• Personal data stored on SIM only after verification at POS10
Feature 1: Access/Identification (slide II/II)Typical applicationsBuilding/venue access• Even for the application that require presence of the photography• Dynamic access codes› not just card IDAccess to virtual applications• Logon scenarios (device, portal or network)• Identification for the remote service11
Feature 2: AuthorizationUsing the credentials available from SIM.meAll use-cases where the will of the customer/employeeneeds to be verified and stored• both physical and electronic/virtualGeneral document signature• Document signed using the qualified or commercial certificate• Using the corporate/internal PKI to speed up the approval workflow• For the “double device approach” the signeddata can be verified on the display of handsetprior to signing12